Common Information
Type | Value |
---|---|
Value |
EXOTIC LILY |
Category | Actor |
Type | Threat-Actor |
Misp Type | Cluster |
Description | EXOTIC LILY is a resourceful, financially motivated group whose activities appear to be closely linked with data exfiltration and deployment of human-operated ransomware such as Conti and Diavol. In early September 2021, the group has been obeserved exploiting a 0day in Microsoft MSHTML (CVE-2021-40444). Investigation lead researchers to believe that they are an Initial Access Broker (IAB) who appear to be working with the Russian cyber crime gang known as FIN12 (Mandiant, FireEye) / WIZARD SPIDER (CrowdStrike). This threat actor deploys tactics, techniques and procedures (TTPs) that are traditionally associated with more targeted attacks, like spoofing companies and employees as a means of gaining trust of a targeted organization through email campaigns that are believed to be sent by real human operators using little-to-no automation. Additionally and rather uniquely, they leverage legitimate file-sharing services like WeTransfer, TransferNow and OneDrive to deliver the payload, namely BUMBLEEBEE and BAZARLOADER, further evading detection mechanisms. This level of human-interaction is rather unusual for cyber crime groups focused on mass scale operations. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-08-13 | 21 | Common Malware Loaders - ReliaQuest | ||
Details | Website | 2024-08-12 | 7 | Bumblebee Loader | ||
Details | Website | 2023-09-15 | 11 | Tracking Adversaries: Akira, another descendent of Conti | ||
Details | Website | 2023-03-15 | 0 | Email Threats: HTML Smuggling on the Dark Web - ReliaQuest | ||
Details | Website | 2023-03-01 | 0 | Growing Cybercrime Outsourcing Model: Initial Access Brokers | ||
Details | Website | 2022-12-16 | 4 | The DPRK delicate sound of cyber | ||
Details | Website | 2022-11-17 | 8 | The Continuity of Conti | ||
Details | Website | 2022-11-07 | 8 | Top Critical Vulnerabilities Used by Ransomware Groups -SOCRadar | ||
Details | Website | 2022-10-03 | 0 | Bumblebee Malware Loader's Payloads Significantly Vary by Victim System | ||
Details | Website | 2022-09-05 | 33 | From BumbleBee to Cobalt Strike: Steps of a BumbleBee intrusion - Darktrace Blog | ||
Details | Website | 2022-08-25 | 4 | Oktapus campaign. Exotic Lily's Bumblebee Loader. DNS traffic insights. DHS shutters disinfo board. Hybrid war at six months. | ||
Details | Website | 2022-08-24 | 10 | Bumblebee Malware: Deep Instinct Prevents Attack Pre-Execution | Deep Instinct | ||
Details | Website | 2022-08-18 | 0 | Hackers Using Bumblebee Loader to Compromise Active Directory Services | ||
Details | Website | 2022-08-08 | 143 | BumbleBee Roasts Its Way to Domain Admin | ||
Details | Website | 2022-08-03 | 16 | Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware | ||
Details | Website | 2022-04-28 | 1 | New Bumblebee malware replaces Conti's BazarLoader in cyberattacks | ||
Details | Website | 2022-04-14 | 34 | Orion Threat Alert: Flight of the BumbleBee - Cynet | ||
Details | Website | 2022-03-17 | 33 | Exposing initial access broker with ties to Conti | ||
Details | Website | 2022-03-15 | 619 | What Wicked Webs We Un-weave - Prevailion | ||
Details | Website | 2022-01-01 | 2 | Cloudzy With a Chance of Global Cybercrime | Cyware Hacker News | ||
Details | Website | 2021-09-16 | 5 | Windows MSHTML 0-Day Exploited to Deploy Cobalt Strike Beacon in Targeted Attacks | ||
Details | Website | 2021-09-15 | 11 | Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability - Microsoft Security Blog | ||
Details | Website | 2021-01-01 | 0 | New Email Threats by Exotic Lily | Cyware Hacker News |