Article Details
Scrape Timestamp (UTC): 2024-01-31 22:35:25.904
Original Article Text
Click to Toggle View
Hackers push USB malware payloads via news, media hosting sites. A financially motivated threat actor using USB devices for initial infection has been found abusing legitimate online platforms, including GitHub, Vimeo, and Ars Technica, to host encoded payloads embedded in seemingly benign content. The attackers hide these payloads in plain sight, placing them in forum user profiles on tech news sites or video descriptions on media hosting platforms. These payloads pose no risks to users visiting these web pages, as they are simply text strings. However, when integrated into the campaign's attack chain, they are pivotal in downloading and executing malware in attacks. The hackers responsible for this campaign are tracked by Mandiant as UNC4990 and have been active since 2020, predominately targeting users in Italy. Involuntary payload hosting The attack begins with victims double-clicking a malicious LNK shortcut file on a USB drive. It is not known how the malicious USB devices make it to targeted victims to start the attack chain. When the shortcut is launched, it executes a PowerShell script explorer.ps1, which in turn downloads an intermediary payload that decodes to a URL used to download and install the malware downloader named 'EMPTYSPACE.' These intermediary payloads are text strings that decode into a URL to download the next payload: EMPTYSPACE. UNC4990 has tried out several approaches to hosting intermediary payloads, initially using encoded text files on GitHub and GitLab and later switching to abusing Vimeo and Ars Technica for hosting Base64 encoded and AES-encrypted string payloads. Mandiant notes that the attackers do not exploit a vulnerability in these sites but simply employ regular site features, like an About page in an Ars Technica forum profile or a Vimeo video description, to covertly host the obfuscated payload without raising suspicion. Also, these payloads do not directly threaten the visitors of the abused sites as they are just harmless text strings, and all cases documented by Mandiant have now been removed from the impacted intermediary platforms. The advantage of hosting the payloads on legitimate and reputable platforms is that they are trusted by security systems, reducing the likelihood of them being flagged as suspicious. Moreover, the threat actors benefit from those platforms' robust content delivery networks and enjoy resilience to takedowns. Embedding the payloads within legitimate content and mixing it with high volumes of legitimate traffic makes it more difficult to pinpoint and remove the malicious code. Even then, the attackers could easily re-introduce it on a different platform that supports publicly viewable comments or profiles. Loading Quietboard The PowerShell script decodes, decrypts, and executes the intermediate payload fetched from the legitimate sites and drops EMPTYSPACE on the infected system, which establishes communication with the campaign's command and control (C2) server. In the subsequent phases of the attack, EMPTYSPACE downloads a backdoor named 'QUIETBOARD,' as well as crypto coin miners that mine Monero, Ethereum, Dogecoin, and Bitcoin. The wallet addresses linked to this campaign have made a profit that surpasses $55,000, not accounting for Monero, which is hidden. QUIETBOARD is a sophisticated, multi-component backdoor used by UNC4990, offering a wide range of capabilities, including: QUIETBOARD also establishes persistence across system reboots and supports dynamically adding new functionalities through extra modules. Mandiant concludes by underlining how UNC4990 likes to conduct experiments with its campaigns to discover optimal pathways for its attack chain and refinement of its methodologies. Despite the seemingly straightforward prevention measures, USB-based malware continues to pose a significant threat and serve cybercriminals as an effective propagation medium. As for the tactic of abusing legitimate sites to plant intermediate payloads, this shows that threats can lurk in unexpected, seemingly innocuous locations, challenging conventional security paradigms.
Daily Brief Summary
A cybercriminal group, UNC4990, uses USB devices to deploy malware by embedding payloads in legitimate online platforms like GitHub, Vimeo, and Ars Technica.
The malicious campaign, primarily targeting Italian users since 2020, initiates with victims unknowingly activating a harmful LNK shortcut from a USB drive.
The shortcut triggers a PowerShell script that downloads an intermediary payload disguised as benign content on popular sites, which then installs the EMPTYSPACE malware downloader.
These intermediary payloads, hidden in plain sight and encrypted, are downloaded from platforms often considered trustworthy, allowing them to evade typical security detection methods.
The EMPTYSPACE loader subsequently installs a multi-functional backdoor named QUIETBOARD and cryptocurrency miners that have generated over $55,000 for the attackers.
Mandiant researchers emphasize the challenge of such attacks, as they exploit conventional trusted sources and complicate the identification and removal of the malicious payloads.
The sophisticated nature of QUIETBOARD allows for persistent and modular attacks, reflecting the threat actor's ongoing refinement of tactics and experimentation with their attack chains.