Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/24/2015
03:50 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

RSA Warns Of Zero Detection Trojan

GlassRAT has remained undetected for more than three years while stealthily targeting victims, security firm says.

It’s apparently not just zero-day vulnerabilities that organizations need to worry about these days, but also zero detection malware threats.

For the second time in recent weeks, a security vendor has issued a warning about a malware tool that appears to have evaded detection for multiple years while stealthily going about targeting victims.

The malware, called GlassRAT, appears to have been released back in 2012. The limited telemetry and anecdotal reports that are available on it indicate that GlassRAT has been used to target Chinese nationals at large multinational companies, RSA Research said in an alert released this week.

The “zero detection” malware, which is signed with a digital certificate apparently misappropriated from a Chinese software developer, is “transparent” to most antivirus tools, RSA researchers said in the report. It is detectable only via network forensics and specialized tools that are capable of detecting suspicious activity on endpoint systems, they said.

“GlassRAT appears to have operated, stealthily, for nearly 3 years in some environments,” the paper noted.

The RSA researchers described GlassRAT, as a well-designed remote access trojan that is being used in a highly targeted manner. The dropper used to deliver the payload is digitally signed and deletes itself from the system after its task is complete.  Once installed, the malicious file itself remains below the radar of endpoint anti-malware tools.

The malware provides reverse shell functionality on an infected system allowing the threat actors behind GlassRAT to directly connect to it from a remote location. The malware is designed to steal data, transfer files and relay system information to the attackers.

 “What makes GlassRAT notable is not what it is, but perhaps rather where it came from, who is using it, and for what purpose," the researchers said.

Available information on GlassRAT suggests that it is connected to, or at least has used the same command and control infrastructure that other malware campaigns in the past have used to target organizations of strategic and geopolitical significance, the RSA researchers said.

Two domains associated with GlassRAT for instance, were previously associated with the Mirage and PlugX campaigns that targeted military and government organizations in Mongolia and the Philippines. The overlap window is fairly small suggesting that the threat actors behind GlassRAT may have made an operational slip in using the same infrastructure.

The threat represented by malware like GlassRAT should not be underestimated because there may be many more undetected or non-detectable samples like it in the world, the researchers said. “ It is also crucially important to recognize the potential origins of these attacks, when detected, to better understand risks to the organization.”

GlassRAT marks the second time this month when a security vendor has warned about a malware threat that remained undetected for a lengthy period. Earlier this month, Trustwave issued an alert on Cherry Picker, a point of sale malware tool that like GlassRAT remained below the radar for more than four years before being discovered.

Trustwave pointed to Cherry Picker’s use of encryption, modified configuration files and sophisticated obfuscation techniques as reasons why the malware remained undetected for so long. According to researchers at the company, no malware they have encountered goes quite as far as Cherry Picker does in cleaning up after itself after infecting a system.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
theb0x
100%
0%
theb0x,
User Rank: Ninja
12/2/2015 | 10:29:53 AM
Re: "Transparent"
It's because of how the exploit drops directly into RAM bypassing any security software. This teqnique is nothing new. The dropper can be encoded dozens of times to such a point that even using the most advanced file heuristic analysis it goes undetected.  It also has polymorphic properties so it is capable of self modifying it's own code to further evade detection. This makes signature based detection also useless. Another method used is covert application channels where shell code is injected into a file such as calc.exe or system file and the digital file signature is also forged. All connections established by the RAT are fully encrypted utilizing Reverse_TCP connection method. Because the infected system is 'phoning home' it in most cases is allowed through the firewall. One way to prevent this connection attempt is to have proper implicit deny ACLs in place. However, one would have to be able to monitor and identify the outgoing encrypted traffic or any network traffic for that matter and verifiy it is in fact legitimate. Constant whitelisting would need to be properly applied without the distruption of 'Normal' traffic. I do not see any practical solution to this in the near future.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
11/27/2015 | 11:49:36 PM
Re: "Transparent"
The transparency or "invisibility" comes through the faulty certificate and, possibly, from other characteristics that make it behave like an innocent file.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
11/25/2015 | 11:24:28 AM
Security Measures
What security measures and best practices should be used for a trojan that is detectable only via network forensics and specialized tools that are capable of detecting suspicious activity on endpoint systems? Also, what are these "specialized tools"?
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
11/25/2015 | 11:22:33 AM
"Transparent"
What makes GlassRat "transparent"?
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25414
PUBLISHED: 2021-06-17
A local file inclusion vulnerability was discovered in the captcha function in Monstra 3.0.4 which allows remote attackers to execute arbitrary PHP code.
CVE-2021-32078
PUBLISHED: 2021-06-17
An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4.
CVE-2021-31818
PUBLISHED: 2021-06-17
Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn’t parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables.
CVE-2021-34825
PUBLISHED: 2021-06-17
Quassel through 0.13.1, when --require-ssl is enabled, launches without SSL or TLS support if a usable X.509 certificate is not found on the local system.
CVE-2021-32944
PUBLISHED: 2021-06-17
A use-after-free issue exists in the DGN file-reading procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a memory corruption or arbitrary code execution, allowing attackers to cause a denial-of-service c...