Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

10/2/2019
12:40 PM
50%
50%

MasterMana Botnet Shows Trouble Comes at Low Cost

For less than $200, attackers were able to infect thousands of systems, stealing user credentials, cryptocurrency wallets, and web histories, an analysis finds.

A cybercrime campaign that starts with phishing, uses Bit.ly and Pastebin to pass commands, and results in the theft of the victim's user credentials, cryptocurrency wallets, and web history may have cost as little as $160 to run and likely infected thousands of systems every week, according to two researchers with security firm Prevailion.

The campaign, which the firm calls the MasterMana botnet, keeps costs down by hosting it on a single virtual private server and using public services as drop boxes for documents that contain encrypted commands, according to the firm's October 2 analysis. The attack highlights the asymmetry between attackers and defenders — with a few hundred dollars, attackers can breach defenses that may cost hundreds of thousands or millions of dollars annually, says Danny Adamitis, director of intelligence for Prevailion.

"When it came down to monetary cost, the only thing that these actors were paying for was the $100 for one Trojan and the $60 a month for a virtual private server from one particular provider," Adamitis says. "You can cause so much mayhem for so little money."

While a great deal of industry focus is on opportunistic attacks that could potentially affect hundreds of thousands of systems, or targeted attacks that home in on a few dozen victims, the bargain-basement infrastructure used by MasterMana shows that even small-time attacks can be a worry for companies if they're conducted by relatively skilled attackers, Adamitis says.

In their analysis of the botnet, Prevailion's researchers argued that the balance between sophistication and low-cost techniques hit a sweet spot that many advanced persistent threats (APTs) miss. The attack is "sophisticated enough to avoid automated detection through third-party services and obfuscation, while remaining below APT-level sophistication to avoid drawing attention to their campaign," Adamitis and Adam Flatley, vice president of tailored intelligence, wrote in the analysis.

The attack starts with phishing e-mails requesting information about the targeted company's products. While the e-mail messages are not very well constructed, thousands of victims have apparently opened the attached Microsoft Excel file. If the victim opens the attachment, either a macro will run and connect to Bit.ly or, in another case, the attackers used a vulnerability from 2017. While Prevailion did not see other file formats used in the attack, the company has seen other analyses citing malicious documents in Microsoft's other file formats, including Word, PowerPoint, and Publisher.

The Bit.ly link led to a Blogspot page, which then ran malicious JavaScript code that, in turn, downloaded and ran code from Pastebin. The multiple redirections make it harder to analyze the code and automatically assess whether the application is malicious, Adamitis says. The code created scheduling tasks and modified a registry key, which provides persistence and can download the remote access trojan (RAT).

Using statistics provided by Bit.ly and Pastebin, Adamitis estimated that 2,000 systems interacted with the botnet sites every week. Although that doesn't mean that 2,000 system were infected each week, the number suggests that the activity continues to make the botnet a threat.

"This is one of those attacks that should be threat modeled and you should worry about, because this type of approach is going to affect a large number of people," Adamitis says.

Many attributes of the attack are hallmarks of the Gorgon Group, a Pakistan-affiliated team of cybercriminals, according to Prevailion. The Gorgon Group does not just focus on financial fraud and cybercrime but also conducts attacks against government organizations and has been linked to attacks against Spain, Russia, the United Kingdom, and the United States. The group has used a variety of software tools in the past, including njRAT, QuasarRAT, and Remcos, according to MITRE's ATT&CK framework.

The Prevailion researchers recommend that companies protect their systems with updated security software, firewalls, and some form of attack detection. Both of the initial file-infection vectors — using a macro to install software and exploiting a 2-year-old vulnerability — would be caught by most forms of modern endpoint security.

In addition, properly updated endpoint security software would have stopped the RAT from running, according to the researchers' analysis.

Related Content

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "The Inestimable Values of an Attacker's Mindset & Alex Trebek."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3350
PUBLISHED: 2019-11-19
masqmail 0.2.21 through 0.2.30 improperly calls seteuid() in src/log.c and src/masqmail.c that results in improper privilege dropping.
CVE-2011-3352
PUBLISHED: 2019-11-19
Zikula 1.3.0 build #3168 and probably prior has XSS flaw due to improper sanitization of the 'themename' parameter by setting default, modifying and deleting themes. A remote attacker with Zikula administrator privilege could use this flaw to execute arbitrary HTML or web script code in the context ...
CVE-2011-3349
PUBLISHED: 2019-11-19
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
CVE-2019-10080
PUBLISHED: 2019-11-19
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI ...
CVE-2019-10083
PUBLISHED: 2019-11-19
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.