Viry a Červi

DDoS downs New Zealand stock exchange for third consecutive day

The Register - Anti-Virus - 27 Srpen, 2020 - 07:28
So much for NZ as the last refuge of civilisation

New Zealand’s stock exchange (NZX) has closed for a third day thanks to a distributed denial-of-service (DDoS) attack.…

Kategorie: Viry a Červi

Forget your space-age IT security systems. It might just take a $1m bribe and a willing employee to be pwned

The Register - Anti-Virus - 26 Srpen, 2020 - 22:56
Elon Musk suggests Tesla targeted by Russian charged with trying to bung staffer cash to infect own bosses' network during DDoS distraction

Updated  A Russian citizen is accused of flying to America in a bid to bribe a Nevada company employee to infect their bosses' IT network with ransomware.…

Kategorie: Viry a Červi

Cisco Patches ‘High-Severity’ Bugs Impacting Switches, Fibre Storage

VirusList.com - 26 Srpen, 2020 - 22:03
Nine bugs were patched, eight of which are rated ‘high’ severity.
Kategorie: Viry a Červi

Here's a neat exploit to trick someone into inadvertently emailing their files to you from their Mac, iPhone via Safari

The Register - Anti-Virus - 26 Srpen, 2020 - 21:21
Speaking purely hypothetically, of course

Pawel Wylecial, a security consultant with Redteam.pl, has published a proof-of-concept exploit for stealing files from iOS and macOS devices via web application code that utilizes the Web Share API.…

Kategorie: Viry a Červi

“Chrome considered harmful” – the Law of Unintended Consequences

Sophos Naked Security - 26 Srpen, 2020 - 18:58
A well-written article on the APNIC blog has provoked a thoughtful response from the Chromium coders - and we can all learn from it!

Researchers shine light on hackers-for-hire op that hit estate agent with malicious plugin for Autodesk 3ds Max

The Register - Anti-Virus - 26 Srpen, 2020 - 18:30
Attackers aimed to steal pics, vids, and compressed files

A hacker crew targeted a luxury estate agency involved in multimillion-pound property deals by deploying malicious plugins for 3D design software Autodesk 3ds Max as part of a potential hacks-for-hire operation.…

Kategorie: Viry a Červi

Hackers Exploit Autodesk Flaw in Recent Cyberespionage Attack

VirusList.com - 26 Srpen, 2020 - 18:09
The popular Autodesk software was exploited in a recent cyberespionage campaign against an international architectural company.
Kategorie: Viry a Červi

Disinformation Spurs a Thriving Industry as U.S. Election Looms

VirusList.com - 26 Srpen, 2020 - 16:50
Threat actors are becoming increasingly sophisticated in launching disinformation campaigns - and staying under the radar to avoid detection from Facebook, Twitter and other platforms.
Kategorie: Viry a Červi

Medical Data Leaked on GitHub Due to Developer Errors

VirusList.com - 26 Srpen, 2020 - 15:49
Up to 200,000 patient records from Office 365 and Google G Suite exposed by hardcoded credentials and other improper access controls.
Kategorie: Viry a Červi

US election 2020: The disinfo operations have evolved, but so have state governments

The Register - Anti-Virus - 26 Srpen, 2020 - 15:03
Officials are better prepared for meddling – so attackers have had to rely on mental games

With the United States set to undertake its first Presidential election since the Russian-tinged 2016 race, state governments and social networks are upping their game.…

Kategorie: Viry a Červi

How to Write a Cybersecurity Playbook During a Pandemic

VirusList.com - 26 Srpen, 2020 - 14:00
IT teams have had to learn to be dynamic as workforces continue to shift strategies while COVID-19 drags on.
Kategorie: Viry a Červi

Transparent Tribe: Evolution analysis,part 2

Kaspersky Securelist - 26 Srpen, 2020 - 12:00

Background + Key findings

Transparent Tribe, also known as PROJECTM or MYTHIC LEOPARD, is a highly prolific group whose activities can be traced as far back as 2013. In the last four years, this APT group has never taken time off. They continue to hit their targets, which typically are Indian military and government personnel.

