Viry a Červi

British Airways fined £20m for Magecart hack that exposed 400k folks' credit card details to crooks

The Register - Anti-Virus - 16 Říjen, 2020 - 13:15
Airline was saving domain admin creds and card details alike in plaintext

British Airways is to pay a £20m data protection fine after its 2018 Magecart hack – even though the Information Commissioner’s Office discovered the airline had been saving credit card details in plain text since 2015.…

Kategorie: Viry a Červi

Critical Magento Holes Open Online Shops to Code Execution - 15 Říjen, 2020 - 21:59
Adobe says the two critical flaws (CVE-2020-24407 and CVE-2020-24400) could allow arbitrary code execution as well as read or write access to the database.
Kategorie: Viry a Červi

FIFA 21 Blockbuster Release Gives Fraudsters an Open Field for Theft - 15 Říjen, 2020 - 21:08
In-game features of the just-released FIFA 21 title give scammers easy access its vast audience.
Kategorie: Viry a Červi

One alleged Dridex money-launderer set for US extradition, beams UK's National Crime Agency

The Register - Anti-Virus - 15 Říjen, 2020 - 20:28
They nicked six alleged perps last year but only one was charged

Britain’s National Crime Agency arrested six men in London on suspicion of laundering “tens of millions” for the Trickbot and Dridex banking malware gangs, the not-quite-police agency declared today.…

Kategorie: Viry a Červi

COVID-19 security tips: Ensure you sack your staff without leaving their IT access enabled, says Secureworks

The Register - Anti-Virus - 15 Říjen, 2020 - 18:30
Infosec biz issues mildly off-the-wall guidance for incident responders

The global switch to remote working in early 2020 gave hackers a whole new set of juicy ransomware targets.…

Kategorie: Viry a Červi

Zoom Rolls Out End-to-End Encryption After Setbacks - 15 Říjen, 2020 - 16:12
After backlash over false marketing around its encryption policies, Zoom will finally roll out end-to-end encryption next week.
Kategorie: Viry a Červi

Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts - 15 Říjen, 2020 - 15:46
Companies that use Broadvoice's cloud-based VoIP platform may find their patients, customers, suppliers and partners to be impacted by a massive data exposure.
Kategorie: Viry a Červi

Security much? Twitter should have had a CISO to prevent Bitcoin hack, says US state financial body

The Register - Anti-Virus - 15 Říjen, 2020 - 15:15
Plus: Platform 'censors' US newspaper and triggers ordure tsunami

American financial regulators in New York have demanded Twitter be subject to harsher rules following the July hacks of prominent users' accounts – as CEO Jack Dorsey furiously backpedals after his website censored a news article from a US newspaper.…

Kategorie: Viry a Červi

Barnes & Noble Hack: A Reading List for Phishers and Crooks - 15 Říjen, 2020 - 14:55
Customers' lists of book purchases along with email addresses and more could have been exposed during a (ransomware?) attack -- and that's a problem.
Kategorie: Viry a Červi

Carnival Corp. Ransomware Attack Affects Three Cruise Lines - 15 Říjen, 2020 - 13:08
Hackers accessed personal information of guests, employees and crew for Carnival Cruise, Holland America and Seabourn as well as casino operations.
Kategorie: Viry a Červi

IAmTheKing and the SlothfulMedia malware family

Kaspersky Securelist - 15 Říjen, 2020 - 11:00

On October 1, 2020, the DHS CISA agency released information about a malware family called SlothfulMedia, which they attribute to a sophisticated threat actor. We have been tracking this set of activity through our private reporting service, and we would like to provide the community with additional context.

In June 2018, we published the first report on a new cluster of activities that we named IAmTheKing, based on malware strings discovered in a malware sample from an unknown family. Amusingly, other strings present inside of it invited “kapasiky antivirus” to “leave [them] alone”.

