Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/10/2018
05:19 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

New Threat Group Conducts Malwareless Cyber Espionage

Gallmaker group is relying exclusively on legitimate tools and living-off-the-land tactics to make detection very difficult.

Cybercriminals seeking to avoid detection by antimalware defenses have increasingly begun using legitimate hacking tools and tactics — in addition to their own malware — to break into enterprise networks and literally hide in plain sight. Now a new and likely state-sponsored threat group has emerged that isn't using any custom malware at all.

Instead, the group is exclusively relying on publicly available hacking tools and living-off-the-land tactics to conduct an especially stealthy and hard-to-detect cyber espionage campaign.

Symantec, which was the first to spot the group, has named it Gallmaker. In a report this week, the security vendor described Gallmaker as targeting government and military organizations in Eastern Europe and the Middle East. The group's targets have included several overseas embassies of a country in Eastern Europe, and also a defense contractor in the Middle East.

Gallmaker's targeting and its use of political- and diplomatic-themed lure documents to gather information from victims suggests it is an espionage-motivated group says Jon DiMaggio, senior threat intelligence analyst at Symantec.

"The type of targets seen in the attacks really fit that of what an espionage group would be interested in," DiMaggio says. "If simply for financial gain, it would be odd [for Gallmaker] to restrict targets to diplomatic, military, and defense personnel."

Gallmaker appears to have started operations in December 2017 and its most recently observed campaign was in June 2018. What makes the group interesting is the fact that it does not use malware at all in carrying out operations. Rather, Gallmaker exclusively has been using only tools and protocols that many organizations use for benign purposes, such as for penetration testing and for data archiving and compression.

"Gallmaker takes advantage of legitimate protocols and uses them in a manner that they were not designed for," DiMaggio says.

The group's modus operandi has been to send Office lure documents to individuals at targeted organizations which when opened give the attackers a way to remotely execute commands in the victim system's memory using Microsoft's Office Dynamic Data Exchange (DDE) protocol.

Once on a system, the attackers have then been executing various tools in memory on the victim system, making their activities hard to spot and to stop.

DDE is a protocol that enables messages to be sent between Microsoft apps that share data, such as between Word and Excel. Microsoft issued an update last December that disabled DDE by default after several malicious campaigns in which attackers executed malicious code on systems via Word and Excel. The victims of the Gallmaker campaign do not appear to have installed the patch and are therefore still vulnerable to attack via DDE, Symantec said in its report.

Gallmaker has been using DDE "to effectively run Rex Powershell scripts, which then allow the attacker to make a reverse TCP shell connection via the publicly available Metaspolit pen test tool," DiMaggio says.

Once the attackers have gained remote control of a system, they have been downloading a legitimate WinZip console for packing and compressing data of interest for exfiltration, he notes. The command-and-control servers used by Gallmaker have all been IP addresses and not domain names.

One reason such activity can be hard to spot is because it can appear very much like legitimate processes. Rex Powershell for instance is a library that is designed to interact with the Metasploit penetration testing suite, DiMaggio says. Metasploit is the go-to tool for legitimate pen testers and its presence on a network may not always been seen as a sign of malicious activity. Similarly, WinZip is a legitimate archive and file compression tool that is commonly found in many organizations.

In fact, the only way that Symantec itself discovered Gallmaker's activity was when one of the company's security tools identified the execution of DDE followed by Powershell commands at a customer site. Symantec's investigation of the activity quickly revealed that it was not legitimate, DiMaggio says.

"Living off the land is definitely on the rise as a tactic," he says. Cybercriminals are adopting the tactic to make it harder for defenders to identify and mitigate their malicious activity. "Often this activity will blend in with legitimate operational activity conducted by administrators," he says.

The trend highlights the need for a multi-tiered defensive strategy that combines the use of firewalls, intrusion prevention systems, and endpoint protection tools. Enterprises also need to make sure to monitor and restrict the use of administrative tools on their networks, he adds.

Threat intelligence sharing can help enable better defenses as well, says Neil Jenkins, chief analytic officer at the Cyber Threat Alliance (CTA), a group of about 20 security vendors committed to sharing threat data with each other. Symantec, which is a member of CTA, for instance, shared indicators of compromise and other Gallmaker-related data with other members of the group before releasing the data publicly.

Such sharing can give security vendors access to a broader set of data than that to which they normally have access, thereby enabling better defenses, Jenkins says.

"Our members acknowledge that they cannot see the full picture when it comes to cybersecurity and that it takes a community approach," he says. "Sharing information enables our members to see the big picture and then compete on the effectiveness on how they use this information."

Related Content:

 

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4719
PUBLISHED: 2020-09-24
The client API authentication mechanism in Pexip Infinity before 10 allows remote attackers to gain privileges via a crafted request.
CVE-2020-15604
PUBLISHED: 2020-09-24
An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CW...
CVE-2020-24560
PUBLISHED: 2020-09-24
An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CW...
CVE-2020-25596
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. T...
CVE-2020-25597
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. Howeve...