Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/21/2015
08:00 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

AlienSpy RAT Resurfaces In Case Of Real-Life Political Intrigue

Mysterious death of Argentinian politician potentially tied to his phone's infection with popular remote access tool.

It's a storyline that sounds ripped right from the pages of a spy novel. An Argentinian prosecutor dies in his apartment under mysterious circumstances. The death happens the day before he's due to testify to his country's legislature—he's going to claim a cover-up by the Argentinian president of details about a bombing that happened decades ago. Just a day prior he tells a journalist he fears for his life.

And now, months after his death, cybersecurity researchers are finding details falling into place that show his phone was completely owned by a unique version of the AlienSpy remote access tool (RAT). The circumstances around the infection of Alberto Nisman's Motorola phone were sussed out by Morgan Marquis-Boire, the director of security at First Look Media, who at Black Hat USA last month reported publicly what he found. According to researchers following up this week with further analysis of this incarnation of AlienSpy, the whole situation shows the human significance that digital attacks can have in situations like these.

"Attacks in the digital world are often a consequence of ongoing events in the real world," says Thoufique Haq, security researcher for Proofpoint, which this week released some findings from its analysis of the payload that Marquis-Boire believes sat on Nisman's phone for 6 weeks. "It is unclear whether this attack payload has any relevance to death of Alberto Nisman, but the payload analyzed nonetheless shows how the immense capability that a malware payload provides."

First brought to the forefront of the security limelight last April, AlienSpy is a more advanced refinement of previous RATs like Frutus and Adwind. In addition to keeping the core ability of completely compromising remote systems and mobile devices, AlienSpy's differentiator for attackers has been its sandbox evasion and antimalware disabling features. According to experts at Fidelis who first brought attention to AlienSpy this spring, the tool was being used to deliver the Citadel banking Trojan and to maintain persistence particularly within targeted critical infrastructure companies.

In this specific instance, Marquis-Boire discovered the connection to AlienSpy after reading an account this summer that gave the full file name of a JAR file that seemed to be the payload that infected Nisman's phone. When Marquis-Boire looked it up on VirusTotal, the search came up with only a single instance of that file. According to Proofpoint, that file itself may not have even been the intended payload for the prosecutor's phone.

"Android payloads are typically APKs (Android Application Package) or native binaries compiled for ARM processors," Haq says. "While technically possible, it is not trivial to get JAR payloads to run on an Android operation system without installing a Java emulation engine. Instead, it is more likely that the payload was intended to be loaded on a desktop environment but may have been inadvertently downloaded on the Android phone, possibly through email or another vector."

Nevertheless, it did provide a valuable breadcrumb in the analysis of this particular instance of AlienSpy, which Haq reports packaged up that JAR in an additional layer of obfuscation that's not usually seen in most AlienSpy payloads in the wild. The payload showed a considerable range of features, says Haq, explaining that they were extensible through secondary plug-ins that could be pushed down to the targeted machine. While the analysis proved a good academic exercise, it is unlikely that any researcher will be able to use it to figure out who exactly placed it on Nisman's phone. But it does stand as yet another example in the growing cadre of RATs that are used both for political and economic espionage today.

"RATs such as AlienSpy constitute powerful surveillance tools that would enable them to observe and collect information on the communications and actions of adversaries," Haq says. "As we continue to observe ‘crossover’ in the traditional targeting of state actors and cybercriminals, public and private organizations need to be on alert for phishing and other attacks designed to deliver RATs such as AlienSpy onto client systems."

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
12/29/2016 | 7:03:14 AM
Lesson to the Wise (or Less So)
Looking back on stories like this should be a reminder to anyone who works in a field that is related to secure information, political strategy or anything that requires you to stay off the grid.  While I don't condone this victim's actions, privacy and the ability to be anonymous are important to everyone.  Know your devices, wipe them regularly, interact with only secured and validated apps, turn off Bluetooth and wireless access unless exchanging encrypted data, and etc.  Look to this story if ever you doubt what is possible and what is being done now; educate yourself in privacy. 
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Planned vacation simulation
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10100
PUBLISHED: 2019-07-15
couchcms 2 is affected by: Web Site physical path leakage. The impact is: disclosure the full path. The component is: includes/mysql2i/mysql2i.func.php and addons/phpmailer/phpmailer.php. The attack vector is: network connectivity.
CVE-2019-10100
PUBLISHED: 2019-07-15
borg-reducer c6d5240 is affected by: Buffer Overflow. The impact is: Possible code execution and denial of service. The component is: Output parameter within the executable.
CVE-2019-10103
PUBLISHED: 2019-07-15
Saleor Issue was introduced by merge commit: e1b01bad0703afd08d297ed3f1f472248312cc9c. This commit was released as part of 2.0.0 release is affected by: Incorrect Access Control. The impact is: Important. The component is: ProductVariant type in GraphQL API. The attack vector is: Unauthenticated use...
CVE-2019-10103
PUBLISHED: 2019-07-15
libmspack 0.9.1alpha is affected by: Buffer Overflow. The impact is: Information Disclosure. The component is: function chmd_read_headers() in libmspack(file libmspack/mspack/chmd.c). The attack vector is: the victim must open a specially crafted chm file. The fixed version is: after commit 2f084136...
CVE-2019-10103
PUBLISHED: 2019-07-15
Slanger 0.6.0 is affected by: Remote Code Execution (RCE). The impact is: A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is: Message handler & request validator. The attack vector is: Remote unauthenticated. The fixed version is: after ...