Over time, we identified three different malware families used by this threat actor, one of which was SlothfulMedia. The aim of this blog post is to introduce all of them and to provide data we have been able to gather about the attackers’ interests.

IAmTheKing’s toolset KingOfHearts

This C++ backdoor, which contains the character strings discussed above, is the first element of this toolset we encountered. It comes in EXE or DLL variants, and we have been able to find traces of this family dating back to 2014. We believe it was distributed through spear-phishing e-mails containing malicious Word documents, but have been unable to obtain samples of these. The infection process relies on a PowerShell script that downloads from a remote server a base64-encoded payload hidden in an image file.

In terms of capabilities, KingOfHearts offers nothing more than the basic features you would expect from a backdoor:

  • Arbitrary command execution
  • File system manipulation: listing drives and files, deleting, uploading and downloading data, etc.
  • Listing of running processes with the option to terminate any of them
  • Capturing screenshots using a custom standalone utility, described below

Rather than developing sophisticated features, the malware developers instead opted to include anti-debugging and virtualization detection routines. Communications with the C2 server take place over HTTP(S), implemented with the wsdlpull open source library. The backdoor looks for new orders every second by sending a heartbeat to the C2 (the “HEART” command, hence the name).

We identified two main development branches: one of them sends url-encoded POST data, and the other one sends JSON objects. Both have been used concurrently and otherwise display the same capabilities: we cannot say what motivates attackers to choose the one or the other.


Following our initial discovery, we identified another, more widespread malware family linked to the same threat actor. While it does not contain the anti-analysis countermeasures of its cousin, the rest of its features and overall design decisions map to King of Hearts almost one to one. QueenOfHearts seems to have appeared somewhere in 2017. It is the family designated as PowerPool by our esteemed colleagues from ESET.

QueenOfHearts also interacts with its C2 server over HTTP. It sends simple GET requests containing a backdoor identifier and optional victim machine information, then reads orders located in the cookie header of the reply. Orders come in the form of two-letter codes (e.g.: “xe” to list drives) which tend to vary between samples. As of today, this family is still in active development, and we have observed code refactoring as well as incremental upgrades over 2020. For instance, earlier backdoor responses were sent as base64-encoded payloads in POST requests. They are now compressed beforehand, and additionally supplied through the cookie header.


In the course of our investigations, we discovered another malware strain that appeared to fill the same role as QueenOfHearts. This C++ backdoor also offers similar features as KingOfHearts, as well as the ability to execute arbitrary Powershell scripts. One minute difference is that in this one, screenshot capture capabilities are embedded directly into the program instead of being handled by a separate utility.

It contains a number of links to QueenOfHearts, namely:

  • Identical hardcoded file names can be found in both malware strains.
  • We observed a number of command and control servers concurrently handling traffic originating from both families.
  • QueenOfHearts and QueenOfClubs were on occasion deployed simultaneously on infected machines.

However, it is also our belief that they originate from two separate codebases, although their authors shared common development practices.

The malware designated as SlothfulMedia by US-CERT is an older variant of this family.


Astute readers will notice that we did not discuss persistence mechanisms for any of the two aforementioned families. In fact, both of them expect to run in an environment that has already been prepared for them. JackOfHearts is the dropper associated with QueenOfHearts: its role is to write the malware somewhere on the disk (for instance: %AppData%\mediaplayer.exe) and create a Windows service pointing to it as well as a shortcut in the startup folder that is also used to immediately launch QueenOfHearts. This shortcut is the one that contains references to a “david” user highlighted by the DHS CISA report.

Finally, the dropper creates a self-deletion utility in the %TEMP% folder to remove itself from the filesystem.

As of 2020, JackOfHearts is still used to deploy QueenOfHearts.

Screenshot capture utility

A simple program that captures screenshots and saves them as “MyScreen.jpg”. It is sometimes embedded directly inside QueenOfHearts but has also been seen in conjunction with KingOfHearts.