This is the second of two articles written to share the results of our recent investigations into Transparent Tribe. In the previous article, we described the various Crimson RAT components and provided an overview of impacted users. Here are some of the key insights that will be described in this part:

  • We found a new Android implant used by Transparent Tribe for spying on mobile devices. It was distributed in India disguised as a porn-related app and a fake national COVID-19 tracking app.
  • New evidence confirms a link between ObliqueRAT and Transparent Tribe.
Android implant

During our analysis, we found an interesting sample, which follows a variant of the previously described attack scheme. Specifically, the attack starts with a simple document, which is not malicious by itself, does not contain any macro and does not try to download other malicious components, but it uses social engineering tricks to lure the victim into downloading other documents from the following external URLs:

hxxp://sharingmymedia[.]com/files/Criteria-of-Army-Officers.doc

hxxp://sharingmymedia[.]com/files/7All-Selected-list.xls

15DA10765B7BECFCCA3325A91D90DB37 – Special Benefits.docx

The remote files are two Microsoft Office documents with an embedded malicious VBA, which behaves similarly to those described in the previous article and drops the Crimson “Thin Client”. The domain sharingmymedia[.]com was even more interesting: it was resolved with the IP 89.45.67[.]160 and was registered on 2020-01-10 using Namesilo and the following information:

Registrant Name: bluff hunnter
Registrant Organization:
Registrant Street: India Dehli
Registrant City: Dehli
Registrant State/Province: Delhi
Registrant Postal Code: 110001
Registrant Country: IN
Registrant Phone: +91.4214521212
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: hunterbluff007@gmail.com

The same information was used to register another domain, sharemydrives[.]com, which was registered seven days before, on 2020-01-03, using Namesilo. DNS resolution points to the same IP address: 89.45.67[.]160.

Using our Kaspersky Threat Intelligence Portal, we found the following related URL:


Information in Kaspersky Threat Intelligence Portal

The file is a modified version of MxVideoPlayer, a simple open-source video player for Android, downloadable from GitHub and used by Transparent Tribe to drop and execute their Android RAT.

Desi-porn.apk screenshot

The dropper tries to find a list of legitimate packages on the system:

  • imo.android.imoim
  • snapchat.android
  • viber.voip
  • facebook.lite

If the device was produced by Xiaomi, it also checks if the com.truecaller package is present.

The code used to check if legitimate packages are installed

The first application on the list that is not installed on the system will be selected as the target application. The malware embeds multiple APK files, which are stored in a directory named “assets”. The analyzed sample includes the following packages:

  • apk a20fc273a49c3b882845ac8d6cc5beac
  • apk 53cd72147b0ef6bf6e64d266bf3ccafe
  • apk bae69f2ce9f002a11238dcf29101c14f
  • apk b8006e986453a6f25fd94db6b7114ac2
  • apk 4556ccecbf24b2e3e07d3856f42c7072
  • apk 6c3308cd8a060327d841626a677a0549

The selected APK is copied to /.System/APK/. By default, the application tries to save the file to external storage, otherwise it saves it to the data directory.

Finally, the application tries to install the copied APK. The final malware is a modified version of the AhMyth Android RAT, open-source malware downloadable from GitHub, which is built by binding the malicious payload inside other legitimate applications.

