Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/23/2017
11:08 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

RAT Vulnerabilities Turn Hackers into Victims

A small number of Remote Administration Tools have vulnerabilities which can enable attack targets to turn the tables on threat actors.

Threat actors using certain Remote Administration Tools (RATs) may find themselves on the receiving end of malware. Newly discovered vulnerabilities in these tools may enable cybercriminals' targets to turn the tables on their attackers and deliver malware.

Targeted cyberattacks hit thousands of businesses each year. Oftentimes victims label these threats as "advanced and persistent" to suggest they were inevitable, as though attackers are too sophisticated for defenders to protect themselves.

In many cases this is far from the truth, argues Waylon Grange, senior threat researcher at Symantec. Vulnerabilities in multiple hacker tools can be used against threat actors.

In looking at APT reports over the years, he says, there is a pattern of common RATS used in multiple campaigns. Frequently cited tools include Gh0stRAT, Korplug/Plug-X, and XtremeRAT, among others. The command-and-control components of these tools have vulnerabilities that can be exploited by attacker targets, who can turn the tables on their assailants.

"The attacker who was the attacker is now the victim," says Grange of the exploits' capabilities, which could enable a target to remote into an attacker's machine and browse it. "The tools can expose them to more vulnerabilities than the people they're targeting in some ways."

At this year's Black Hat USA conference in Las Vegas, Grange will disclose several exploits that could allow for remote execution or remote information disclosure on machines running these common C&C components. His talk is titled "Digital Vengeance: Exploiting the Most Notorious C&C Toolkits."

The idea is not to give a lesson in "hacking back" but to warn actors of the consequences of using these RATs. One of the tools he will discuss is Gh0stRAT, which has been around for at least 10 years and used in attacks believed to have been by Chinese nation-state actors.

Gh0stRAT allows an adversary access to the target's machine. Once malware is downloaded they can monitor keystrokes, see the screen, capture audio, and view the webcam. It stays on the machine and will continue to run after rebooting.

"It's fairly easy to recognize," says Grange. "Most antivirus products pick it up right away because it has been around for so long."

If a machine's antivirus program discovers the Gh0stRAT component, he continues, people have developed a Python script to search the malware and pull out configuration information. This script can "call home" to the C&C address and provide data on the adversary's location.

Armed with the location of the attacker's server, a victim can install malware back on the adversary's machine and view their screen and files.

"I can see who the adversary has as their targets," says Grange. "If they're remote controlling someone else, I can see what connections they have to others; what files they may have gotten off other targets."

It's worth noting this is not currently legal and Grange conducted his research in a test environment and attacked his own machines. He anticipates if this is made legal in the future, many businesses will want to use it to retaliate against adversaries -- a practice he thinks "won't achieve much" in making real progress against cybercrime.

"Where I see this most useful is in terms of researching," he continues. "Attribution is hard. If you can see where they are and what they target, that can provide a lot of valuable insight into attribution. It's most useful for researchers as opposed to a revenge tool."

Grange says these findings indicate modern attackers are not as untouchable as businesses think.

"The tools they use are sloppy, are broken," he says. "It's not an excuse to say 'we were hit by a nation-state so we can't be held accountable for what happened.' They still play on the same playing field."

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the conference schedule and to register.

 


Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AndrewfOP
100%
0%
AndrewfOP,
User Rank: Moderator
6/27/2017 | 10:31:44 AM
Hacker tracking via RAT
Although no security is truly impregnable against truly skilled hackers, I suspect majority if not most of hacks are perpetrated by those with limited technical skills, who are criminals in the first place, rather than skillful computer programmers performing illegal activities.  And those that simply purchasing hacking tools to perform criminal acts should be the main focus of combating cybercrimes. 

Currently there are limited tools for authorities to respond cybercrimes, especially at the local levels.  If unsophisticated "hackers" are simply the users of hacking software that generate most of the hacking activities and can be traced or tagged by reversed RAT hacking, it would give law enforcement decided advantages to identify and prosecute cyber criminals. 

 
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11565
PUBLISHED: 2020-04-06
An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa.
CVE-2020-11558
PUBLISHED: 2020-04-05
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_m...
CVE-2020-11547
PUBLISHED: 2020-04-05
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
CVE-2020-11548
PUBLISHED: 2020-04-05
The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
CVE-2020-11542
PUBLISHED: 2020-04-04
3xLOGIC Infinias eIDC32 2.213 devices with Web 1.107 allow Authentication Bypass via CMD.HTM?CMD= because authentication depends on the client side's interpretation of the <KEY>MYKEY</KEY> substring.