Malware Devil

Wednesday, July 14, 2021

BSidesNoVA 2021 – Sophia Fadli’s, Brad Schonhorst’s, Jeremiah Osburn’s And Steve Helfen’s ‘Panel: SOC Life’

Our thanks to BSidesNoVA for publishing their outstanding videos on the organization’s YouTube channel.

Permalink

The post BSidesNoVA 2021 – Sophia Fadli’s, Brad Schonhorst’s, Jeremiah Osburn’s And Steve Helfen’s ‘Panel: SOC Life’ appeared first on Security Boulevard.

Read More

The post BSidesNoVA 2021 – Sophia Fadli’s, Brad Schonhorst’s, Jeremiah Osburn’s And Steve Helfen’s ‘Panel: SOC Life’ appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/bsidesnova-2021-sophia-fadlis-brad-schonhorsts-jeremiah-osburns-and-steve-helfens-panel-soc-life/?utm_source=rss&utm_medium=rss&utm_campaign=bsidesnova-2021-sophia-fadlis-brad-schonhorsts-jeremiah-osburns-and-steve-helfens-panel-soc-life

How to Win at State Privacy Whack-A-Mole

New state privacy laws are popping up with increasing speed, and no two are alike. Each has unique compliance obligations, reporting requirements, and penalties. If you have clients, customers and/or supply chain partners in multiple states, managing this expanding maze of privacy requirements will soon be very complicated. How can you cost-effectively keep pace and use privacy as a competitive edge in your business?

The post How to Win at State Privacy Whack-A-Mole appeared first on Security Boulevard.

Read More

The post How to Win at State Privacy Whack-A-Mole appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/how-to-win-at-state-privacy-whack-a-mole/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-win-at-state-privacy-whack-a-mole

Effective Tools for Software Composition Analysis

Because companies are defined by their customers, we connected with IT Central Station for real user experiences with Sonatype’s Nexus Lifecycle and Nexus Firewall. Our second in the series, we first looked at benefits of data quality to Software Composition Analysis (SCA). Today, we continue with other benefits to individual developers and development teams.

The post Effective Tools for Software Composition Analysis appeared first on Security Boulevard.

Read More

The post Effective Tools for Software Composition Analysis appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/effective-tools-for-software-composition-analysis/?utm_source=rss&utm_medium=rss&utm_campaign=effective-tools-for-software-composition-analysis

The Hacker Mind Podcast: Hacking Communities

As we head to Hacker Summer Camp, how should we rebuild our infosec communities to be more inclusive and diverse? Jack Daniel offers his unique voice. As one of the founders of BSides and as a community advocate for Tenable, Jack provides guidance on how we can re-emerge successfully.

The post The Hacker Mind Podcast: Hacking Communities appeared first on Security Boulevard.

Read More

The post The Hacker Mind Podcast: Hacking Communities appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/the-hacker-mind-podcast-hacking-communities/?utm_source=rss&utm_medium=rss&utm_campaign=the-hacker-mind-podcast-hacking-communities

🔴 LIVE: Enterprise Security Weekly #234

Post Content

The post 🔴 LIVE: Enterprise Security Weekly #234 appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/%f0%9f%94%b4-live-enterprise-security-weekly-234/?utm_source=rss&utm_medium=rss&utm_campaign=%25f0%259f%2594%25b4-live-enterprise-security-weekly-234

Conservative Cancel Culture: The Curious Case of Ward Churchill

An extremely thorough and eye-opening 2011 report by the AAUP exposes how extremist conservative professors manipulated political pressure to censor American voices they disagreed with: Regents and administration and some faculty of the University of Colorado at Boulder (CU) allowed an obvious political vendetta against Ward Churchill to override their honesty, deny due process, violate … Continue reading Conservative Cancel Culture: The Curious Case of Ward Churchill

The post Conservative Cancel Culture: The Curious Case of Ward Churchill appeared first on Security Boulevard.

Read More

The post Conservative Cancel Culture: The Curious Case of Ward Churchill appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/conservative-cancel-culture-the-curious-case-of-ward-churchill/?utm_source=rss&utm_medium=rss&utm_campaign=conservative-cancel-culture-the-curious-case-of-ward-churchill

What’s next for the National Cyber Director?

By Jean Schaffer, Federal CTO, Corelight As the first National Cyber Director begins to settle into office, private industry is very hopeful that this will be one of the turning points to solidify a true private/public partnership for raising the cybersecurity posture of the U.S. As I mentioned in my previous post, Chris Inglis is…Read more »

The post What’s next for the National Cyber Director? appeared first on Security Boulevard.