The original AhMyth RAT includes support for the following commands:

Commands Additional fields Value Description x0000ca extra camlist get a camera list extra 1 get a photo from the camera with the id 1 extra 0 get a photo from the camera with the id 0 x0000fm extra

path ls

%dirpath% get a list of files in the directory specified in the “path” variable. extra

path dl

%filepath% upload the specified file to the C2 x0000sm extra ls get a list of text messages extra

to

sms sendSMS

%number%

%message% send a new text to another number x0000cl get the call log x0000cn get contacts x0000mc sec %seconds% record audio from the microphone for the specified number of seconds and upload the resulting file to the C2. x0000lm get the device location

 

Basically, it provides the following features:

  • camera manager (list devices and steal screenshots)
  • file manager (enumerate files and upload these to the C2)
  • SMS manager (get a list of text messages or send a text)
  • get the call log
  • get the contact list
  • microphone manager
  • location manager (track the device location)

The RAT that we analyzed is slightly different from the original. It includes new features added by the attackers to improve data exfiltration, whereas some of the core features, such as the ability to steal pictures from the camera, are missing.

The operators added the following commands:

  • x000upd – download a new APK from the URL specified in the “path” field.
  • x000adm – autodownloader: not implemented in the version we analyzed, but available in other samples.

Moreover, the creators of the RAT also improved its audio surveillance capabilities and included a command to delete text messages with specific contents.

Commands Additional fields Value Description x000upd path %url% download a new APK from the URL specified in the “path” field x000adm not implemented in the analyzed version. Other samples use this to start a class named “autodownloader”. x0000mc extra

sec au

%seconds% record audio for x seconds and upload the resulting file to the C2. Duration is specified in the “sec” value. extra mu stop recording and upload the resulting file to the C2 extra muS

  start recording continuously. This generates MP3 files stored in the “/.System/Records/” directory. x0000fm extra

path ls

%dirpath% get a list of files in the directory specified in the “path” variable extra

path dl

%filepath% upload the specified file to hxxp://212.8.240[.]221:80/server/upload.php sms extra ls get a list of text messages extra

to

sms sendSMS

%number%

%message% Send a new text to another number. extra

to

sms deleteSMS

 

%message% Delete a text that contains the string specified in the “sms” value. The “to” value is ignored. x0000cl get the call log x0000cn get contacts x0000lm get the device location

 

The “autodownloader” is a method used for performing the following actions:

  • upload a contact list
  • upload a text message list
  • upload files stored in the following directories:
    • /.System/Records/
    • /Download/
    • /DCIM/Camera/
    • /Documents/
    • /WhatsApp/Media/WhatsApp Images/
    • /WhatsApp/Media/WhatsApp Documents/

The attacker uses the method to collect contacts and text messages automatically. In addition, the method collects the following: audio files created with the “x0000mc” command and stored in /.System/Records/, downloaded files, photos, images and documents shared via WhatsApp and other documents stored on the device.

Another interesting difference between the original AhMyth and the one modified by Transparent Tribe is the technique used for getting the C2 address. The original version stores the C2 server as a string directly embedded in the code, whereas the modified version uses a different approach. It embeds another URL encoded with Base64 and used for getting a configuration file, which contains the real C2 address.

In our sample, the URL was as follows:

hxxp://tryanotherhorse[.]com/config.txt

It provided the following content:

212.8.240.221:5987

http://www.tryanotherhorse.com

The first value is the real C2, which seems to be a server hosted in the Netherlands.

The modified version communicates via a different URL scheme, which includes more information:

  • Original URL scheme: http://%server%:%port?model=%val%&manf=%val%&release=%val%&id=%val%
  • Modified URL scheme http://%server%:%port?mac=%val%&battery=%val%&model=%val%&manf=%val%&release=%val%&id=%val%
Covid-19 tracking app

We found evidence of Transparent Tribe taking advantage of pandemic-tracking applications to distribute trojanized code. Specifically, we found an APK file imitating Aarogya Setu, a COVID-19 tracking mobile application developed by the National Informatics Centre under the Ministry of Electronics and Information Technology, Government of India. It allows users to connect to essential health services in India.

