Article Details
Scrape Timestamp (UTC): 2023-09-20 02:01:57.757
Source: https://thehackernews.com/2023/09/shroudedsnoopers-httpsnoop-backdoor.html
Original Article Text
Click to Toggle View
ShroudedSnooper's HTTPSnoop Backdoor Targets Middle East Telecom Companies. Telecommunication service providers in the Middle East are the target of a new intrusion set dubbed ShroudedSnooper that employs a stealthy backdoor called HTTPSnoop. "HTTPSnoop is a simple, yet effective, backdoor that consists of novel techniques to interface with Windows HTTP kernel drivers and devices to listen to incoming requests for specific HTTP(S) URLs and execute that content on the infected endpoint," Cisco Talos said in a report shared with The Hacker News. Also part of the threat actor's arsenal is a sister implant codenamed PipeSnoop that can accept arbitrary shellcode from a named pipe and execute it on the infected endpoint. It's suspected that ShroudedSnooper exploits internet-facing servers and deploys HTTPSnoop to gain initial access to target environments, with both the malware strains impersonating components of Palo Alto Networks' Cortex XDR application ("CyveraConsole.exe") to fly under the radar. Three different HTTPSnoop samples have been detected to date. The malware uses low-level Windows APIs to listen for incoming requests matching predefined URL patterns, which are then picked up to extract the shellcode to be executed on the host. "The HTTP URLs used by HTTPSnoop along with the binding to the built-in Windows web server indicate that it was likely designed to work on internet-exposed web and EWS servers," Talos researchers said. "PipeSnoop, however, as the name may imply, reads and writes to and from a Windows IPC pipe for its input/output (I/O) capabilities." "This suggests the implant is likely designed to function further within a compromised enterprise – instead of public-facing servers like HTTPSnoop — and probably is intended for use against endpoints the malware operators deem more valuable or high-priority." The nature of the malware indicates that PipeSnoop cannot function as a standalone implant and that it requires an auxiliary component, which acts as a server to obtain the shellcode via other methods, and use the named pipe to pass it on the backdoor. The targeting of the telecom sector, particularly in the Middle East, has become something of a pattern in recent years. Stay ahead with actionable insights on how ITDR identifies and mitigates threats. Learn about the indispensable role of SSPM in ensuring your identity remains unbreachable. In January 2021, ClearSky uncovered a set of attacks orchestrated by Lebanese Cedar that was aimed at telecom operators in the U.S., the U.K., and Middle-East Asia. Later that December, Broadcom-owned Symantec shed light on an espionage campaign targeting telecom operators in the Middle East and Asia by a likely Iranian threat actor known as MuddyWater (aka Seedworm). Other adversarial collectives tracked under the monikers BackdoorDiplomacy, WIP26, and Granite Typhoon (formerly Gallium) have also been attributed to attacks on telecommunication service providers in the region over the past year.
Daily Brief Summary
Middle Eastern telecom service providers are being targeted by a new intrusion set named ShroudedSnooper that deploys a stealthy backdoor called HTTPSnoop.
Cisco Talos explains that HTTPSnoop interfaces with Windows HTTP kernel drivers and devices, listens for incoming requests for specific HTTP(S) URLs and executes the content on the infected endpoint.
The threat actor also uses a related implant called PipeSnoop, which can accept and execute arbitrary shellcode from a named pipe on the infected endpoint.
It is suspected that ShroudedSnooper gains initial access through exploited internet-facing servers, using the two malware to impersonate components of PaloAlto Networks' Cortex XDR Application.
The malware employs low-level Windows APIs to listen for incoming requests matching predefined URL patterns, extracting the affiliated shellcode for execution on the host.
Cisco Talos advises that the PipeSnoop implant likely operates further within a compromised enterprise and is probably used against endpoints that the malware operators deem more valuable or high-priority.
The pattern of attacks on the telecom sector in the Middle East has been consistent in recent years, with additional breaches orchestrated by Lebanese Cedar, MuddyWater, BackdoorDiplomacy, WIP26, and Granite Typhoon also documented.