Read More

The post What’s next for the National Cyber Director? appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/whats-next-for-the-national-cyber-director/?utm_source=rss&utm_medium=rss&utm_campaign=whats-next-for-the-national-cyber-director

XStream Vulnerabilities — Detection & Mitigation

XStream Vulnerabilities — Detection & Mitigation

Looking at RCEs in the XStream Java Library and How you can prevent them

Introduction

XStream from ThoughtWorks is a simple library to serialize and deserialize objects in XML and JSON format. Compared to alternative XML serialization libraries such as JAXB (JSR-222) and Jackson, developers find XStream both lightweight and easier to integrate within their applications and services. This simplicity, however, comes at a price which is security. Until recently, XStream didn’t come with security features enabled by default. Attackers and security researchers have regularly found ways to exploit applications using XStream to perform Remote Command Execution (RCE), Denial-of-Service (DoS), and even blind Server-Side Request Forgery (SSRF). These could lead to data breaches, ransomware, and even bitcoin mining that we regularly read about.

The below table summarizes some recent CVEs reported against XStream since the pandemic.

https://medium.com/media/ec53ac02be070feacde3e3acc43e5db6/href

Detecting XStream CVEs

While the sheer number of CVEs and high CVSS base scores such as 9.8 are perturbing information for developers and application security people alike, the reality is that most of these CVEs are merely misconfiguration and highlights insecure coding practices. The number of CVEs and the base score do not mean that these vulnerabilities could be subsequently exploited by an attacker externally, a prioritization concept we call “Attacker Reachability”. While typical SCA tools such as the free dependency track (or those that come with your git) are optimized for just detecting open-source vulnerabilities, ShiftLeft Intelligent SCA is optimized for both detecting and prioritizing vulnerabilities based on Attacker Reachability.

To detect Attacker Reachable CVEs, the process employed by ShiftLeft CORE is as follows.

Build Software BoM (SBoM) using the CycloneDX standard
Overlay the vulnerability information on top of the application attack surface using our open-source Code Property Graph technology
Identify Attacker Reachable vulnerabilities by querying the graph database for those vulnerable packages and methods that can be reached from an attacker controlled data-flow.

By leveraging “Attacker Reachability” our platform could triage and report only those applications that are definitely exploitable due to the presence of attacker-controlled data flows. We even find applications that might include the vulnerable version of XStream but do not have a vulnerable attacker-controlled flow that performs serialization and deserialization of data.

To get started with detection, simply register for a free ShiftLeft CORE account and follow the steps to connect and scan your application via GitHub or any other CI.

Mitigation

XStream developers promptly release an update whenever a security advisory gets published. Updating the version of XStream used in your application to the latest is a good starting point, however, it is not a comprehensive solution since each new version fixes security vulnerabilities found in the previous version. In many organizations, upgrading packages frequently may not be possible due to the additional Quality Assurance and Change Management tasks involved.

An alternative to updating packages is identifying attacker-reachable flaws and adding suitable mitigation and workarounds. ShiftLeft CORE platform really excels here. For many of the XStream CVEs, a single line shown below is often enough to mitigate the reported vulnerabilities.

XStream.setupDefaultSecurity()

The above snippet enables the default security allow lists and deny lists from the open-source developers, which are not enabled by default in version 1.4.x. You could also opt for a custom allowlist based on trusted types or a combination of allow and denylists.

// Allow only the types that were reviewed and approved
XStream.allowTypes(String[]);

// If allowlist is not possible opt for deny list
XStream.denyPermission(TypePermission);
XStream.denyTypesByRegExp(String[]);
XStream.denyTypesByRegExp(Pattern[]);
XStream.denyTypesByWildcard(String[]);
XStream.denyTypeHierary(Class);

Some example denylists suggested in the advisories are listed below:

xstream.denyTypes(new String[]{ “jdk.nashorn.internal.objects.NativeString” });
xstream.denyTypes(new Class[]{ void.class, Void.class });
xstream.denyTypes(new String[]{ “javax.imageio.ImageIO$ContainsFilter”, “jdk.nashorn.internal.objects.NativeString” });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });

xstream.denyTypesByRegExp(new String[]{ “.*\\.ReadAllStream\\$FileStream” });
xstream.denyTypesByRegExp(new String[]{ “.*\\$LazyIterator”, “javax\\.crypto\\..*”, “.*\\.ReadAllStream\\$FileStream” });

Attackers have regularly found ways to exploit applications using XStream. Manage known risk from open source code with ShiftLeft’s Intelligent Software Composition Analysis (SCA) tool. Start your free 15-day trial of ShiftLeft CORE to scan your code to see if your application is at risk from XStream vulnerabilities.

XStream Vulnerabilities — Detection & Mitigation was originally published in ShiftLeft Blog on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post XStream Vulnerabilities — Detection & Mitigation appeared first on Security Boulevard.

Read More

The post XStream Vulnerabilities — Detection & Mitigation appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/xstream-vulnerabilities%e2%80%8a-%e2%80%8adetection-mitigation/?utm_source=rss&utm_medium=rss&utm_campaign=xstream-vulnerabilities%25e2%2580%258a-%25e2%2580%258adetection-mitigation

Patch Tuesday Update – July 2021

Zero-days galore and lots more… July 2021 Patch Tuesday contains fixes for 117 vulnerabilities in total, with 9 zero-days amongst them. This is across the Microsoft suite of products, by far the most in a month this year. Products impacted by this latest security update include Microsoft Office, SharePoint, Excel, Microsoft Exchange Server, Windows Defender, …

Read More

The post Patch Tuesday Update – July 2021 appeared first on Security Boulevard.

