Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
OilRig, a group linked to Iran, has been installing RGDoor, a secondary backdoor that can reopen a system even if it's been fixed. Its use shows how sophisticated nation-state attacks are becoming.
January 29, 2018
3 Min Read
An Iran-linked group called OilRig has been conducting cyber espionage since at least 2015. Its latest escapade involves the Internet Information Services (IIS) servers that have been used by other Middle Eastern government organizations, as well as financial and educational institutions.
What the group does with the IIS servers is to put a backdoor on them called the TwoFace webshell. This shell will in turn enable the Mimikatz tool, which is used to snarf up the login credentials of users. Having those available, OilRig can get to anything on the server.
The shell is multilayered, and able to live in the server undetected and functional for long periods of time. This gives it a big strategic advantage over other methods of compromise. The longer it can be active, the more credentials it can send back to its creator.
(Source: Tama66 via Pixabay)
Additionally, the TwoFace webshell can spread laterally, replicating itself on other connected web servers which can then be compromised.
Palo Alto Networks Inc. has recently discovered that TwoFace has another trick up its sleeve -- one that takes it beyond the kind of threat usually seen.
TwoFace installs a secondary backdoor on top of itself, called RGDoor. It can allow OilRig to re-compromise the affected server if the TwoFace shell is discovered and mediated.
RGDoor seems to have been created in C++, ending up as a compiled dynamic link library (DLL).
IIS has a feature where DLLs can extend its capabilities to help carry out custom actions on requests. This is the manner that RGDoor acts.
"This backdoor has a rather limited set of commands, however, the three commands ['cmd$,' 'upload$' and 'download$' -- ed.] provide plenty of functionality for a competent backdoor, as they allow an actor to upload and download files to the sever, as well as run commands via command prompt," according to Palo Alto.
This kind of detailed planning about a target shows the seriousness of OilRig's threat.
Once the group gets hold of the server, even if the primary malware is nullified, OilRig has a backup plan in place to continue its campaign. The backdoor within the backdoor is both functional and works by other methods than the primary backdoor does.
This kind of campaign shows the sophistication and stealth techniques that nation-states will use to obtain their goals. They do not make the same kinds of errors that an adversary, which has limited financial goals, will make.
An attack launched by this kind of threat actor requires defenders to consider the kinds of alternatives that may not be necessary in simple breaches.
— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.
Read more about:Security Now
About the Author(s)
Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He has written a book on the Secure Electronic Transaction Internet protocol. His latest book has the commercially obligatory title of Hack Proofing XML. He's been online since uucp "bang" addressing (where the world existed relative to !decvax), serving as editor of the Macintosh Exchange on BIX and the VARBusiness Exchange. His first Mac had 128 KB of memory, which was a big step up from his first 1130, which had 4 KB, as did his first 1401. You can e-mail him at [email protected].
You May Also Like
A screen displaying many different types of charts and graphs to show what data is being analyzed.Cybersecurity Analytics