CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

FAQ: Pony Malware Payload Discovery

Our team's discovery of the spoils of yet another instance of Pony 1.9 has kept us busy the past couple of days. We've enjoyed explaining our discovery to journalists and trying our best to answer the questions that arise over social networks and email with each publication of a story.

A lot of those questions tend to be similar. Since we can't possibly respond to each and every one, we thought we'd collect some information that answers the most common questions for anyone who's interested.

Will Trustwave be releasing the data set?
Trustwave has decided that in the majority of cases, we will only release sub-sets of the data and only to certain authorized individuals employed by web sites with domain names included in the data set. Only user-names associated with an authorized individual's domain will be disclosed and, again, only to an authorized representative. We've received a number of requests for the data set and appreciate your patience as we work to respond as soon as we can.


Does the discovery of these compromised credentials suggest that any of the mentioned web sites are insecure?
No. The Pony malware infected end-users' computers and then attempted to capture those users' credentials. Any of the web sites mentioned in relation to our discovery were not compromised nor the cause of this attack.

How can a user protect against Pony malware?
It's important to note that Pony itself is not new and many anti-virus products already include signatures to protect against it. The risk posed by Pony is comparable to other known malware threats and basic data security principles apply in defending against it:

  1. Keep your web browser and any supporting software (such as Adobe Acrobat, Flash and Java) up-to-date and patched
  2. Use anti-virus software and keep it updated
  3. Avoid using the same password at multiple sites
  4. For corporate users, products that monitor web traffic can help prevent exploitation and infection and alert IT staff when an infected machine attempts to communicate to its command and control server (for example, Trustwave Secure Web Gateway).

Read "Two million stolen passwords: How to protect yourself" on the Trustwave website for more information about how end-users can protect themselves.

Where was/were the attacker/attackers located?
We don't know at this time. All we can say is that we found a server in the Netherlands that contained a library of credentials. That fact alone does nothing to confirm the location of the attacker or attackers.

Where are the victims located?
For 96 percent of the victims, we cannot confirm their geographic location because the attacker used a reverse proxy that obfuscates origination and termination points.

Were insufficiently complex passwords a contributor to this attack's success?
Not necessarily. This instance of Pony collected passwords by looking for stored passwords in users' browsers, email clients and other applications and by monitoring web traffic to identify when a user was logging into a service and attempting to capture the password at that time. In this case, regardless of a password's complexity, it could have been captured. Of course, using sufficiently complex passwords is always a good security practice. What we hope people will also learn from this particular incident is the importance of not re-using passwords across multiple accounts. Because if one of your accounts is compromised, with a little work, any other account that uses the same password could potentially be compromised.

Where can I get a hash of the Pony 1.9 malware?
A hash, and more information about the malware, has been available here, care of the VirusTotal service, a subsidiary of Google, since June 2013. ***UPDATE December 9, 2013: The instance of Pony 1.9 we've linked to here was related to a different botnet controller we discovered in June 2013. We apologize for any confusion.***

We hope these answers provided you some additional information to help understand our discovery and our plans for handling the discovered data set.

Latest SpiderLabs Blogs

Fake Dialog Boxes to Make Malware More Convincing

Let’s explore how SpiderLabs created and incorporated user prompts, specifically Windows dialog boxes into its malware loader to make it more convincing to phishing targets during a Red Team...

Read More

The Secret Cipher: Modern Data Loss Prevention Solutions

This is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here. Far too many organizations place Data Loss Prevention (DLP) and Data...

Read More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway

Overview A command injection vulnerability has been discovered in the GlobalProtect feature within Palo Alto Networks PAN-OS software for specific versions that have distinct feature configurations...

Read More