Virtualization Technology News and Information
Risepro Stealer Malware Campaign's Rising, Plus: the Top C2 Generators to Filter and Block

"Risepro Malware Campaign On The Rise" from HYAS provides an analysis of the active threat campaign and recommended steps to prevent it, and also details the week's most active C2 traffic generators to filter and block.

David Brunsdon, HYAS Threat Intelligence Security Engineer, said: "We saw a surge in activity related to Risepro malware, particularly targeting IP address - its C2 ‘mother ship.' This signifies a concerning development in the cyber threat landscape, as Risepro, akin to StealC, is a notorious form of stealer malware designed to exfiltrate sensitive information from compromised systems.

Risepro malware communicates with its command-and-control (C2) server located at ((((, which indicates an established infrastructure for remote control and data exfiltration. The use of non-standard HTTP ports may enable it to evade detection.

Threat Actor Details:

  • Actor IP: (((( (France)
  • Actor Device User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
  • AppleWebKit/537.36 (KHTML, like Gecko) Chrome/ Safari/537.36
  • The actor's location in France indicates potential attribution, although it's important to note that threat actors often utilize proxy servers or compromised systems to obfuscate their true origin.

Who's hunting, and who's targeted? The team used the HYAS Insight threat intelligence and investigation platform to identify the actor's IP and user agent when the malware sought to access its C2 interface, which aids in tracking and potentially attributing the actor behind the campaign, and can also help security teams determine whether their organization is a target.

Assessing Risepro Risks:

  • Data Compromise - Risepro malware is fine-tuned for stealing sensitive data, including credentials, financial information, and personal identifiers. This compromised data can be monetized through various means, including sale on underground forums or exploitation for fraudulent activities.
  • Operational Disruption - The infiltration of Risepro malware into organizational networks can lead to operational disruptions, including system slowdowns, service outages, and loss of critical data - each scenario carries financial and reputational risks.
  • Intellectual Property Theft - Organizations storing proprietary information are of course always at risk of intellectual property theft. Risepro malware is deployed to exfiltrate intellectual property, trade secrets, and other confidential data.

Mitigation Strategies:

Network Monitoring: Implementing robust network monitoring solutions can detect and analyze suspicious network traffic, especially to known malicious IP addresses like ((( It's advisable to  use intrusion detection systems (IDS) and intrusion prevention systems (IPS) to identify and block malicious activities associated with Risepro malware.

Endpoint Protection: Deploy advanced endpoint protection solutions capable of detecting and mitigating malware, including fileless and polymorphic variants. As a best practice, conduct regular endpoint security assessments and ensure all systems are as up-to-date as possible with the latest security patches and updates.

Threat Intelligence Sharing:  Best practices encourage collaborating with threat intelligence sharing platforms and industry peers to exchange information on emerging threats, including indicators of compromise (IOCs) associated with Risepro malware.

As always, security awareness training for employees on risks associated with phishing attacks, malware infections, and social engineering tactics used by threat actors is essential.

The Risepro malware campaign poses a significant threat to organizations worldwide, with the potential for data theft, operational disruption, and intellectual property loss. By leveraging threat intelligence, implementing robust security measures, and fostering a culture of cybersecurity awareness, organizations can effectively mitigate the risks posed by Risepro malware and safeguard their digital assets against evolving cyber threats. Ongoing monitoring and proactive defense strategies are essential to stay ahead of adversaries in the ever-changing cybersecurity landscape.

Live Malware Detonation: HYAS is offering a first-hand look at malware detonation on April 30th at 10:00am PST / 1:00pm EST. To join the "Cyber Surveillance: Tracking New Malware Threats" demonstration and briefing, register here:

The Most Active ASNs Generating C2 - Filter & Block

The top five ASNs actively generating C2 traffic reveal a diverse range of cybersecurity threats, including malware activity, network compromise, and potential criminal control. Effective threat mitigation requires proactive measures, collaboration with industry peers and cybersecurity experts, and continuous monitoring of network infrastructure for signs of malicious activity.