Read More

The post Patch Tuesday Update – July 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/patch-tuesday-update-july-2021/?utm_source=rss&utm_medium=rss&utm_campaign=patch-tuesday-update-july-2021

Location- and Device-agnostic Security for the Mobile Workforce

I’ve spent my entire career in technology and can still recall the time when a desktop PC was the only way to work. (Truth be told, I’m also old enough to remember dumb terminals.) I also remember my first company laptop — a beast of a thing with a monochrome display so thick it came with an integrated 2.5″ floppy drive and a battery life that made it barely usable. My first mobile phone was a Motorola Timeport, the first tri-band mobile phone that could work in Europe and North America.

The post Location- and Device-agnostic Security for the Mobile Workforce appeared first on Security Boulevard.

Read More

The post Location- and Device-agnostic Security for the Mobile Workforce appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/location-and-device-agnostic-security-for-the-mobile-workforce/?utm_source=rss&utm_medium=rss&utm_campaign=location-and-device-agnostic-security-for-the-mobile-workforce

Bad bot activity on sports betting websites rises during Euro 2020

Across Europe, the EURO 2020 tournament captivated fans over the past month, with Italy ultimately defeating England to take home the cup on July 11. As fans eagerly watched the matches, Imperva Research Labs was busy monitoring activity that wasn’t happening on the playing field — but across a range of sporting and gambling sites […]

The post Bad bot activity on sports betting websites rises during Euro 2020 appeared first on Blog.

The post Bad bot activity on sports betting websites rises during Euro 2020 appeared first on Security Boulevard.

Read More

The post Bad bot activity on sports betting websites rises during Euro 2020 appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/bad-bot-activity-on-sports-betting-websites-rises-during-euro-2020/?utm_source=rss&utm_medium=rss&utm_campaign=bad-bot-activity-on-sports-betting-websites-rises-during-euro-2020

Salt Security Report Highlights Prevalence of API Vulnerabilities

Salt Security, a provider of a platform for securing application programming interfaces (APIs), today published a report that reveals the existence of vulnerabilities in APIs in an unidentified platform employed widely in the financial services industry that could be easily compromised. Company researchers identified inadequate authorization for data access, inadequate authorization for function access, susceptibility..

The post Salt Security Report Highlights Prevalence of API Vulnerabilities appeared first on Security Boulevard.

Read More

The post Salt Security Report Highlights Prevalence of API Vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/salt-security-report-highlights-prevalence-of-api-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=salt-security-report-highlights-prevalence-of-api-vulnerabilities

Spot the Ball & Security Detection Games

When I was younger, and printed newspapers were a more common household purchase, I remember fondly watching my mother play a game called “Spot the Ball.” For those of you not familiar with this, it consisted of a photograph of a recent football (soccer) match with the ball removed from the image, and the goal […]… Read More

The post Spot the Ball & Security Detection Games appeared first on The State of Security.

The post Spot the Ball & Security Detection Games appeared first on Security Boulevard.

Read More

The post Spot the Ball & Security Detection Games appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/spot-the-ball-security-detection-games/?utm_source=rss&utm_medium=rss&utm_campaign=spot-the-ball-security-detection-games

Updated Joker Malware Floods into Android Apps

The Joker premium billing-fraud malware is back on Google Play in a fresh onslaught, with an updated bag of tricks to evade scanners.
Read More

The post Updated Joker Malware Floods into Android Apps appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/updated-joker-malware-floods-into-android-apps/?utm_source=rss&utm_medium=rss&utm_campaign=updated-joker-malware-floods-into-android-apps

Windows Hello Bypass Fools Biometrics Safeguards in PCs

A Windows security bug would allow an attacker to fool a USB camera used in the biometric facial-recognition aspect of the system.
Read More

The post Windows Hello Bypass Fools Biometrics Safeguards in PCs appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/windows-hello-bypass-fools-biometrics-safeguards-in-pcs/?utm_source=rss&utm_medium=rss&utm_campaign=windows-hello-bypass-fools-biometrics-safeguards-in-pcs

One way to fail at malspam – give recipients the wrong password for an encrypted attachment , (Wed, Jul 14th)

It is not unusual for malspam authors to encrypt the malicious files that they attach to messages they send out. Whether they encrypt the malicious file itself (as in the case of a password-protected Office document) or embed it in an encrypted archive, encryption can sometimes help attackers to get their creations past e-mail security scans.

In such cases, the one thing they have to make sure of is – of course – that they send the right password to the user along with the encrypted file. As the message that made its way to my spam trap this week shows, however, this may not always be as simple as it seems…

The message in question looked like a generic information about a parcel from DHL. Its author decided to spoof the sender address to make it look like the message originated from info@dhl.com (which resulted in an SPF check failure, since DHL has a valid SPF record published) and to include the password to the attachment in the body of the e-mail, which was itself composed entirely of one large PNG file.

For attackers, the use of images instead of HTML/text content in the body of an e-mail can have some clear benefits. Since anti-spam and anti-phishing mechanisms on e-mail security appliances usually don’t do OCR and subsequent analysis of any text contained within the images, it can allow the attackers to use pretty much any verbiage without the need to fear that they will run into any linguistic/word list-based security checks. However, since this is a well-known technique, message containing nothing but an image can sometimes easily end up classified as suspicious… But back to our message.

The password that was included in the text (“AWB3604”) was – as you have undoubtedly guessed – not correct, and any attempt to extract the contents of the attached archive using it would fail. This means that even if the message did make it into someone’s inbox, the (most likely) malicious EXE contained within the attachment would not pose any danger to the recipient’s machine.

At this point, you migth ask how much of a mistake did the attackers really make. Was the password mentioned in the message entirely wrong or would a user willing to experiment with it a little be able to decrypt the attachment?

I tried to find out. At this point, my assumption was, that the attackers perhaps made a simple mistake in the digit portion of the password and that since the AWB number mentioned in the header portion of the text was “7253****8341”, the correct password might be either “AWB7253” or “AWB8341”.

Neither worked, so I have then decided to try to brute-force the digit part of the password (“AWB0000” – “AWB9999”). This was also unsuccessful, so I tried to do some simple substitutions and modifications (such as “ABW 0000” – “ABW 9999”, “DHL0000” – “DHL9999”, etc.) and even tried running few of the larger password lists against the file.

Since not even one of these attempts at decrypting the attachment resulted in success, it makes one wonder whether the attackers do any “testing” at all before they send their messages out…

Well, I guess that if they don’t, all the better for us.

———–
Jan Kopriva
@jk0pr
Alef Nula

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post One way to fail at malspam – give recipients the wrong password for an encrypted attachment , (Wed, Jul 14th) appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/one-way-to-fail-at-malspam-give-recipients-the-wrong-password-for-an-encrypted-attachment-wed-jul-14th/?utm_source=rss&utm_medium=rss&utm_campaign=one-way-to-fail-at-malspam-give-recipients-the-wrong-password-for-an-encrypted-attachment-wed-jul-14th

LuminousMoth APT: Sweeping attacks for the chosen few

APT actors are known for the frequently targeted nature of their attacks. Typically, they will handpick a set of targets that in turn are handled with almost surgical precision, with infection vectors, malicious implants and payloads being tailored to the victims’ identities or environment. It’s not often we observe a large-scale attack conducted by actors fitting this profile, usually due to such attacks being noisy, and thus putting the underlying operation at risk of being compromised by security products or researchers.

We recently came across unusual APT activity that exhibits the latter trait – it was detected in high volumes, albeit most likely aimed at a few targets of interest. This large-scale and highly active campaign was observed in South East Asia and dates back to at least October 2020, with the most recent attacks seen around the time of writing. Most of the early sightings were in Myanmar, but it now appears the attackers are much more active in the Philippines, where there are more than 10 times as many known targets.

Further analysis revealed that the underlying actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda. This is evident in both network infrastructure connections, and the usage of similar TTPs to deploy the Cobalt Strike Beacon as a payload. In fact, our colleagues at ESET and Avast recently assessed that HoneyMyte was active in the same region. The proximity in time and common occurrence in Myanmar of both campaigns could suggest that various TTPs of HoneyMyte may have been borrowed for the activity of LuminousMoth.

Most notably though, we observed the capability of the culprit to spread to other hosts through the use of USB drives. In some cases, this was followed by deployment of a signed, but fake version of the popular application Zoom, which was in fact malware enabling the attackers to exfiltrate files from the compromised systems. The sheer volume of the attacks raises the question of whether this is caused by a rapid replication through removable devices or by an unknown infection vector, such as a watering hole or a supply chain attack.

In this publication we aim to profile LuminousMoth as a separate entity, outlining the infection chain and unique toolset it leverages, the scale and targeting in its campaigns as well as its connections to HoneyMyte through common TTPs and shared resources.

What were the origins of the infections?

We identified two infection vectors used by LuminousMoth: the first one provides the attackers with initial access to a system. It consists of sending a spear-phishing email to the victim containing a Dropbox download link. The link leads to a RAR archive that masquerades as a Word document by setting the “file_subpath” parameter to point to a filename with a .DOCX extension.

hxxps://www.dropbox[.]com/s/esh1ywo9irbexvd/COVID-19%20Case%2012-11-
2020.rar?dl=0&file_subpath=%2FCOVID-19+Case+12-11-2020%2FCOVID-19+Case+12-11-2020(2).docx

The archive contains two malicious DLL libraries as well as two legitimate executables that sideload the DLL files. We found multiple archives like this with file names of government entities in Myanmar, for example “COVID-19 Case 12-11-2020(MOTC).rar” or “DACU Projects.r01” (MOTC is Myanmar’s Ministry of Transport and Communications, and DACU refers to the Development Assistance Coordination Unit of the Foreign Economic Relations Department (FERD) in Myanmar).

