viralamo

Menu
  • Technology
  • Science
  • Money
  • Culturs
  • Trending
  • Video

Subscribe To Our Website To Receive The Last Stories

Join Us Now For Free
Home
Technology
Botnet that hid for 18 months boasted some of the coolest tradecraft ever
Technology

Botnet that hid for 18 months boasted some of the coolest tradecraft ever

03/05/2022

Botnet that hid for 18 months boasted some of the coolest tradecraft ever

It’s not the kind of security discovery that happens often. A previously unknown hacker group used a novel backdoor, top-notch trade craft, and software engineering to create an espionage botnet that was largely invisible in many victim networks.

The group, which security firm Mandiant is calling UNC3524, has spent the past 18 months burrowing into victims’ networks with unusual stealth. In cases where the group is ejected, it wastes no time reinfecting the victim environment and picking up where things left off. There are many keys to its stealth, including:

  • the use of a unique backdoor Mandiant calls Quietexit, which runs on load balancers, wireless access point controllers, and other types of IoT devices that don’t support antivirus or endpoint detection. This makes detection through traditional means difficult
  • customized versions of the backdoor that use file names and creation dates that are similar to legitimate files used on a specific infected device
  • a live-off-the-land approach that favors common Windows programming interfaces and tools over custom code with the goal of leaving as light a footprint as possible
  • an unusual way a second-stage backdoor connects to attacker-controlled infrastructure by, in essence, acting as a TLS-encrypted server that proxies data through the SOCKS protocol

A tunneling fetish with SOCKS

In a post, Mandiant researchers Doug Bienstock, Melissa Derr, Josh Madeley, Tyler McLellan, and Chris Gardner wrote:

Throughout their operations, the threat actor demonstrated sophisticated operational security that we see only a small number of threat actors demonstrate. The threat actor evaded detection by operating from devices in the victim environment’s blind spots, including servers running uncommon versions of Linux and network appliances running opaque OSes. These devices and appliances were running versions of operating systems that were unsupported by agent-based security tools, and often had an expected level of network traffic that allowed the attackers to blend in. The threat actor’s use of the QUIETEXIT tunneler allowed them to largely live off the land, without the need to bring in additional tools, further reducing the opportunity for detection. This allowed UNC3524 to remain undetected in victim environments for, in some cases, upwards of 18 months.

The SOCKS tunnel allowed the hackers to effectively connect their control servers into a victim’s network where they could then execute tools without leaving traces on any of the victim computers.

Advertisement

Mandiant

A secondary backdoor provided an alternate means of access to infected networks. It was based on a version of the legitimate reGeorg webshell that had been heavily obfuscated to make detection harder. The threat actor used it in the event the primary backdoor stopped working. The researchers explained:

Once inside the victim environment, the threat actor spent time to identify web servers in the victim environment and ensure they found one that was Internet accessible before copying REGEORG to it. They also took care to name the file so that it blended in with the application running on the compromised server. Mandiant also observed instances where UNC3452 used timestomping [referring to a tool available here for deleting or modifying timestamp-related information on files] to alter the Standard Information timestamps of the REGEORG web shell to match other files in the same directory.

One of the ways the hackers maintain a low profile is by favoring standard Windows protocols over malware to move laterally. To move to systems of interest, UNC3524 used a customized version of WMIEXEC, a tool that uses Windows Management Instrumentation to establish a shell on the remote system.

Eventually, Quietexit executes its final objective: accessing email accounts of executives and IT personnel in hopes of obtaining documents related to things like corporate development, mergers and acquisitions, and large financial transactions.

“Once UNC3524 successfully obtained privileged credentials to the victim’s mail environment, they began making Exchange Web Services (EWS) API requests to either the on-premises Microsoft Exchange or Microsoft 365 Exchange Online environment,” the Mandiant researchers wrote. “In each of the UNC3524 victim environments, the threat actor would target a subset of mailboxes….”

Source link

Share
Tweet
Pinterest
Linkedin
Stumble
Google+
Email
Prev Article
Next Article

Related Articles

Antares Gaming and Ultimate Gaming League team up to mix pro gamers and NFL stars in esports matches
Ultimate Gaming League and Antares Gaming have teamed up to …

Antares Gaming and Ultimate Gaming League team up to mix pro gamers and NFL stars in esports matches

Intel grew revenues 20% to $19.7 billion in Q2 2020, but key manufacturing upgrade delayed
Intel reported that it grew revenues 20% to $19.7 billion …

Intel grew revenues 20% to $19.7 billion in Q2 2020, but key manufacturing upgrade delayed

Leave a Reply Cancel reply

Find us on Facebook

Related Posts

  • Rally unveils digital currency with soccer star Keisuke Honda, esports team Gen.G, and more
    Rally unveils digital currency with soccer star …
    22/10/2020
  • Philips' SpeechAir sound recorder runs on Android
    25/04/2016
  • GamesBeat Rewind 2019: The year’s biggest trends … and where they’re heading in 2020
    GamesBeat Rewind 2019: The year’s biggest trends …
    24/12/2019
  • Twitch source code, creator earnings exposed in 125GB leak
    Twitch source code, creator earnings exposed in …
    06/10/2021
  • Uber drives up carpool pricing, Chicago data reveals
    Uber drives up carpool pricing, Chicago data …
    27/11/2019

Popular Posts

  • Ten Things That Made the 1990s – …
    25/05/2022 0
  • 10 Unsettling Unsolved Cold Cases – Listverse
    26/04/2022 0
  • Microsoft finds Linux desktop flaw that gives root to untrusted users
    Microsoft finds Linux desktop flaw that gives …
    26/04/2022 0
  • 10 Autobiographical Songs That Really Tell a …
    27/04/2022 0
  • 10 Times Going to the Toilet Went …
    27/04/2022 0

viralamo

Pages

  • Contact Us
  • Privacy Policy
Copyright © 2022 viralamo
Theme by MyThemeShop.com

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh