OilRig's Use of RGDoor Shows Sophistication of Nation-State Attacks
OilRig, a group linked to Iran, has been installing RGDoor, a secondary backdoor that can reopen a system even if it's been fixed. Its use shows how sophisticated nation-state attacks are becoming.
An Iran-linked group called OilRig has been conducting cyber espionage since at least 2015. Its latest escapade involves the Internet Information Services (IIS) servers that have been used by other Middle Eastern government organizations, as well as financial and educational institutions.
What the group does with the IIS servers is to put a backdoor on them called the TwoFace webshell. This shell will in turn enable the Mimikatz tool, which is used to snarf up the login credentials of users. Having those available, OilRig can get to anything on the server.
The shell is multilayered, and able to live in the server undetected and functional for long periods of time. This gives it a big strategic advantage over other methods of compromise. The longer it can be active, the more credentials it can send back to its creator.
(Source: Tama66 via Pixabay)
Additionally, the TwoFace webshell can spread laterally, replicating itself on other connected web servers which can then be compromised.
Palo Alto Networks Inc. has recently discovered that TwoFace has another trick up its sleeve -- one that takes it beyond the kind of threat usually seen.
TwoFace installs a secondary backdoor on top of itself, called RGDoor. It can allow OilRig to re-compromise the affected server if the TwoFace shell is discovered and mediated.
RGDoor seems to have been created in C++, ending up as a compiled dynamic link library (DLL).
IIS has a feature where DLLs can extend its capabilities to help carry out custom actions on requests. This is the manner that RGDoor acts.
"This backdoor has a rather limited set of commands, however, the three commands ['cmd$,' 'upload$' and 'download$' -- ed.] provide plenty of functionality for a competent backdoor, as they allow an actor to upload and download files to the sever, as well as run commands via command prompt," according to Palo Alto.
This kind of detailed planning about a target shows the seriousness of OilRig's threat.
Once the group gets hold of the server, even if the primary malware is nullified, OilRig has a backup plan in place to continue its campaign. The backdoor within the backdoor is both functional and works by other methods than the primary backdoor does.
This kind of campaign shows the sophistication and stealth techniques that nation-states will use to obtain their goals. They do not make the same kinds of errors that an adversary, which has limited financial goals, will make.
An attack launched by this kind of threat actor requires defenders to consider the kinds of alternatives that may not be necessary in simple breaches.
Related posts:
— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.
Read more about:
Security NowAbout the Author
You May Also Like
Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024