Infection chain

The second infection vector comes into play after the first one has successfully finished, whereby the malware tries to spread by infecting removable USB drives. This is made possible through the use of two components: the first is a malicious library called “version.dll” that gets sideloaded by “igfxem.exe”, a Microsoft Silverlight executable originally named “sllauncher.exe”. The second is “wwlib.dll”, another malicious library sideloaded by the legitimate binary of “winword.exe”. The purpose of “version.dll” is to spread to removable devices, while the purpose of “wwlib.dll” is to download a Cobalt Strike beacon.

The first malicious library “version.dll” has three execution branches, chosen depending on the provided arguments, which are: “assist”, “system” or no argument. If the provided argument is “assist”, the malware creates an event called “nfvlqfnlqwnlf” to avoid multiple executions and runs “winword.exe” in order to sideload the next stage (“wwlib.dll”). Afterwards, it modifies the registry by adding an “Opera Browser Assistant” entry as a run key, thus achieving persistence and executing the malware with the “assist” parameter upon system startup.

Registry value to run the malware at system startup

Then, the malware checks if there are any removable drives connected to the infected system. If any are found, it enumerates the files stored on the drive and saves the list to a file called “udisk.log”. Lastly, the malware is executed once again with the “system” parameter.

If the provided argument is “system”, a different event named “qjlfqwle21ljl” is created. The purpose of this execution branch is to deploy the malware on all connected removable devices, such as USB sticks or external drives. If a drive is found, the malware creates hidden directories carrying non ascii characters on the drive and moves all the victim’s files there, in addition to the two malicious libraries and legitimate executables. The malware then renames the file “igfxem.exe” to “USB Driver.exe” and places it at the root of the drive along with “version.dll”. As a result, the victims are no longer able to view their own drive files and are left with only “USB Driver.exe”, meaning they will likely execute the malware to regain access to the hidden files.

Copying the payload and creating a hidden directory on the removable drive

If no argument is provided, the malware executes the third execution branch. This branch is only launched in the context of a compromised removable drive by double-clicking “USB Driver.exe”. The malware first copies the four LuminousMoth samples stored from the hidden drive repository to “C:UsersPublicDocumentsShared Virtual Machines”. Secondly, the malware executes “igfxem.exe” with the “assist” argument. Finally, “explorer.exe” gets executed to display the hidden files that were located on the drive before the compromise, and the user is able to view them.

The second library, “wwlib.dll”, is a loader. It gets sideloaded by “winword.exe” and emerged two months prior to “version.dll”, suggesting that earlier instances of the attack did not rely on replication through removable drives but were probably distributed using other methods such as the spear-phishing emails we observed.

“Wwlib.dll” fetches a payload by sending a GET request to the C2 address at “103.15.28[.]195”. The payload is a Cobalt Strike beacon that uses the Gmail malleable profile to blend with benign traffic.

Downloading a Cobalt Strike beacon from 103.15.28[.]195

Older spreading mechanism

We discovered an older version of the LuminousMoth infection chain that was used briefly before the introduction of “version.dll”. Instead of the usual combination of “version.dll” and “wwlib.dll”, a different library called “wwlib.dll” is in fact the first loader in this variant and is in charge of spreading to removable drives, while a second “DkAr.dll” library is in charge of downloading a Cobalt Strike beacon from the C2 server. This variant’s “wwlib.dll” offers two execution branches: one triggered by the argument “Assistant” and a second one with no arguments given. When this library is sideloaded by “winword.exe”, it creates an event called “fjsakljflwqlqewq”, adds a registry value for persistence, and runs “PrvDisk.exe” that then sideloads “DkAr.dll”.

The final step taken by “wwlib.dll” is to copy itself to any removable USB device. To do so, the malware checks if there are any files carrying a .DOC or .DOCX extension stored on the connected devices. If such a document is found, the malware replaces it with the “winword.exe” binary, keeping the document’s file name but appending “.exe” to the end. The original document is then moved to a hidden directory. The “wwlib.dll” library is copied to the same directory containing the fake document and the four samples (two legitimate PE files, two DLL libraries) are copied to “[USB_Drive letter]:System Volume Informationen-AUQantas”.

If the malware gets executed without the “Assistant” argument, this means the execution was started from a compromised USB drive by double-clicking on the executable. In this case, the malware first executes “explorer.exe” to show the hidden directory with the original documents of the victim, and proceeds to copy the four LuminousMoth samples to “C:UsersPublicDocumentsShared Virtual Machines”. Finally, it executes “winword.exe” with the “Assistant” argument to infect the new host, to which the USB drive was connected.

Since this variant relies on replacing Word documents with an executable, it is possible that the attackers chose the “winword.exe” binary for sideloading the malicious DLL due to its icon, which raises less suspicions about the original documents being tampered with. However, this means that the infection was limited only to USB drives that have Word documents stored on them, and might explain the quick move to a more pervasive approach that infects drives regardless of their content.

