Attacks/Breaches

8/18/2017
03:09 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Russian-Speaking APT Engaged in G20 Themed Attack

A newly discovered dropper for the KopiLuwak backdoor suggests that the Turla group is back at it again, Proofpoint says.

Turla, a long operating advanced persistent threat group (APT) with presumed ties to the Russian government, appears to be actively targeting G20 participants and those interested in its activities including policymakers, member nations and journalists.

That analysis is based on the discovery of a new JavaScript dropper for a backdoor called KopiLuwak that Turla has been known to use.

Security vendor Proofpoint, which recently discovered the dropper on a public malware repository, described it as being delivered with a benign decoy document inviting people to a G20 Digital Economy Taskforce meeting in Hamburg this October. The dropper first surfaced in mid-July suggesting that the campaign is a new and potentially ongoing one, Proofpoint said in a blog.

Kevin Epstein, vice president of Proofpoint's threat operations center, says the dropper is most likely being delivered to targets via spear phishing emails. Targets receive an email containing a decoy "Save The Date" invitation to the October G20 taskforce meeting.

The invitation appears to be a PDF but is actually an executable Program Information File (PIG) with a set of instructions for dropping KupiLuwak on the computer. When a recipient double-clicks on the PDF icon, the PIF basically causes the decoy document to open normally while in the background it quietly installs the backdoor. In addition to installing KopiLuwak, the JavaScript dropper is also designed to profile the victim system and to establish persistence on it.

The decoy document itself appears to be a genuine invitation to the G20 task force meeting and was likely stolen. The invitation is not publicly available so the fact that the Turla group is using it as a decoy suggests that an entity with legitimate access to the invitation has already been compromised. Another possibility is that the invitation was legitimately obtained from a recipient, Proofpoint said.

Once installed on a system, KupiLuwak enables attackers to take complete control of it and carry out a variety of malicious actions, Epstein says.  "It can be commanded to download and execute arbitrary files. They can run a keylogger or activate the camera or microphone, read documents or put in a browser extension that copies your passwords. They own you."

The subject matter of the decoy document and Turla's background suggests that the latest campaign is designed to gather key information related to G20 from participants and others associated with it, Epstein says.

That, however, does not mean that others shouldn't be paying attention to such APT campaigns as well, he says. Increasingly, cybercriminals have begun copying and adopting the tactics used by APT groups in carrying out financially motivated attacks.

"Just because you think you are not an APT target is not a reason to underspend on security," Epstein says. "The tactics used be every day cybercriminals are absolutely comparable to the more sophisticated actors out there."

Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Click for more info and to register.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Jai Vijayan, Freelance writer,  2/12/2019
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark Reading,  2/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8354
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
CVE-2019-8355
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
CVE-2019-8356
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.
CVE-2019-8357
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.
CVE-2013-2516
PUBLISHED: 2019-02-15
Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell.