Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security //

Malware detection

1/29/2018
09:05 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

OilRig's Use of RGDoor Shows Sophistication of Nation-State Attacks

OilRig, a group linked to Iran, has been installing RGDoor, a secondary backdoor that can reopen a system even if it's been fixed. Its use shows how sophisticated nation-state attacks are becoming.

An Iran-linked group called OilRig has been conducting cyber espionage since at least 2015. Its latest escapade involves the Internet Information Services (IIS) servers that have been used by other Middle Eastern government organizations, as well as financial and educational institutions.

What the group does with the IIS servers is to put a backdoor on them called the TwoFace webshell. This shell will in turn enable the Mimikatz tool, which is used to snarf up the login credentials of users. Having those available, OilRig can get to anything on the server.

The shell is multilayered, and able to live in the server undetected and functional for long periods of time. This gives it a big strategic advantage over other methods of compromise. The longer it can be active, the more credentials it can send back to its creator.

(Source: Tama66 via Pixabay)

Additionally, the TwoFace webshell can spread laterally, replicating itself on other connected web servers which can then be compromised.

Palo Alto Networks Inc. has recently discovered that TwoFace has another trick up its sleeve -- one that takes it beyond the kind of threat usually seen.

TwoFace installs a secondary backdoor on top of itself, called RGDoor. It can allow OilRig to re-compromise the affected server if the TwoFace shell is discovered and mediated.

RGDoor seems to have been created in C++, ending up as a compiled dynamic link library (DLL).

IIS has a feature where DLLs can extend its capabilities to help carry out custom actions on requests. This is the manner that RGDoor acts.

"This backdoor has a rather limited set of commands, however, the three commands ['cmd$,' 'upload$' and 'download$' -- ed.] provide plenty of functionality for a competent backdoor, as they allow an actor to upload and download files to the sever, as well as run commands via command prompt," according to Palo Alto.

This kind of detailed planning about a target shows the seriousness of OilRig's threat.

Once the group gets hold of the server, even if the primary malware is nullified, OilRig has a backup plan in place to continue its campaign. The backdoor within the backdoor is both functional and works by other methods than the primary backdoor does.

This kind of campaign shows the sophistication and stealth techniques that nation-states will use to obtain their goals. They do not make the same kinds of errors that an adversary, which has limited financial goals, will make.

An attack launched by this kind of threat actor requires defenders to consider the kinds of alternatives that may not be necessary in simple breaches.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41154
PUBLISHED: 2021-10-18
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions an attacker with read access to a "SVN core" repository could execute arbitrary SQL queries. The following versions contain the fix: Tuleap Community Edition 11.1...
CVE-2021-41155
PUBLISHED: 2021-10-18
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not sanitize properly user inputs when constructing the SQL query to browse and search revisions in the CVS repositories. The following versions contain the fix...
CVE-2021-41152
PUBLISHED: 2021-10-18
OpenOlat is a web-based e-learning platform for teaching, learning, assessment and communication, an LMS, a learning management system. In affected versions by manipulating the HTTP request an attacker can modify the path of a requested file download in the folder component to point to anywhere on t...
CVE-2021-41153
PUBLISHED: 2021-10-18
The evm crate is a pure Rust implementation of Ethereum Virtual Machine. In `evm` crate `< 0.31.0`, `JUMPI` opcode's condition is checked after the destination validity check. However, according to Geth and OpenEthereum, the condition check should happen before the destination validity check. Thi...
CVE-2021-41156
PUBLISHED: 2021-10-18
anuko/timetracker is an, open source time tracking system. In affected versions Time Tracker uses browser_today hidden control on a few pages to collect the today's date from user browsers. Because of not checking this parameter for sanity in versions prior to 1.19.30.5601, it was possible to craft ...