Post exploitation tool: Fake Zoom application

The attackers deployed an additional malicious tool on some of the infected systems in Myanmar. Its purpose is to scan the infected systems for files with predefined extensions and exfiltrate them to a C2 server. Interestingly, this stealer impersonates the popular Zoom video telephony software. One measure to make it seem benign is a valid digital signature provided with the binary along with a certificate that is owned by Founder Technology, a subsidiary of Peking University’s Founder Group, located in Shanghai.

Valid certificate of the fake Zoom application

To facilitate the exfiltration of data, the stealer parses a configuration file called “zVideoUpdate.ini”. While it is unclear how the malware is written to disk by the attackers, it is vital that the .ini file is dropped alongside it and placed in the same directory in order to work. The configuration parameters that comprise this file are as follows:

Parameter Name
Purpose

meeting
Undetermined integer value that defaults to 60.

ssb_sdk
Undetermined integer value that defaults to 60.

zAutoUpdate
URL of the C2 server which the stolen data will be uploaded to.

XmppDll
Path to the utility used to archive exfiltrated files.

zKBCrypto
List of exfiltrated file extensions that are searched in target directories. The extensions of interest are delimited with the ‘;’ character.

zCrashReport
Suffix string appended to the name of the staging directory used to host exfiltrated files before they are archived.

zWebService
Path prefix for the exfiltration staging directory.

zzhost
Path to the file that will hold a list of hashes corresponding to the  files collected for exfiltration.

ArgName
AES key for configuration string encryption.

Version
AES IV for configuration string encryption.

zDocConverter
Path #1 to a directory to look for files with the extension intended for exfiltration

zTscoder
Path #2 to a directory to look for files with the extension intended for exfiltration

zOutLookIMutil
Path #3 to a directory to look for files with the extension intended for exfiltration

Each field in the configuration file (with the exception of Version, ArgName and zCrashReport) is encoded with Base64. While the authors incorporated logic and parameters that allow the decryption of some of the fields specified above with the AES algorithm, it remains unused.

The stealer uses the parameters in order to scan the three specified directories (along with root paths of fixed and removable drives) and search for files with the extensions given in the zKBCrypto parameter. Matching files will then be copied to a staging directory created by the malware in a path constructed with the following structure: “<zWebService>%Y-%m-%d %H-%M-%S<zCrashReport>”. The string format in the directory’s name represents the time and date of the malware’s execution.

In addition, the malware collects the metadata of the stolen files. One piece of data can be found as a list of original paths corresponding to the exfiltrated files that is written to a file named ‘VideoCoingLog.txt’. This file resides in the aforementioned staging directory. Likewise, a second file is used to hold the list of hashes corresponding to the exfiltrated files and placed in the path specified in the zzhost parameter.

After collection of the targeted files and their metadata, the malware executes an external utility in order to archive the staging directory into a .rar file that will be placed in the path specified in the zWebService parameter. The malware assumes the existence of the utility in a path specified under the XmppDll parameter, suggesting the attackers have prior knowledge of the infected system and its pre-installed applications.

Finally, the malware seeks all files with a .rar extension within the zWebService directory that should be transmitted to the C2. The method used to send the archive makes use of a statically linked CURL library, which sets the parameters specified below when conducting the transaction to the server. The address of the C2 is taken from the zAutoUpdate parameter.

CURL logic used to issue the archive of exfiltrated files to the C&C

Post exploitation tool: Chrome Cookies Stealer

The attackers deployed another tool on some infected systems that steals cookies from the Chrome browser. This tool requires the local username as an argument, as it is needed to access two files containing the data to be stolen:

C:Users[USERNAME]AppDataLocalGoogleChromeUser DataDefaultCookies
C:Users[USERNAME]AppDataLocalGoogleChromeUser DataLocal State

The stealer starts by extracting the encrypted_key value stored in the “Local State” file. This key is base64 encoded and used to decode the cookies stored in the “Cookies” file. The stealer uses the CryptUnprotectData API function to decrypt the cookies and looks for eight specific cookie values: SID, OSID, HSID, SSID, LSID, APISID, SAPISID and ACCOUNT_CHOOSER:

Cookie values the stealer looks for

Once found, the malware simply displays the values of those cookies in the terminal. The Google policy available here explains that these cookies are used to authenticate users:

Google policy explaining the purpose of the cookies

During our test, we set up a Gmail account and were able to duplicate our Gmail session by using the stolen cookies. We can therefore conclude this post exploitation tool is dedicated to hijacking and impersonating the Gmail sessions of the targets.

Command and Control

For C2 communication, some of the LuminousMoth samples contacted IP addresses directly, whereas others communicated with the domain “updatecatalogs.com”.

