Attacks/Breaches
7/18/2012
12:23 PM
Connect Directly
RSS
E-Mail
50%
50%

Mahdi Malware Hits Middle Eastern Targets

Despite attacking critical infrastructure, financial services, and government embassy targets in Iran and Israel, the "Messiah" malware doesn't appear to tie directly to Flame.

Two security firms this week disclosed that they're working to eradicate a malware campaign that targets users in several Middle Eastern countries and which has been active for at least eight months.

The attackers used malware that's been dubbed "Mahdi"--which in Islamic eschatology is synonymous with Messiah--by Seculert, which said it discovered the malware several months ago, and found the word Mahdi used in multiple strings of code. Interestingly, the malware was introduced via a spear-phishing attack that included a fake Microsoft Word document. Opening the attachment would execute the malware, as well as open a copy of a Daily Beast article analyzing Israel's potential electronic warfare capabilities against Iran.

After Kaspersky Lab announced in May 2012 that it had discovered the Flame malware, Seculert said it reached out to the security firm to help it ascertain whether Flame and Mahdi might be connected. But so far, the security firms said there's no evidence of a link, although the targets are similar.

"While we couldn't find a direct connection between the campaigns, the targeted victims of Mahdi include critical infrastructure companies, financial services, and government embassies, which are all located in Iran, Israel, and several other Middle Eastern countries," according to a blog post from Seculert. So far, victim systems have been located as being in Iran (387 infected systems found), Israel (54), Afghanistan (14), United Arab Emirates (6), and Saudi Arabia (4).

[ Learn One Secret That Stops Hackers: Girlfriends. ]

"Large amounts of data collection reveal the focus of the campaign [is] on Middle Eastern critical infrastructure engineering firms, government agencies, financial houses, and academia," and some targets appear to have been monitored by attackers for extended periods of time, according to an analysis published by the global research and analysis team at Kaspersky Lab. "The campaign relied on a couple of well-known, simpler attack techniques to deliver the payloads, which reveals a bit about the victims' online awareness"--or lack thereof, it said.

As of Tuesday, the malware campaign appeared to still be operating. "We are working with various organizations to clean up and prevent further infections," said Kaspersky. According to Seculert, to date it's identified four command-and-control servers running the Mahdi-related malware.

Mahdi's authors preferred to distribute their malware via social-engineering attacks, disguising their malware as legitimate PowerPoint file slideshows, or sending out executables with filenames that were disguised to make them look like images or PDF files. Running the executable or paging through the PowerPoint slideshow, meanwhile, would trigger a malicious Trojan dropper file to download further malware onto the targeted device, giving attackers a backdoor to the system.

"The backdoors that were delivered to approximately 800 victim systems were all coded in Delphi," said Kaspersky. "This would be expected from more amateur programmers, or developers in a rushed project." Furthermore, the malicious executables appear to be repackaged--using legitimate compression software--on a regular basis, which means the "quickly shifting code will get the code past some gateway security products."

What's interesting about Mahdi is that the attack only appears to be as complex as it needed to be. "Most of the components are simple in concept, but effective in practice," according to Kaspersky. "No extended zero-day research efforts, no security researcher commitments or big salaries were required. In other words, attacking this set of victims without zero-day--in this region--works well enough."

That differentiates the malware from Flame, which was built using world-class cryptographic expertise. Notably, Flame's creators found a way to spoof the Microsoft signing service, allowing them to install entire copies of the malicious application automatically, using the Windows Update functionality built into all versions of Microsoft Windows.

While Mahdi is simple by comparison, it still offers attackers a range of monitoring capabilities, including logging all keystrokes on the device, capturing screenshots at preset intervals or when triggered by specified events, such as the user actively using Facebook, Gmail, Google+, Hotmail, Skype, or Yahoo Mail. In addition, the backdoor software could download additional functionality; analyze the disk structure of the infected PC; and record audio as a .WAV file. Additional functionality, including enabling the malware to automatically delete itself, appears to have been added in but not finalized.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4884
Published: 2014-10-21
The Conrad Hotel (aka com.wConradHotel) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-4885
Published: 2014-10-21
The CPWORLD Close Protection World (aka com.tapatalk.closeprotectionworldcom) application 3.4.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-4887
Published: 2014-10-21
The Joint Radio Blues (aka com.nobexinc.wls_69685189.rc) application 3.2.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-4888
Published: 2014-10-21
The BattleFriends at Sea GOLD (aka com.tequilamobile.warshipslivegold) application 1.1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-4889
Published: 2014-10-21
The Diabetic Diet Guide (aka com.wDiabeticDietGuide) application 2.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.