Το Iranian APT OilRig χρησιμοποιεί νέα κερκόπορτα Saitama

In late April 2022, Fortinet and Malwarebytes security researchers discovered a malicious Excel document sent by the OilRig hacker group (also known as APT34, Helix Kitten, and Cobalt Gypsy) to a Jordanian diplomat to inject a new backdoor called Saitama.

The phishing email came from a hacker disguised as an employee of the IT department of the Ministry of Foreign Affairs. The attack was discovered after the recipient forwarded the email to a real IT employee to verify the authenticity of the email.

Like many of these attacks, the email contained a malicious attachment. Ωστόσο, the attached threat was not ordinary malware. αντι αυτου, it had the capabilities and methods commonly associated with targeted attacks (APTs).είπε Fortinet researcher Fred Gutierrez.

According to research notes provided by Fortinet, the macro uses WMI (Windows Management Instrumentation) to query its command and control (ντο&ντο) server and is capable of producing three files: a malicious PE file, a configuration file, and a legitimate DLL file. Written in .NET, ο Saitama backdoor uses the DNS protocol to communicate with C&C and exfiltrate data, which is the stealthiest method of communication. Methods of masking malicious packets in legitimate traffic are also used.

Επιτρέψτε μου να σας υπενθυμίσω ότι το αναφέραμε και αυτό Cross-platform SysJoker backdoor attacks Windows, macOS και Linux και αυτό Οι χάκερ στέλνουν βιογραφικά με κακόβουλο λογισμικό more_eggs στους υπεύθυνους προσλήψεων.

Malwarebytes also published a separate backdoor report, noting that the entire program flow is explicitly defined as a state machine. In simple words, the machine will change its state depending on the command sent to each state.

States include:

  1. The initial state in which the backdoor receives the launch command;
  2. Livestate, in which the backdoor connects to the C&Διακομιστής C, waiting for a command;
  3. Sleep mode;
  4. Receiving state, in which the backdoor accepts commands from the C&Διακομιστής C;
  5. Operational state in which the backdoor executes commands;
  6. Submission state, in which the results of command execution are sent to attackers.
Malwarebytes researchers believe that the backdoor targets a specific victim, and that the attacker has some knowledge of the internal infrastructure of the target’s systems.

Helga Smith

Ενδιαφέρομαι πάντα για τις επιστήμες των υπολογιστών, ειδικά την ασφάλεια δεδομένων και το θέμα, που ονομάζεται σήμερα "επιστημονικά δεδομένα", από τα πρώτα μου χρόνια. Πριν μπείτε στην ομάδα κατάργησης ιών ως αρχισυντάκτης, Εργάστηκα ως ειδικός στον τομέα της ασφάλειας στον κυβερνοχώρο σε πολλές εταιρείες, συμπεριλαμβανομένου ενός από τους εργολάβους της Amazon. Μια άλλη εμπειρία: Έχω διδάξει σε πανεπιστήμια Arden και Reading.

Αφήστε μια απάντηση

Αυτό το site χρησιμοποιεί Akismet να μειώσει το spam. Μάθετε πώς γίνεται επεξεργασία των δεδομένων σας σχόλιο.

Κουμπί Επιστροφή στην κορυφή