15.28[.]195
59.10[.]253

Infrastructure ties from those C2 servers helped reveal additional domains related to this attack that impersonate known news outlets in Myanmar, such as MMTimes, 7Day News and The Irrawaddy. Another domain “mopfi-ferd[.]com” also impersonated the Foreign Economic Relations Department (FERD) of the Ministry of Planning, Finance and Industry (MOPFI) in Myanmar.

mmtimes[.]net
mmtimes[.]org
7daydai1y[.]com
irrawddy[.]com
mopfi-ferd[.]com

“Mopfi-ferd[.]com” resolved to an IP address that was associated with a domain masquerading as the Zoom API. Since we have seen the attackers deploying a fake Zoom application, it is possible this look-alike domain was used to hide malicious Zoom traffic, although we have no evidence of this.

Potentially related Zoom look-alike domains

Who were the targets?

We were able to identify a large number of targets infected by LuminousMoth, almost all of which are from the Philippines and Myanmar. We came across approximately 100 victims in Myanmar, whereas in the Philippines the number was much higher, counting nearly 1,400 victims. It seems however that the actual targets were only a subset of these that included high-profile organizations, namely government entities located both within those countries and abroad.

It is likely that the high rate of infections is due to the nature of the LuminousMoth attack and its spreading mechanism, as the malware propagates by copying itself to removable drives connected to the system. Nevertheless, the noticeable disparity between the extent of this activity in both countries might hint to an additional and unknown infection vector being used solely in the Philippines. It could, however, simply be that the attackers are more interested in going after targets from this region.

Connections to HoneyMyte

Over the course of our analysis, we noticed that LuminousMoth shares multiple similarities with the HoneyMyte threat group. Both groups have been covered extensively in our private reports, and further details and analysis of their activity are available to customers of our private APT reporting service. For more information, contact: intelreports@kaspersky.com.

LuminousMoth and HoneyMyte have similar targeting and TTPs, such as the usage of DLL side-loading and Cobalt Strike loaders, and a similar component to LuminousMoth’s Chrome cookie stealer was also seen in previous HoneyMyte activity. Lastly, we found infrastructure overlaps between the C2 servers used in the LuminousMoth campaign and an older one that has been attributed to HoneyMyte.

Some of LuminousMoth’s malicious artifacts communicate with “updatecatalogs[.]com”, which resolves to the same IP address behind “webmail.mmtimes[.]net”. This domain was observed in a campaign that dates back to early 2020, and was even found on some of the systems that were later infected with LuminousMoth. In this campaign, a legitimate binary (“FmtOptions.exe”) sideloads a malicious DLL called “FmtOptions.dll”, which then decodes and executes the contents of the file “work.dat”. This infection flow also involves a service called “yerodns.dll” that implements the same functionality as “FmtOptions.dll”.

The domain “webmail.mmtimes[.]net” previously resolved to the IP “45.204.9[.]70”. This address is associated with another MMTimes look-alike domain used in a HoneyMyte campaign during 2020: “mmtimes[.]org”. In this case, the legitimate executable “mcf.exe” loads “mcutil.dll”. The purpose of “mcutil.dll” is to decode and execute “mfc.ep”, a PlugX backdoor that communicates with “mmtimes[.]org”. Parts of this campaign were also covered in one of our private reports discussing HoneyMyte’s usage of a watering hole to infect its victims.

Therefore, based on the above findings, we can assess with medium to high confidence that the LuminousMoth activity is indeed connected to HoneyMyte.

Connection between HoneyMyte and LuminousMoth C2s

Conclusions

LuminousMoth represents a formerly unknown cluster of activity that is affiliated to a Chinese-speaking actor. As described in this report, there are multiple overlaps between resources used by LuminousMoth and those sighted in previous activity of HoneyMyte. Both groups, whether related or not, have conducted activity of the same nature – large-scale attacks that affect a wide perimeter of targets with the aim of hitting a few that are of interest.

On the same note, this group’s activity and the apparent connections may hint at a wider phenomenon observed during 2021 among Chinese-speaking actors, whereby many are re-tooling and producing new and unknown malware implants. This allows them to obscure any ties to their former activities and blur their attribution to known groups. With this challenge in mind, we continue to track the activity described in this publication with an eye to understanding its evolution and connection to previous attacks.

Indicators of Compromise

Version.dll payloads

Hashes
Compilation Date

0f8b7a64336b4315cc0a2e6171ab027e
2d0296ac56db3298163bf3f6b622fdc319a9be23
59b8167afba63b9b4fa4369e6664f274c4e2760a4e2ae4ee12d43c07c9655e0f
Dec 24 09:20:16 2020

37054e2e8699b0bdb0e19be8988093cd
5e45e6e113a52ba420a35c15fbaa7856acc03ab4
a934ae0274dc1fc9763f7aa51c3a2ce1a52270a47dcdd80bd5b9afbc3a23c82b
Dec 24 09:19:51 2020

c05cdf3a29d6fbe4e3e8621ae3173f08
75cd21217264c3163c800e3e59af3d7db14d76f8
869e7da2357c673dab14e9a64fb69691002af5b39368e6d1a3d7fda242797622
Dec 29 11:45:41 2020

