Panda Malware: It’s Not Just About Cryptocurrencies Anymore

2024 Cybersecurity Predictions


Panda’s target list includes two productivity web applications that use Ajax. This is notable because unlike web applications that execute completely on a server, Ajax applications utilize functions across both the client and the server. This extends the possible attack surface, and allows for more opportunities to potentially inject malicious code, steal sessions/authentication tokens, or start a browser-based attack. Although security around Ajax has been tightened since the mid-2000s, the possibility for an attack vector remains.

In order to propagate more quickly the latest Panda attacks are utilizing BlackHat SEO injection techniques. Link spam (posting out of context links on forums) is used to increase the number of external links to a specific website. Increasing this number can improve a website’s position in search engines result, resulting in a higher number of clicks. Link spam is highly discouraged, however, Google applies penalties on websites which utilize low-quality link building. Sites that partake in this are subject to punitive action and often see their ranking go down overnight. Panda’s authors are getting more thoughtful with their techniques to spread the malware and are attempting to bypass Google’s punishments.

Conclusion

Panda is an example of a classic banking Trojan that has evolved in technique, sophistication, and industry scope. Panda has expanded well beyond its original purpose of sealing sensitive information and manipulating online transactions. Today’s most sophisticated malware authors are demonstrating their knowledge and experience by using techniques that circumvent a target’s defense mechanisms to evade detection. We’re seeing this trend in almost every piece of code that descends from banking malware.

All industries impacted by Panda malware (such as ecommerce, social media, video/media hosting providers, online advertisers, and others) need to be aware of the increasingly clever techniques being used so they can take precautions. It’s critical for all organizations to provide security awareness training to employees and clients to help them avoid falling victim to phishing attacks or drive by downloads as this is how Trojan attack malware is typically installed.

Panda is just one of many types of malware we follow at F5. Check back with us for updates to this article as future campaigns materialize, and targeted industries expand.

The target list for this version of Panda includes:
 

