Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV //

Malware

4/17/2019
01:10 PM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Servers Discovered With Multiple Malware Families, Staged & Ready to Launch

Bromium has uncovered US-based web servers that are being used to host and distribute these kinds of malware including banking trojans, information stealers and ransomware.

You're a wizened cyber criminal, used to buying exploits from dark websites so that you can unleash upon an unsuspecting populace your nefarious schemes and gain untold profits.

But there's one practical problem. You have to stash the malware somewhere, and then make it appear when you are ready to slash and burn.

Bromium has uncovered US-based web servers that are being used to host and distribute these kinds of malware including banking trojans, information stealers and ransomware.

They found that between May 2018 and March 2019 showed threats like these were originating from web-servers registered under the name PONYNET. This was found to be hosted on BuyVM data centers in Las Vegas, Nevada. Lastly, BuyVM is owned by FranTech solutions, a so-called "bulletproof hosting provider" which has links to far-right websites like the Nazi site the Daily Stormer.

The New Yorker magazine has an interesting profile about FranTech and Francisco Dias, the founder of FranTech and two affiliated companies, BuyVM and Buyshared. BuyVM sells virtual private server (VPS) hosting services and is located in Las Vegas, NV. Bromium says that Dridex, Gootkit, IcedID, Nymaim, Trickbot, Fareit, Neutrino, AZORult, Gandcrab and Hermes have all been traced back to the FranTech websites.

The Bromium blog notes that multiple malware families were staged on the same web servers and subsequently distributed through mass phishing campaigns. Now, reusing the servers to host different malware indicates the involvement of a common element in the activities of different malware operators. The variety of malware families hosted, and the apparent separation of command and control (C2) from email and hosting infrastructure, suggests the existence of distinct threat actors: one responsible for email and hosting and others in charge of operating the malware.

The servers Bromism identified were found to be using similar software builds, default installations of CentOS and Apache HTTP Server versions 2.4.6 or 2.2.15. The malicious executables that were found were nearly always hosted in their root directory.

Traces of these servers were also found in the attack vectors. Nearly all of the campaigns delivered phishing emails with Microsoft Word documents that contained malicious VBA macros. The emails and infected documents used in the campaigns were all English and targeted US companies -- 42% of infected documents claimed to be job applications or CVs and a further 21% posed as unpaid invoices The phishing emails also contained a hyperlink to a domain which pointed to one of the malware distribution servers. A deep analysis of the macros that were used in the Word droppers found that they all contained a hard-coded IP address of the web server hosting the second-stage malware used in the attack, rather than a domain name. Multiple malware families were found to be hosted on the same server, or could be used in conjunction with each other where one would act as a dropper for the other.

Bromism saw this in July and August 2018 campaigns that delivered AZORult, an information stealer. That, in turn, downloaded the Hermes ransomware. Both types of malware were hosted on the same server.

One unusual aspect to all of this is that the web server enforced HTTP basic authentication as a means of preventing the executable from being downloaded without a correct username and password. It is likely that this was implemented to impede investigations by network defenders and researchers because analysis of the payload requires access to the Word dropper or sources of network traffic containing the HTTP request, such as proxy logs or full packet capture.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32693
PUBLISHED: 2021-06-17
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. A vulnerability related to firewall authentication is in Symfony starting with version 5.3.0 and prior to 5.3.2. When an application defines multiple firewalls, the token authenticated by one of the fir...
CVE-2021-32424
PUBLISHED: 2021-06-17
In TrendNet TW100-S4W1CA 2.3.32, due to a lack of proper session controls, a threat actor could make unauthorized changes to an affected router via a specially crafted web page. If an authenticated user were to interact with a malicious web page it could allow for a complete takeover of the router.
CVE-2021-32426
PUBLISHED: 2021-06-17
In TrendNet TW100-S4W1CA 2.3.32, it is possible to inject arbitrary JavaScript into the router's web interface via the "echo" command.
CVE-2021-32694
PUBLISHED: 2021-06-17
Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.15.1, a malicious application on the same device is possible to crash the Nextcloud Android Client due to an uncaught exception. The vulnerability is patched in version 3.15.1.
CVE-2021-32695
PUBLISHED: 2021-06-17
Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.16.1, a malicious app on the same device could have gotten access to the shared preferences of the Nextcloud Android application. This required user-interaction as a victim had to initiate the sharing flow and choose t...