Original Article Text

Click to Toggle View

Hackers abuse Google Cloud Run in massive banking trojan campaign. Security researchers are warning of hackers abusing the Google Cloud Run service to distribute massive volumes of banking trojans like Astaroth, Mekotio, and Ousaban. Google Cloud Run is lets users deploy frontend and backend services, websites or applications, handle workloads without the effort of managing an infrastructure or scaling. Cisco Talos researchers observed a massive uptick in the misuse of Google’s service for malware distribution starting September 2023, when Brazilian actors launched campaigns using MSI installer files to deploy malware payloads. The researchers' report notes that Google Cloud Run has become attractive to cybercriminals lately due to its cost-effectiveness and ability to bypass standard security blocks and filters. Attack chain The attacks start with phishing emails to potential victims, crafted to appear as legitimate communications for invoices, financial statements, or messages from local government and tax agencies. The researchers say that most emails in the campaign are in Spanish since they target countries in Latin America but there are also cases where the language used is Italian. The emails come with links that redirect to malicious web services hosted on Google Cloud Run. In some cases, the payload delivery is via MSI files. In other examples, the service issues a 302 redirect to a Google Cloud Storage location, where a ZIP archive with a malicious MSI file is stored. When the victim execute the malicious MSI files, new components and payloads are downloaded and executed on the system. In the observed cases, the second-stage payload delivery is done by abusing the legitimate Windows tool ‘BITSAdmin.’ Finally, the malware establishes persistence on the victim’s system to survive reboots by adding LNK files (‘sysupdates.setup<random_string>.lnk’) in the Startup folder, configured to execute a PowerShell command that executes the infection script (‘AutoIT’). Malware details The campaigns abusing Google Cloud Run involve three banking trojans: Astaroth/Guildma, Mekotio, and Ousaban. Each is designed to infiltrate systems stealthily, establish persistence, and exfiltrate sensitive financial data that can be used for taking over banking accounts. Astaroth comes with advanced evasion techniques. It initially focused on Brazilian victims but now targets over 300 financial institutions across 15 countries in Latin America. Recently, the malware started to collect credentials for cryptocurrency exchange services. Employing keylogging, screen capture, and clipboard monitoring, Astaroth not only steals sensitive data but also intercepts and manipulates internet traffic to capture banking credentials. Mekotio has also been active for several years and focuses on the Latin American region. It is known for stealing banking credentials, personal information, and performing fraudulent transactions. It can also manipulate web browsers to redirect users to phishing sites. Finally, Ousaban is a banking trojan capable of keylogging, capture screenshots, and phishing for banking credentials using fake (i.e. cloned) banking portals. Cisco Talos notes that Ousaban is delivered at a later stage of the Astaroth infection chain, indicating a potential collaboration between the operators of the two malware families or a single threat actor managing both. We have reached out to Google for details on what the company plans to do to counter this threat but we have not heard back by publication time.

Daily Brief Summary

MALWARE // Hackers Leverage Google Cloud Run in Banking Trojan Onslaught

Security researchers identified a large-scale campaign distributing banking trojans via Google Cloud Run.

Attackers targeted users with phishing emails in Spanish and Italian, posing as legitimate financial or governmental communications.

The malicious emails contain links that lead to malware hosted on Google Cloud Run, often delivered as MSI installer files.

The banking trojans involved are Astaroth, Mekotio, and Ousaban, aiming to steal sensitive financial data and credentials.

Attack techniques include using BITSAdmin for payload delivery, evading detection, establishing persistence on systems, and redirecting to fake banking portals for credential phishing.

Astaroth has expanded beyond Brazil and is now targeting a wider range of countries in Latin America, as well as cryptocurrency exchanges.

There is potential collaboration between different malware operators or the possibility of a single actor managing multiple trojans.

As of the article's publication, Google has not commented on measures to mitigate this misuse of their service.