Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

6/25/2020
09:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

'GoldenSpy' Malware Hidden in Tax Software Spies on Companies Doing Business in China

Advanced persistent threat (APT) campaign aims to steal intelligence secrets from foreign companies operating in China.

A newly discovered attack campaign infiltrated a UK-based technology company via tax payment software required by a Chinese bank in order to conduct business in China.

Researchers at Trustwave found the so-called GoldenSpy malware during a threat-hunting operation on behalf of the victim UK company in mid-April. The UK company, which Trustwave did not disclose in its newly published research, has strong ties to the defense industry and does significant business in the US, Australia, and the UK; it recently opened operations in China.

Brian Hussey, Trustwave's vice president of cyber threat detection and response, says the attackers used a backdoor to take control of the UK company's network. To date, Trustwave has confirmed other such incidents at a software/technology company as well as at a major global financial institution.

"They [the attackers] could run Windows commands, create new users, move laterally and upload code to execute malware," Hussey says. "They could also potentially use the network access to exfiltrate data."

Hussey would not confirm the attackers were agents of the Chinese government, but did say they were motivated more by intelligence than financial gain. 

"Companies need to understand that there are risks to doing business in China and these kinds of attacks are possible," he says. "Once the attack was discovered, we segmented the network so the UK company could use the tax payment software to pay its local taxes, but the attackers no longer had access to the full network."

The Trustwave report goes on to lay out a pattern of suspicious behavior by GoldenSpy:

  • Continues to propagate even after deleted. GoldenSpy installs two identical versions of itself, both as persistent autostart services. If either stops running, it will respawn its counterpart. In addition, it uses an EXEProtector module that monitors for the deletion of either iteration of itself. If deleted, the malware will download and execute a new version. Trustwave believes that this triple-layer protection makes it exceedingly difficult to remove this kind of file from an infected system.
  • Hard to uninstall. The Intelligent Tax software's uninstall feature will not remove GoldenSpy. It leaves GoldenSpy running as an open backdoor into the environment, even after the tax software gets fully removed.
  •  Does not fully install for two hours. GoldenSpy does not download and install until a full two hours after the tax software installation process finishes. When it finally downloads and installs, it does so silently, with no notification. Trustwave considers this highly unusual and a method to hide from the victim.
  • Reaches out to suspicious domains. GoldenSpy does not contact the tax software's network infrastructure (i-xinnuo[.]com), rather, it reaches out to ningzhidata[.]com, a domain known to host other variants of the GoldenSpy malware. After the first three attempts to contact its command and control server, it randomizes beacon times to avoid network security technologies designed to identify beaconing malware. 

"They showed a lot of patience and discipline, which leads me to believe that this was an operation to gather intelligence," says Jake Williams, founder and president of Rendition Infosec. "Financially motivated attackers wouldn't look to play the long game by creating malware that slowly infiltrates the customers of the tax software company. Of course, once the news comes out, there are people who will believe that it was the Chinese [government] no matter what new information comes out, so I think it will be damaging to" them, he says.

Williams says it also could be another nation-state made to appear as if it's operating out of China. It's also interesting that tax software was used to infiltrate the UK company's systems, he notes, since tax software was also used in the NotPetya attack, which in the end caused more than $10 billion in damages. 

On the Hunt

Trustwave's Hussey said while doing routine threat analysis for its UK client, his research team found an executable file that displayed highly unusual behavior that sent system information to a suspicious Chinese domain. The processes were part of the bank's required software for paying local taxes, called Intelligent Tax, which  was developed by the Golden Tax Department of Aisino Corporation.

As Trustwave continued its investigation, it found that the tax software worked as advertised, but it also installed the hidden backdoor.

"Basically, it was a wide open door into the network with SYSTEM level privileges that connected to a command and control server completely separate from the tax software’s network infrastructure," the report said. "Based on this, and several other factors we determined this file to have sufficient characteristics to be malware. We've since fully reverse-engineered the files and named the family GoldenSpy."

Related Content

 

 
 
 
 
 
 
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really bad day" in cybersecurity. Click for more information and to register for this On-Demand event. 
 
 
Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
pabloredo
50%
50%
pabloredo,
User Rank: Apprentice
6/30/2020 | 2:49:28 AM
Reply
Unbelievable, and how long will it take them to find out
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Exactly
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7734
PUBLISHED: 2020-09-22
All versions of package cabot are vulnerable to Cross-site Scripting (XSS) via the Endpoint column.
CVE-2020-6564
PUBLISHED: 2020-09-21
Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.
CVE-2020-6565
PUBLISHED: 2020-09-21
Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
CVE-2020-6566
PUBLISHED: 2020-09-21
Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
CVE-2020-6567
PUBLISHED: 2020-09-21
Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.