伊朗APT石油鑽井平台使用新嘅埼玉後門

4月下旬 2022, Fortinet and Malwarebytes security researchers discovered a malicious Excel document sent by the OilRig hacker group (also known as APT34, Helix Kitten, and Cobalt Gypsy) to a Jordanian diplomat to inject a new backdoor called Saitama.

The phishing email came from a hacker disguised as an employee of the IT department of the Ministry of Foreign Affairs. The attack was discovered after the recipient forwarded the email to a real IT employee to verify the authenticity of the email.

Like many of these attacks, the email contained a malicious attachment. 然而, the attached threat was not ordinary malware. 相反, it had the capabilities and methods commonly associated with targeted attacks (APTs).said Fortinet researcher Fred Gutierrez.

According to research notes provided by Fortinet, the macro uses WMI (Windows Management Instrumentation) to query its command and control (C&C) server and is capable of producing three files: a malicious PE file, a configuration file, and a legitimate DLL file. Written in .NET, 這 Saitama backdoor uses the DNS protocol to communicate with C&C and exfiltrate data, which is the stealthiest method of communication. Methods of masking malicious packets in legitimate traffic are also used.

Let me remind you that we also reported that Cross-platform SysJoker backdoor attacks Windows, macOS and Linux and that 黑客向招聘人員發送帶有more_eggs惡意軟件嘅簡歷.

Malwarebytes also published a separate backdoor report, noting that the entire program flow is explicitly defined as a state machine. In simple words, the machine will change its state depending on the command sent to each state.

States include:

  1. The initial state in which the backdoor receives the launch command;
  2. Livestate, in which the backdoor connects to the C&C服務器, waiting for a command;
  3. Sleep mode;
  4. Receiving state, in which the backdoor accepts commands from the C&C服務器;
  5. Operational state in which the backdoor executes commands;
  6. Submission state, in which the results of command execution are sent to attackers.
Malwarebytes researchers believe that the backdoor targets a specific victim, and that the attacker has some knowledge of the internal infrastructure of the target’s systems.

黑尔加·史密斯

我一直對電腦科學感興趣, 尤其是數據安全和主題, 而家被稱為 "數據科學", 由我十幾歲開始. 在進入病毒清除團隊擔任主編之前, 我曾喺多傢公司擔任網絡安全專家, 包括亞馬遜嘅承包商之一. 另一種體驗: 我在雅頓大學同雷丁大學任教.

留言

本網站使用Akismet嚟減垃圾郵件. 瞭解如何處理評論數據.

“返回頂部”按鈕