Powershell backdoor

In addition to these malware families, IAmTheKing also leverages an extensive arsenal of Powershell scripts. Recent infection vectors have involved archives sent over e-mail which contain LNK files masquerading as Word documents. Clicking on these links results in the execution of a Powershell backdoor that hides inside custom Windows event logs and retrieves additional scripts over HTTPS, DNS or even POP3S.

The C2 server provides PNG files, which contain additional Powershell scripts hidden through steganography. The code performing this operation comes from the open-source project Invoke-PSImage. This allows operators to stage components on the victim machine, such as:

  • An information-stealing utility written in Powershell that collects all documents found on the victim’s machine and sends them in password-protected RAR archives. These archives are sent back to the attackers over e-mail.
  • A command execution utility which obtains orders from DNS TXT records. The code to accomplish this is derived from another open-source project, Nishang.
  • An information-gathering utility tasked with collecting running processes, disk drives and installed programs with WMI queries. It may also steal passwords saved by the Chrome browser.
  • A spreader script that lists computers connected to the domain, and tries to open a share on each of them to copy a binary and create a remote scheduled task.
  • A home-made keylogger.
  • QueenOfHearts, one of the malware families described above.
Lateral movement

Once the attackers have gained access to a machine through any of the tools described above, they leverage well-known security testing programs to compromise additional machines on the network. In particular, we found evidence of the following actions on the target:

  • Microsoft’s SysInternals suite: ProcDump to dump the exe process and PsExec to run commands on remote hosts.
  • LaZagne and Mimikatz to collect credentials on infected machines.
  • Built-in networking utilities such as ipconfig.exe, net.exe and ping.exe, etc. for network discovery.

Until very recently, IAmTheKing has focused exclusively on collecting intelligence from high-profile Russian entities. Victims include government bodies and defense contractors, public agencies for development, universities and companies in the energy sector. This threat actor’s geographic area of interest is so specific that KingOfHearts, QueenOfHearts and even recent versions of JackOfHearts include code referring specifically to the Russian language character set:

In 2020, we discovered rare incidents involving IAmTheKing in central Asian and Eastern European countries. The DHS CISA also reports activity in Ukraine and Malaysia. Our data however indicates that Russia overwhelmingly remains IAmTheKing’s primary area of operation.

There is currently debate within our team on whether this constitutes a slight shift in this threat actor’s targeting, or if its toolset is now shared with other groups. We are unable to provide a definitive answer to this question at this juncture.


While the public has only recently discovered this set of activity, IAmTheKing has been very active for a few years. Considering the type of organizations that cybercriminals have been targeting, we felt that there was little public interest in raising awareness about this group beyond our trusted circle of industry partners. However, now that researchers have started investigating this threat actor, we want to assist the community as much as possible by providing this brief summary of our knowledge of IAmTheKing.

Based on the type of information IAmTheKing is after, we believe that it is state-sponsored. Its toolset is rapidly evolving, and it is not afraid to experiment with non-standard communications channels. The group is characterized by a mastery of traditional pentesting methodologies and a solid command of Powershell. Data available to us indicates that it has achieved operational success on numerous occasions.

Kaspersky will keep investigating incidents related to this group in the foreseeable future and has gathered a detailed view of their 2020 activity so far. We invite individuals or companies who think they might be – or have been – targeted by IAmTheKing to get in touch with us for additional information, or otherwise request access to our Threat Intelligence Portal for regular updates on this threat actor.

