Scope and Applicability: Stockbroker | Trading Members | Clearing Members.
With reference to our circular no 20221118-60 dated November 18,2018, regarding delay in settlements, noticed due to malware in CDSL. In regard to the malware detection at CDSL, members are hereby notified and requested to undertake appropriate actions as applicable to their environment. A brief description and immediate steps to be taken are mentioned below.
1) Following are the IOC’s which should be validated and update in your anti-virus / anti-malware / firewall and other security devices.
Malicious Hash Value
MD5
|
SHA
|
cfcc2ec7f91c125b10d2eccd5f69db65
|
9fd79779d8d8644e901997f864bf8d95fdd6bdb138c61829d6bdb80a2b27abd6
|
951dce6731c5f3d2dae570597bc19d59
|
eee8150ba918a7ed099074a1b87a97b3c7f6648a763eedd7096acf16f40e0a73
|
ae59e82ddd8d9840b79bfddbe4034462
|
b02d57f1c4f7f233044a56fdc57c89b6cc3661479dc cc3b4cfa1f6f9d20cd893
|
bf4d4f36c34461c6605b42c456fa4492
|
8b26b750d84c2b825e31b1150751ec7e76fb3ec7270 431bc3cf15e61276ec0eb
|
56c9c8f181803ece490087ebe053ef72
|
12eb4ca3ec5b7c650123c9053ea513260d802aa524 86b7512b53fb7e86ec876b
|
f9ab1c6ad6e788686509d5abedfd1001
|
a56b41a6023f828cccaaef470874571d169fdb8f683a 75edd430fbd31a2c3f6e
|
5e54923e6dc9508ae25fb6148d5b2e55
|
f582e67056ca8c8ffb5d080c82c7aa587c3101cc7a87959fc7e8738fa1c61a87
|
bf331800dbb46bb32a8ac89e4543cafa
|
|
ad444dcdadfe5ba7901ec58be714cf57
|
|
1690f558aa93267b8bcd14c1d5b9ce34
|
|
13b12238e3a44bcdf89a7686e7179e16
|
|
3ee21dbaa37d0048e2e174cb41a664d6
|
|
98991e46004f13a4cfe8adbbebab473d
|
|
2) Malicious Command and Control (C&C) IP Subnet –
5[.]44[.]42[.]0[/]24
188[.]34[.]187[.]110
v5sqpe[.]dotm
Below are some precautionary measures for adherence.
a) In order to prevent infection, users and organizations are advised to apply patches to Windows operating systems and Microsoft Office products
b) Update firmware/patches for all network components and network products
c) Ensure anti-virus signatures are updated on all assets.
d) Block any suspicious IP addresses on firewall
e) Block USB usage
f) Ensure IPS/IDS signatures are updated.
g) Ensure Email Gateway solutions has all relevant updates for detecting possible mails that may bring Trojans/malicious content in the environment. Also block sensitive file extensions such as “.exe”, “.rtf”, “.vbs”, and “.js” etc. , including macros - at the perimeter level
h) Make the users aware about this threat and ensure that users do not download any suspicious attachments and/or browse suspicious/malicious links
i) Maintain a backup of critical data and store it offline and/or at a different location
j) 24X7 SOC Monitoring.
Disclaimer:
a) The information contained in this notice has been extracted from trusted sources (Internal / External) and has been published as a guidance/awareness to members. As the future course of events with regards to this threat are not known, members are advised to keep a close watch on their systems to identify, timely detection and remediation of such threat.
b) Members shall act upon this notice at their own discretion after conducting appropriate impact/risk analysis to their specific environment.
c) Please note that the other exploit kits are also widely in circulation and available for download for free on the Internet and there are possibilities of attack vectors other than this threat which may exist/emanate. It is critical to perform a self-assessment against such zero-days/ exploit kits released in the wild.
Members are requested to take note of the above and take precautionary measures.
For and on behalf
Shri. Shivkumar Pandey
Group Chief Information Security Officer |