5ba1384b4edfe7a93d6f1166da05ff6f
6d18970811821125fd402cfa90210044424e223a
857c676102ea5dda05899d4e386340f6e7517be2d2623437582acbe0d46b19d2
Jan 07 11:18:38 2021

afb777236f1e089c9e1d33fce46a704c
cf3582a6cdac3e254c017c8ce36240130d67834a
1ec88831b67e3f0d41057ba38ccca707cb508fe63d39116a02b7080384ed0303
Jan 14 11:18:50 2021

wwlib.dll payloads

Hashes
Compilation Date

4fbc4835746a9c64f8d697659bfe8554
b43d7317d3144c760d82c4c7506eba1143821ac1
95bcc8c3d9d23289b4ff284cb685b741fe92949be35c69c1faa3a3846f1ab947
Dec 24 10:25:39 2020

Related payloads

Hashes
Name
Compilation Date

b31008f6490ffe7ba7a8edb9e9a8c137
c1945fd976836ba2f3fbeafa276f60c3f0e9a51c
4a4b976991112b47b6a3d6ce19cc1c4f89984635ed16aea9f88275805b005461
FmtOptions.dll
Jan 11 10:00:42 2021

 

ac29cb9c702d9359ade1b8a5571dce7d
577ad54e965f7a21ba63ca4a361a3de86f02e925
d8de88e518460ee7ffdffaa4599ccc415e105fc318b36bc8fe998300ee5ad984
yerodns.dll
Oct 29 10:33:20 2019

 

afe30b5dd18a114a9372b5133768151c
9a6f97300017a09eb4ea70317c65a18ea9ac49bd
cf757b243133feab2714bc0da534ba21cbcdde485fbda3d39fb20db3a6aa6dee
mcutil.dll
Jun 13 16:35:46 2019

 

95991f445d846455b58d203dac530b0b
cee6afa1c0c8183900b76c785d2989bd1a904ffb
f27715b932fb83d44357dc7793470b28f6802c2dc47076e1bc539553a8bfa8e0
mcutil.dll
Feb 21 09:41:11 2020

Post exploitation tools

Hashes
Name
Compilation Date

c727a8fc56cedc69f0cfd2f2f5796797
75d38bf8b0053d52bd5068adf078545ccdac563f
361ccc35f7ff405eb904910de126a5775de831b4229a4fdebfbacdd941ad3c56
ZoomVideoApp.exe
Mar 02 10:51:31 2021

Domains and IPs

103.15.28[.]195
202.59.10[.]253
updatecatalogs[.]com
mopfi-ferd[.]com
mmtimes[.]net
mmtimes[.]org
7daydai1y[.]com
irrawddy[.]com

The post LuminousMoth APT: Sweeping attacks for the chosen few appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/luminousmoth-apt-sweeping-attacks-for-the-chosen-few/?utm_source=rss&utm_medium=rss&utm_campaign=luminousmoth-apt-sweeping-attacks-for-the-chosen-few

Zero-Trust for the Post-Pandemic World

More than a year after the start of the COVID-19 pandemic, we’re seeing most companies either maintaining their remote work policies or slowly moving to a hybrid work model. In fact, an estimated 36.2 million Americans will be working remotely by 2025, which is nearly double pre-pandemic levels. Alongside this shift, 2020 brought a sharp..

The post Zero-Trust for the Post-Pandemic World appeared first on Security Boulevard.

Read More

The post Zero-Trust for the Post-Pandemic World appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/zero-trust-for-the-post-pandemic-world/?utm_source=rss&utm_medium=rss&utm_campaign=zero-trust-for-the-post-pandemic-world

Security in the Age of Increasing Cyberattacks

In June 2021, I was discussing with a colleague why, despite all the discourse about security, we continue to read about cybersecurity attacks. On that same day, the Belgian city of Liege announced that it had been the victim of a ransomware attack. During our chat, my colleague held up a golf ball and said,..

The post Security in the Age of Increasing Cyberattacks appeared first on Security Boulevard.

Read More

The post Security in the Age of Increasing Cyberattacks appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/security-in-the-age-of-increasing-cyberattacks/?utm_source=rss&utm_medium=rss&utm_campaign=security-in-the-age-of-increasing-cyberattacks

Despite Pen Testing Efforts, Stubborn Vulnerabilities Persist

For those security professionals who work to mitigate enterprise software vulnerabilities, it may often seem like Groundhog Day—patching and mitigating the same types of vulnerabilities over and over again. As a just-released report from crowdsourced penetration testing provider Cobalt found, that sense of déjà vu is not their imagination. From their database, Cobalt found that..

The post Despite Pen Testing Efforts, Stubborn Vulnerabilities Persist appeared first on Security Boulevard.

Read More

The post Despite Pen Testing Efforts, Stubborn Vulnerabilities Persist appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/despite-pen-testing-efforts-stubborn-vulnerabilities-persist/?utm_source=rss&utm_medium=rss&utm_campaign=despite-pen-testing-efforts-stubborn-vulnerabilities-persist

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...