Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/12/2020
03:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

New 'CostaRicto' Hack-for-Hire Group Targets Global Businesses

The group of APT mercenaries uses bespoke malware and strong operation security to target a range of organizations, located primarily in Southeast Asia.

A new hack-for-hire group has been employing custom malware in attacks that target disparate victims worldwide, with the largest concentration in South Asia, BlackBerry researchers report.

Related Content:

Like the Energizer Bunny, Trickbot Goes On and On

The Changing Face of Threat Intelligence

New on The Edge: We Secured the Election. Now How Do We Secure Trust in Results?

This group of advanced persistent threat (APT) mercenaries, dubbed "CostaRicto" by BlackBerry's Research and Intelligence Team, has targeted organizations in countries across Europe, the Americas, Africa, Australia, and Asia, particularly in India, Bangladesh, and Singapore. While CostaRicto has been on the team's radar since January 2020, it estimates it has been active since around late 2019.

The emergence of this group underscores a broader trend of mercenary APT groups appearing on the threat landscape. These attackers' tactics, techniques, and procedures (TTPs) resemble those seen in advanced nation-state attacks, but their victims' profiles and geographies are too diverse to be aligned with a single attacker's goals.

Consider CostaRicto, which uses a combination of bespoke malware and off-the-shelf tools to infiltrate target organizations. Tom Bonner, distinguished threat researcher with BlackBerry, says the most interesting aspects of its operations are SombRAT, a new custom backdoor that emerged in October 2019, and CostaBricks, a custom virtual machine-based payload loader. 

"We've not seen [SombRAT] before; it doesn't relate to any other actors we've observed previously," says Bonner. It's a "fairly interesting" backdoor as well, he continues, noting it's written in C++, a trait that makes it "hideous to pull apart and go through." 

Once group members gain access to a target environment, they are careful about deploying this malware, he explains. The backdoor will never reside on the file system unencrypted. Attackers go to great lengths to ensure the binaries they're using appear only in memory. Their creation of a virtual machine-based loader in CostaBricks is another sign of the attackers' skill level.

"They're really putting many layers of obfuscation over their malware … to try and evade detection from antivirus and EDR products, and other monitoring or behavioral analysis on the system," Bonner says. Operational security is also strong: Its command-and-control servers are managed via Tor and/or through a layer of proxies, and it creates a complex network of SSH tunnels in the victim's environment. 

In a writeup of their findings on CostaRicto, researchers say their tools' constant development, detail versioning system, and well-structured code that allow for expansion of functionality all indicate the group's tool set is part of a long-term project rather than a one-off campaign. Eric Milam, vice president of research operations at BlackBerry, anticipates they could be preparing for a large-scale attack. Right now, it's unclear exactly what its motivations are.

"They seem to be laying the groundwork for something bigger," he says, noting much of their activity was intended to hide lateral movement, conceal data exfiltration, and other tasks.

SombRAT indicates the group is well-funded and has a level of sophistication beyond simply grabbing things off the shelf, though it does also use PowerSploit's reflective PE injection modules, nmap port scanner, and PsExec in its operations. As with other hack-for-hire groups, custom malware and other new techniques can throw investigators off the attackers' scent. 

"It's making our lives a lot harder to try and track down the original threat actors, once they've engaged with the mercenaries to carry out their attacks," Bonner explains. "All of a sudden we're faced with new TTPs and indicators and things like that; they don't look like previous known campaigns we've monitored." These factors, combined with disparate targeting across several geographies, can make the already-difficult task of attribution even more challenging. 

The Growing Pattern of Hack-for-Hire Organizations
The growth of organized cybercrime has allowed attackers to specialize, and profit, in what they're good at. Some are skilled at developing ransomware applications; others are handy in breaking into managed security service providers. This enables them to help each other conduct more effective attacks.

Hack-for-hire operations have emerged from this trend and are poised to continue growing. While they help advanced attackers hide their activity, that isn't the only reason, Milam says.

"I always picture these folks as an organization much like outs, where there's different projects and different leaders," he explains. "I think it's just easier for attackers to outsource things to a trusted entity, and I think we're going to see a lot more nation-states do that."

Researchers noted several similarities between CostaRicto and Bahamut, another mercenary group involved in attacks targeting government businesses and officials in the Middle East and South Asia. Similar to Bahamut, CostaRicto is clear in its targets, has strong operational security, and uses bespoke malware in its attacks. "Those all smell a lot like Bahamut," he says, especially considering the region, but researchers couldn't definitively connect the two groups. 

"The high-level strokes all appear to be the same," Milam says. "They appear to be working out of the same region [and have] completely disparate targets that make no sense. Nation-states usually have a rhyme or reason to be attacking the way they're attacking, most obviously geopolitically motivated. These folks seem to be willing to take on whatever target is paid for."

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25660
PUBLISHED: 2020-11-23
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph...
CVE-2020-25688
PUBLISHED: 2020-11-23
A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a...
CVE-2020-25696
PUBLISHED: 2020-11-23
A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating sy...
CVE-2020-26229
PUBLISHED: 2020-11-23
TYPO3 is an open source PHP based web content management system. In TYPO3 from version 10.4.0, and before version 10.4.10, RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability...
CVE-2020-28984
PUBLISHED: 2020-11-23
prive/formulaires/configurer_preferences.php in SPIP before 3.2.8 does not properly validate the couleur, display, display_navigation, display_outils, imessage, and spip_ecran parameters.