Tuesday, January 21, 2025
HomeTechnologyCybercriminals use information and media internet hosting websites to unfold USB malware...

Cybercriminals use information and media internet hosting websites to unfold USB malware payloads

A financially motivated menace actor utilizing USB units for preliminary an infection has been discovered abusing authentic on-line platforms, together with GitHub, Vimeo, and Ars Technica, to host encoded payloads embedded in seemingly benign content material.

These payloads pose no dangers to customers visiting these net pages, as they’re merely textual content strings. However, when built-in into the marketing campaign’s assault chain, they’re pivotal in downloading and executing malware in assaults.

The hackers liable for this marketing campaign are tracked by Mandiant as UNC4990 and have been lively since 2020, predominantly focusing on customers in Italy.

Involuntary payload internet hosting

The assault begins with victims double-clicking a malicious LNK shortcut file on a USB drive. It just isn’t identified how the malicious USB units make it to focus on victims to begin the assault chain.

These middleman payloads are textual content strings that decode right into a URL to obtain the following payload: EMPTYSPACE.

UNC4990 has tried out a number of approaches to internet hosting middleman payloads, initially utilizing encoded textual content recordsdata on GitHub and GitLab and later switching to utilizing Vimeo and Ars Technica for internet hosting Base64 encoded and AES-encrypted string payloads.

Vimeo video hiding malicious code in the description
Vimeo video hiding malicious code within the description
Source: Mandiant

Also, these payloads don’t immediately threaten the guests of the abused websites as they’re simply innocent textual content strings, and all instances documented by Mandiant have now been faraway from the impacted middleman platforms.

The benefit of internet hosting the payloads on authentic and respected platforms is that they’re trusted by safety methods, decreasing the probability of them being flagged as suspicious.

Moreover, the menace actors profit from these platforms’ strong content material supply networks and revel in resilience to takedowns.

Embedding the payloads inside authentic content material and mixing it with excessive volumes of authentic visitors makes it harder to pinpoint and take away the malicious code.

Even then, the attackers might simply re-introduce it on a unique platform that helps publicly viewable feedback or profiles.

Complete UNC4990 attack chain
Complete UNC4990 assault chain
Source: Mandiant

Loading Quietboard

Evolution of the PowerShell script
Evolution of the PowerShell script
Source: Mandiant

In the next phases of the assault, EMPTYSPACE downloads a backdoor named ‘QUIETBOARD,’ in addition to crypto coin miners that mine Monero, Ethereum, Dogecoin, and Bitcoin.

The pockets addresses linked to this marketing campaign have made a revenue that exceeds $55,000, not accounting for Monero, which is hidden.

QUIETBOARD is a complicated, multi-component backdoor utilized by UNC4990, providing a variety of capabilities, together with:

  • Executing instructions or scripts obtained from the C2 server
  • Executing Python code obtained from the C2
  • Altering clipboard content material for cryptocurrency theft
  • Infecting USB/detachable drives to unfold malware on different methods
  • Capturing screenshots for info theft
  • Gathering detailed system and community info
  • Determining the geographical location of the contaminated system

QUIETBOARD additionally establishes persistence throughout system reboots and helps dynamically including new functionalities by further modules.

Mandiant concludes by underlining how UNC4990 likes to conduct experiments with its campaigns to find optimum pathways for its assault chain and refinement of its methodologies.

Despite the seemingly easy prevention measures, USB-based malware continues to pose a major menace and serve cybercriminals as an efficient propagation medium.

As for the tactic of abusing authentic websites to plant intermediate payloads, this exhibits that threats can lurk in sudden, seemingly innocuous places, difficult typical safety paradigms.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Popular