The discovered application tries to connect to the same malicious URL to get the C2 IP address:
hxxp://tryanotherhorse[.]com/config.txt

It uses the same URL scheme described earlier and it embeds the following APK packages:

  • apk CF71BA878434605A3506203829C63B9D
  • apk 627AA2F8A8FC2787B783E64C8C57B0ED
  • apk 62FAD3AC69DB0E8E541EFA2F479618CE
  • apk A912E5967261656457FD076986BB327C
  • apk 3EB36A9853C9C68524DBE8C44734EC35
  • apk 931435CB8A5B2542F8E5F29FD369E010

Interestingly enough, at the end of April, the Indian Army issued a warning to its personnel against Pakistani agencies’ nefarious designs to hack the phones of Indian military personnel through a malicious application similar to Aarogya Setu.

According to some Indian online news sites, these applications were found to be sent by Pakistani Intelligence Operatives to WhatsApp groups of Indian Army personnel. It also mentioned that these applications later deployed additional packages:

According to some Indian online news sites, these applications were found to be sent by Pakistani Intelligence Operatives to WhatsApp groups of Indian Army personnel. It also mentioned that these applications later deployed additional packages:

  • face.apk
  • imo.apk
  • normal.apk
  • trueC.apk
  • snap.apk
  • viber.apk

Based on public information, the application may have been distributed by sending a malicious link via WhatsApp, SMS, phishing email or social media.

ObliqueRAT connection

ObliqueRAT is another malicious program, described by Cisco Talos in an interesting article published in February. It was attributed to Transparent Tribe because some samples were distributed through malicious documents forged with macros that resembled those used for distributing Crimson RAT.

The report described two ObliqueRAT variants, one distributed via a malicious document as the infection vector and another one, named “Variant #0” and distributed with a dropper.

4a25e48b8cf515f4cdd6711a69ccc875429dcc32007adb133fb25d63e53e2ac6

Unfortunately, as reported by Talos, “The initial distribution vector of this dropper is currently unknown”.

At this time, we do not have the full infection chain, but we can add another piece to the puzzle, because sharemydrives[.]com also hosted another file:

Information in Kaspersky Threat Intelligence Portal

The wifeexchange.exe sample is another dropper, which disguises itself as a porn clip.

Specifically, the executable file uses the same icon used by Windows for multimedia files.

Dropper icon

Once executed, the process tries to find a specific marker (“*#@”) inside its file image, then drops and opens the following files:

  • frame.exe – 4a25e48b8cf515f4cdd6711a69ccc875429dcc32007adb133fb25d63e53e2ac6
  • movie.mp4

Frame.exe is the dropper described by Talos, while movie.mp4 is a small porn clip.

Conclusions

Transparent Tribe members are trying to add new tools to extend their operations and infect mobile devices. They are also developing new custom .NET tools like ObliqueRAT, and as observed in the first report, we do not expect this group to slow down any time soon. We will keep monitoring their activities.

IoC

The followings IoC list is not complete. If you want more information about the APT discussed here, a full IoC list and YARA rules are available to customers of Kaspersky Threat Intelligence Reports. Contact: intelreports@kaspersky.com

15DA10765B7BECFCCA3325A91D90DB37 – Special Benefits.docx
48476DA4403243B342A166D8A6BE7A3F – 7All_Selected_list.xls
B3F8EEE133AE385D9C7655AAE033CA3E – Criteria of Army Officers.doc
D7D6889BFA96724F7B3F951BC06E8C02 – wifeexchange.exe

0294F46D0E8CB5377F97B49EA3593C25 – Android Dropper – Desi-porn.apk
5F563A38E3B98A7BC6C65555D0AD5CFD – Android Dropper – Aarogya Setu.apk
A20FC273A49C3B882845AC8D6CC5BEAC – Android RAT – face.apk
53CD72147B0EF6BF6E64D266BF3CCAFE – Android RAT – imo.apk
BAE69F2CE9F002A11238DCF29101C14F – Android RAT – normal.apk
B8006E986453A6F25FD94DB6B7114AC2 – Android RAT – snap.apk
4556CCECBF24B2E3E07D3856F42C7072 – Android RAT – trueC.apk
6C3308CD8A060327D841626A677A0549 – Android RAT – viber.apk
CF71BA878434605A3506203829C63B9D – Android RAT – face.apk
627AA2F8A8FC2787B783E64C8C57B0ED – Android RAT – imo.apk
62FAD3AC69DB0E8E541EFA2F479618CE – Android RAT – normal.apk
A912E5967261656457FD076986BB327C – Android RAT – snap.apk
3EB36A9853C9C68524DBE8C44734EC35 – Android RAT – trueC.apk
931435CB8A5B2542F8E5F29FD369E010 – Android RAT – viber.apk