ASN 8968 - BT Italia S.p.A (Albacom)

ASN 8968, operated by BT Italia S.p.A (formerly known as Albacom), is a telecommunications company serving the Italian market. Despite its legitimate business operations, the ASN exhibits a concerning trend of significant malware activity within its network.

Analysis: The global internet area covered by ASN 8968 indicates a broad reach, making it an attractive target for cybercriminals seeking to exploit vulnerabilities in network infrastructure. The presence of malware activity suggests potential security weaknesses within the network, necessitating robust security measures to mitigate risks effectively.


  • Implement strict security measures, including intrusion detection and prevention systems, to detect and block malicious activity within the network.
  • Conduct regular security audits and penetration testing to identify and remediate vulnerabilities.
  • Collaborate with cybersecurity experts to develop tailored threat mitigation strategies and enhance network security posture.

2. ASN 9318 - SK Broadband Co Ltd

ASN 9318 is assigned to SK Broadband Co Ltd, a major ISP located in South Korea. The high frequency of malware activity associated with this ASN indicates potential security challenges within its network infrastructure.

Analysis: Malware activity originating from ASN 9318 may indicate compromised systems within the network or serve as a transit point for malicious traffic.Prompt investigation and corrective actions, such as abuse reports to the ISP and network filtering, are necessary to curb the spread of malware and protect network integrity.


  • Conduct thorough investigation to identify the source of malware activity and remediate compromised systems.
  • Establish proactive monitoring mechanisms to detect and respond to anomalous network behavior.
  • Collaborate with industry peers and cybersecurity experts to share threat intelligence and enhance network defense capabilities.

ASN 215789 - Karina Rashkovska (Ukraine)

ASN 215789 is a small BGP network located in Ukraine, allocated earlier this year and associated with "Karina Rashkovska." Recent observations indicate a significant uptick in Risepro malware activity within its allocated IPs.

Analysis: The surge in Risepro malware activity suggests potential security vulnerabilities or compromises within ASN 215789's network infrastructure. Immediate action is required to investigate and remediate the malware activity to prevent further harm and protect network integrity.


  • Conduct thorough forensic analysis to identify the root cause of the malware activity and remediate compromised systems.
  • Enhance network security measures, including access controls and traffic filtering, to mitigate future malware threats.
  • Collaborate with law enforcement and cybersecurity experts to investigate the source of malicious activity and take legal action against threat actors.

ASN 216309 - TNSecurity (Germany/Russia)

ASN 216309 is associated with TNSecurity, exhibiting an unusually high level of malware activity. However, warns that it should not be routed or peered at due to control by cybercriminals. Conflicting reports suggest origins in Germany and Russia.

Analysis: The warning from indicates that ASN 216309 is under the control of cybercriminals, posing a significant threat to internet users and organizations. Blocking all IP communications with this ASN is recommended to mitigate the risk of malware infection and data compromise.


  • Implement strict network filtering rules to block all traffic originating from ASN 216309.
  • Collaborate with internet service providers and cybersecurity organizations to share threat intelligence and coordinate mitigation efforts.
  • Monitor network traffic for any signs of malicious activity and take immediate action to isolate and mitigate threats.

ASN 210352 - AEZA Group LLC (Russia)

ASN 210352 is allocated to AEZA Group LLC, registered in Russia. Malware detonations of gcleaner and redline have primarily targeted specific IPs for C2 communication, indicating a coordinated cyber threat campaign.

Analysis: The use of gcleaner as a loader for redline stealer malware suggests a sophisticated and potentially organized cybercriminal operation. The targeting of specific IPs for C2 communication indicates a deliberate effort to compromise systems and exfiltrate sensitive data.


  • Conduct thorough analysis of gcleaner and redline malware variants to understand their capabilities and propagation methods.
  • Implement network security measures, including traffic filtering and intrusion detection systems, to detect and block C2 communication attempts.
  • Enhance endpoint security controls to detect and mitigate malware infections on affected systems.

To sign up for the HYAS Insight intel feed, visit

Published Monday, April 22, 2024 12:46 PM by David Marshall
Filed under:
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
<April 2024>