Researchers today published an analysis of advanced persistent threat (APT) group Evilnum, known for developing malware of the same name. A detailed look at its activity reveals an evolved toolset and infrastructure that combine custom malware with tools bought from malware-as-a-service (MaaS) providers.
Evilnum has been around for at least two years, according to Matías Porolli, a malware researcher at ESET, which has been tracking the malware's operations since April. The group has historically targeted financial technology companies that offer training and investment platforms. Its attacks are few in number but very specific. This, combined with Evilnum's use of legitimate tools in its activity, has helped the group fly mostly under the radar.
While Evilnum's malware has been active since 2018, little is known about how it operates. ESET began its research when one of its automated systems flagged a malicious sample for an Evilnum custom components, says Porolli. Analysis revealed the code was related to an earlier report; telemetry data helped connect the dots and learn more about how Evilnum functions.
Most of the group's targets are located in the EU and UK, though some attacks have landed in Australia and Canada. Organizations usually have offices in several locations, which could explain the group's geographical range.
Evilnum's primary goal is to spy on its targets and steal financial data from businesses and their customers. Its attackers have previously stolen spreadsheets and documents with customer lists, investments, and trading operations; internal presentations; software licenses and credentials for trading software and platforms; browser cookies and session data; email credentials; credit card information; and proof of address and identity documents. The group has also obtained access to VPN configurations and other IT-related information.
"The emails take advantage of 'know your customer' regulations," Porolli explains. "Most of the malicious samples that they used in spear-phishing emails pretended to be photos of identity cards, credit cards, or bills with proof of address for account verification purposes. Financial institutions are required to verify such documents to prevent illegal activities, so the malicious emails may get mixed with legitimate verification emails from real customers."
It's assumed these decoy documents are legitimate and have been collected from other attacks, as Evilnum targets support representatives and account managers who receive these kinds of files. Attackers collect and reuse the documents on different businesses within the same region.
Building Blocks of Evilnum Infrastructure
"This group keeps each of its malicious components independent from each other, with dedicated servers," Porolli explains. "They don't reuse their infrastructure from attacks documented in the past, which makes it harder for analysts to track them."
The group's attackers also use backdoors – some custom, others purchased – which give them more options to maintain control over their victims and backup options in case one of their backdoors is removed. The length of time they remain on a network varies depending on the target's security, Porolli continues, but they can try to break in again if they lose control.
In some attacks, Evilnum attackers deploy tools purchased from the Golden Chickens MaaS provider. These shops sell malicious binaries and needed infrastructure, such as C2 servers. Golden Chickens also sells to FIN6 and Cobalt Group, Porolli says; older versions of components that Evilnum uses were seen in other groups' attacks. Researchers don't believe these groups are the same, but they happen to share a MaaS provider. Other groups using Golden Chickens also had financial targets, and it has a strong reputation on the black market.
While not much is known about how they use stolen data, Porolli points out their operation is profitable enough to invest in MaaS components. This model gives attackers both malware and an infrastructure that's unlikely to be traced back to them.
"We've seen this group going for redundancy and independence of their malicious components in order to persist longer in a target's network," he adds.
More details about the operation can be found in Porolli's full analysis.