YARA rules

In virtually all our investigations, we write YARA rules to hunt for additional malware samples and get a better idea of each family’s prevalence. In the spirit of sharing knowledge with the community and assisting research efforts on this threat actor, we are happy to release a few of these rules, which will allow defenders to identify recent samples from the families described above. If you are unfamiliar with YARA or would like to learn more about the art of writing rules, please check out the online training written by members of GReAT.

rule apt_IAmTheKing_KingOfHearts { meta: description = "Matches IAmTheKing's KingOfHearts C++ implant" author = "Kaspersky Lab" copyright = "Kaspersky Lab" version = "1.0" type = "APT" filetype = "PE" last_modified = "2020-01-20" strings: $payload_fmt = "cookie=%s;type=%s;length=%s;realdata=%send" ascii $cmd1 = "HEART" ascii $cmd2 = "CMDINFO" ascii $cmd3 = "PROCESSINFO" ascii $cmd4 = "LISTDRIVE" ascii $cmd5 = "LISTFILE" ascii $cmd6 = "DOWNLOAD" ascii condition: uint16(0) == 0x5A4D and filesize < 1MB and ($payload_fmt or all of ($cmd*)) } rule apt_IAmTheKing_KingOfHearts_json { meta: description = "Matches IAmTheKing's KingOfHearts JSON C++ implant" author = "Kaspersky Lab" copyright = "Kaspersky Lab" version = "1.0" type = "APT" filetype = "PE" last_modified = "2020-01-20" strings: $user_agent = "Mozilla/4.0 (compatible; )" ascii $error = "write info fail!!! GetLastError-->%u" ascii $multipart = "Content-Type: multipart/form-data; boundary=--MULTI-PARTS-FORM-DATA-BOUNDARY\x0D\x0A" ascii condition: uint16(0) == 0x5A4D and filesize < 1MB and all of them } rule apt_IAmTheKing_QueenOfHearts_2020 { meta: author = "Kaspersky" copyright = "Kaspersky" version = "1.0" type = "APT" filetype = "PE" description = "Find IAmTheKing's QueenOfHearts 2020 variants" last_modified = "2020-09-29" strings: $s1 = "" fullword wide $s2 = "8AAAAHicJY9HDsIwFAXnMmQHIsGULKKIUPZwA0SNqCEIcXwGI+vL781vdknNjR17PvQ48eLKhZKGlsJMwoE7T2nBipSKNQtpy0PSlSSqRr0j1208WVRprNqa6Vs3ju6s" ascii $s3 = "kgAAAHicHYy7DoJAEEXPp2xMKJVEehoKSwsLSqMLCRh5BDTK33vWTHbuzpk7NzLQEMiJ9pmJDy0LK536tA7q1xfYcVJf7Km96jlz5yGJsiCtdN+8XJ1q9yMFR67ySf/M" ascii $s4 = "2gAAAHicHY/JDoJAEAXrZ+SmEUSUAyEueNc/MOBCVFwwxs+3nEw6/V71lilp6Wg48GXEmTc3rpQ86SmsRBy585IWbIlZsqOS9jwkQ0mkeqobct3elwQVh67ayti+WXAX" ascii $s5 = "MyScreen.jpg" fullword wide $s6 = "begin mainthread" fullword wide $s7 = "begin mainthread ok" fullword wide $s8 = "getcommand error" fullword wide $s9 = "querycode error" fullword wide $s10 = "{'session':[{'name':'admin_001','id':21,'time':12836123}],'jpg':" fullword ascii $s11 = "cookie size :%d" fullword wide $s12 = "send request error:%d" fullword wide $s13 = "AABBCCDDEEFFGGHH" fullword wide $s14 = " inflate 1.2.8 Copyright 1995-2013 Mark Adler " fullword ascii $s15 = " Type Descriptor'" fullword ascii $s16 = " constructor or from DllMain." fullword ascii $s17 = " Base Class Descriptor at (" fullword ascii $ex = "ping" ascii fullword condition: ( uint16(0) == 0x5A4D ) and ( filesize > 70KB and filesize < 3MB ) and ( 12 of them ) and ( not $ex ) }

Indicators of Compromise

00E415E72A4FC4C8634D4D3815683CE8 KingOfHearts (urlencode variant)
4E2C2E82F076AD0B5D1F257706A5D579 KingOfHearts (JSON variant)
AB956623B3A6C2AC5B192E07B79CBB5B QueenOfHearts
4BBD5869AA39F144FADDAD85B5EECA12 QueenOfHearts
4076DDAF9555031B336B09EBAB402B95 QueenOfHearts
096F7084D274166462D445A7686D1E5C QueenOfHearts
29AA501447E6E20762893A24BFCE05E9 QueenOfClubs
97c6cfa181c849eb87759518e200872f JackOfHearts
7DB4F1547D0E897EF6E6F01ECC484314 Screenshot capture utility
60D78B3E0D7FFE14A50485A19439209B Malicious LNK
90EF53D025E04335F1A71CB9AA6D6592 Keylogger

Microsoft would love to hear about 'critical bugs' in .NET 5.0 ahead of the 'unified' platform's November launch

The Register - Anti-Virus - 15 Říjen, 2020 - 09:04
Dare ye use RC2 in production?

The version of .NET formerly called .NET Core is crawling closer to its November launch with .NET 5.0 Release Candidate 2 packing updates for key frameworks ASP.NET Core and Entity Framework Core, and a go-live licence.…

Kategorie: Viry a Červi

Remember when Zoom was rumbled for lousy crypto? Six months later it says end-to-end is ready

The Register - Anti-Virus - 15 Říjen, 2020 - 08:33
But it’s a tech preview and requires opt-in for every meeting

The world’s plague-time video meeting tool of choice, Zoom, says it’s figured out how to do end-to-end encryption sufficiently well to offer users a tech preview.…

Kategorie: Viry a Červi

Travelex, Other Orgs Face DDoS Threats as Extortion Campaign Rages On - 14 Říjen, 2020 - 21:40
Organizations worldwide – including Travelex – have been sent letters threatening to launch DDoS attacks on their network unless a $230K ransom is paid.
Kategorie: Viry a Červi

BEC Attacks: Nigeria No Longer the Epicenter as Losses Top $26B - 14 Říjen, 2020 - 21:27
BEC fraudsters now have bases of operation across at least 39 counties and are responsible for $26 billion in losses annually -- and growing.
Kategorie: Viry a Červi

Intel celebrates security of Ice Lake Xeon processors, so far impervious to any threat due to their unavailability

The Register - Anti-Virus - 14 Říjen, 2020 - 20:26
But when they ship, Chipzilla promises its server silicon will 'double down' on defense mechanisms

Intel on Wednesday talked up a set of security features planned for its promised third-generation Xeon Scalable Processors, code-named Ice Lake, which are supposed to show up before the end of the year.…

Kategorie: Viry a Červi

Critical SonicWall VPN Portal Bug Allows DoS, Worming RCE - 14 Říjen, 2020 - 19:43
The CVE-2020-5135 stack-based buffer overflow security vulnerability is trivial to exploit, without logging in.
Kategorie: Viry a Červi

The rise of fearware and how to fight back

The Register - Anti-Virus - 14 Říjen, 2020 - 19:30
A new kind of email filtering protects against fraud

Sponsored  We've had malware, ransomware, and spyware. Now, prepare yourself for the latest in a litany of online nasties: fearware. Thanks to the pandemic, cybercriminals are finding new and more sophisticated ways to fleece us – and it's going to take a new approach to pinpoint, stop, catch and fight back against those attacks.…

Kategorie: Viry a Červi

Silent Librarian Goes Back to School with Global Research-Stealing Effort - 14 Říjen, 2020 - 17:52
The Iranian hacker group is targeting universities in 12 countries.
Kategorie: Viry a Červi

McAfee rattles tin for $600m+ in fresh IPO filing valuing firm at $3.6bn

The Register - Anti-Virus - 14 Říjen, 2020 - 16:52
That's if shares sell at the high end

McAfee – the antivirus vendor, not the totally sane and level-headed man who founded it – is reportedly looking to raise more than $600m in its upcoming IPO.…

Kategorie: Viry a Červi
Syndikovat obsah