Target Name Target Domain Country Industry
  http://*    
Bing https://www.bing.com/fd/ls/lsp.aspx USA Search Engine
WebPT https://app.webpt.com/ping.php* USA Healthcare/Electronic Medical Records
New Relic Browser https://*bam.nr-data.net* USA Web Services
Google, LLC https://googleads.g.doubleclick.net/pagead/ads USA Online Advertising
Cure MD https://cloud8.curemd.com* USA Healthcare/Electronic Medical Records
Microsoft https://word-view.officeapps.live.com* USA Productivity
TrackJS https://capture.trackjs.com* USA Web Services
AirBnB https://www.airbnb.com* USA Travel
SoundCloud https://*soundcloud.com* USA Music
Tyler Technologies https://*tylertech.com* USA Computer Software
Microsoft https://outlook.live.com/owa/service.svc* USA Email/Communications
Expedia https://oms.expedia.com* USA Travel
Yahoo https://mg.mail.yahoo.com* USA Email/Communications
Google, LLC https://mail.google.com/mail/* USA Email/Communications
Clicktale https://*clicktale.net* USA Digital Analytics
Yahoo https://geo.query.yahoo.com* USA Maps
Yahoo https://finance.yahoo.com* USA News
Go daddy https://email12.godaddy.com* USA Email/Communications
tSheets https://ilweb15.tsheets.com/ajax USA Productivity
Amazon https://music-xray-service.amazon.com/ USA Music
SpotX https://*spotxchange.com* USA Online Advertising
Dropbox https://*dropbox.com* USA Web Services
Amazon https://fls-na.amazon.com/1/bit-reporter/1/OE USA Web Services
Microsoft https://t.urs.microsoft.com/urstelemetry.asmx* USA Web Services
Google, LLC https://photos.google.com* USA Video/Image Hosting
Google, LLC https://mail.google.com/cloudsearch* USA Email/Communications
Google, LLC https://hangouts.google.com/webchat/* USA Email/Communications
Facebook https://*facebook* USA Social networking
Youtube , LLC https://*youtube* USA Video/Image Hosting
Twitter https://*twitter* USA Social networking
Instagram https://*instagram* USA Social networking
Flickr https://*flickr.com* USA Video/Image Hosting
Linkedin https://*linkedin.com* USA Social networking
Conviva https://*conviva.com* USA Digital Analytics
Google, LLC https://www.google-analytics.com* USA Digital Analytics
Google, LLC https://safebrowsing.google.com/* USA Web Services
Google, LLC https://translate.google.com/* USA Email/Communications
Google, LLC https://*clients1.google.com* USA Web Services
Google, LLC https://*clients2.google.com* USA Web Services
Google, LLC https://*clients4.google.com* USA Web Services
Google, LLC https://*clients5.google.com* USA Web Services
Google, LLC https://*clients6.google.com* USA Web Services
Google, LLC https://ogs.google.com/u/0/_/notifications/count USA Web Services
Google, LLC https://*googleapis.com* USA Web Services
Google, LLC https://*talkgadget.google.com* USA Email/Communications
Google, LLC https://0.client-channel.google.com* USA Web Services
Google, LLC https://plus.google.com/u/* USA Social networking
Google, LLC https://play.google.com/* USA Computer Software
Google, LLC https://drive.google.com/* USA Productivity
Google, LLC https://docs.google.com/* USA Productivity
Google, LLC https://notifications.google.com/u* USA Productivity
Google, LLC https://*client-channel.google.com* USA Web Services
Google, LLC https://apis.google.com* USA Web Services
Google, LLC https://calendar.google.com* USA Productivity
Etsy https://*etsy.com* USA E-Commerce
Issu https://*issuu.com* USA News
Amazon https://music.amazon.com* USA Music
Yahoo https://comet.yahoo.com/comet USA Online Advertising
Yahoo https://pr.comet.yahoo.com/comet USA Online Advertising
Apple https://p54-bookmarks.icloud.com* USA Web Storage
Grendel CRM https://www.grendelonline.com* USA Financial Technology
Yelp https://www.yelp.com* USA Travel
LiveVol https://secure.livevol.com* USA Financial Technology
Google, LLC https://www.google-analytics.com/collect USA Digital Analytics
Amazon https://fls-na.amazon.com/1/batch/1/OE/ USA Web Services
Toys”R”Us https://edq.toysrus.com/* USA E-Commerce
tSheets https://azweb16.tsheets.com/ajax* USA Productivity
Google, LLC https://beacons.gvt2.com/domainreliability/upload* USA Web Services
Pandora Radio https://www.pandora.com* USA Music
Google, LLC https://www.google.com* USA Search Engine
Microsoft https://urs.microsoft.com/urs.asmx* USA Web Services
Yahoo https://udc.yahoo.com/v2/public* USA Web Services
Full Story https://r.fullstory.com/rec/* USA Digital Analytics
Mozilla https://incoming.telemetry.mozilla.org* USA Web services
Microsoft https://msub03.manage.microsoft.com/ AdminAPIWebService/adminapi.svc/silverlightXml USA Web Services
Full Slate https://app.fullslate.com/admin/journal/commit?poll USA Productivity
Optimizely https://logx.optimizely.com/log/event USA Digital Analytics
Expedia https://www.expedia.com/api/datacapture/track USA Travel
  https://s.acexedge.com*    
Scanmarket https://*scanmarket.com* USA Computer Software
Intuit Inc. https://*intuit.com* USA Financial Technology
  https://*crdui.com*    
Yahoo https://www.yahoo.com* USA News



Source link
lol

Panda’s target list includes two productivity web applications that use Ajax. This is notable because unlike web applications that execute completely on a server, Ajax applications utilize functions across both the client and the server. This extends the possible attack surface, and allows for more opportunities to potentially inject malicious code, steal sessions/authentication tokens, or…

Leave a Reply

Your email address will not be published. Required fields are marked *