hxxp://sharingmymedia[.]com/files/Criteria-of-Army-Officers.doc
hxxp://sharingmymedia[.]com/files/7All-Selected-list.xls
hxxp://sharemydrives[.]com/files/Laptop/wifeexchange.exe
hxxp://sharemydrives[.]com/files/Mobile/Desi-Porn.apk
hxxp://tryanotherhorse[.]com/config.txt – APK URL
212.8.240[.]221:5987 – Android RAT C2
hxxp://212.8.240[.]221:80/server/upload.php – URL used by Android RAT to upload files

 

Four More Bugs Patched in Microsoft’s Azure Sphere IoT Platform

VirusList.com - 26 Srpen, 2020 - 01:27
Researchers have unearthed more vulnerabilities in Microsoft’s IoT security solution.
Kategorie: Viry a Červi

Impersonating users of 'protest' app Bridgefy was as simple as sniffing Bluetooth handshakes for identifiers

The Register - Anti-Virus - 25 Srpen, 2020 - 18:27
University of London researchers poked around in 'secure' messaging platform, but didn't like what they found

An instant messaging app whose creators promoted it as secure and end-to-end encrypted was in fact no such thing, according to researchers at Royal Holloway.…

Kategorie: Viry a Červi

Safari Bug Revealed After Apple Takes Nearly a Year to Patch

VirusList.com - 25 Srpen, 2020 - 17:28
Polish security researcher unveiled the flaw in a cross-browser sharing API that could allow attackers to steal user files.
Kategorie: Viry a Červi

Lazarus Group Targets Cryptocurrency Firms Via LinkedIn Messages

VirusList.com - 25 Srpen, 2020 - 16:46
The North Korean-linked APT's latest campaign shows that it is shifting focus to target the cryptocurrency and financial verticals.
Kategorie: Viry a Červi

Be very afraid! British Army might scrap battle tanks for keyboard warriors – report

The Register - Anti-Virus - 25 Srpen, 2020 - 16:25
Before you go all Colonel Blimp, remember it's budget-setting season

The British Army is looking at ditching its tank regiments and spending the money on keyboard warriors instead, according to reports.…

Kategorie: Viry a Červi

Shoring Up the 2020 Election: Secure Vote Tallies Aren’t the Problem

VirusList.com - 25 Srpen, 2020 - 14:00
With many in the public sphere warning about a potential compromise of the integrity of the Presidential Election, security researchers instead flag online resources and influence campaigns as the biggest problem areas.
Kategorie: Viry a Červi

North Korean hackers pwned cryptocurrency sysadmin with GDPR-themed LinkedIn lure, says F-Secure

The Register - Anti-Virus - 25 Srpen, 2020 - 11:25
Click here to enable your rights... ha, GOTCHA!

Infosec biz F-Secure has uncovered a North Korean phishing campaign that targeted a sysadmin with a fake Linkedin job advert using a General Data Protection Regulation (GDPR) themed lure.…

Kategorie: Viry a Červi

New additions complete the VB2020 localhost programme

Virus Bulletin News - 25 Srpen, 2020 - 11:03
The programme for VB2020 localhost - the first virtual, and entirely free to attend VB conference - is now complete, with new additions to both the live programme and the on-demand programme.

Read more
Kategorie: Viry a Červi
Syndikovat obsah