Popular Posts
-
Special Halloween Promo from SEMJar: Reliable and Affordable PBN Hosting. Available on October 28-31SEMJar, a SEO company renowned for its affordable services, invites every business owner to celebrate Halloween by getting reliable PBN ...
-
CHICAGO, June 20, 2016 /PRNewswire/ -- Paper Source, a Chicago-based specialty retailer and web store, will be hosting a warehouse sale o...
-
2017-08-22 Sports News of Tue, 22 Aug 20170 Tamale ready to host 2017 MTN FA Cup final - RFA Chairman File photo Mr. Abdoula...
-
wedmfm.com is a wordpress.ORG software install on paid hosting, hosted by Bluehost, not by wordpress.COM. Contact your web host. You are...
-
This Web Hosting Service market research is an intelligence report with meticulous efforts undertaken to study the right and valuable in...
-
Tweet Rackspace Hosting, Inc. (NYSE:RAX) – Analysts at Oppenheimer cut their Q3 2016 earnings per share ...
-
WebSite X5 – Evolution is a powerful application which makes it easy to create top-quality responsive websites, even if you've no desi...
-
On a web slinging episode of Odin Makes, host Odin Abbott demonstrates how to make Spider-Man's web shooters based off of the desi...
-
After more than 20 years as one of the foremost neo-Nazi and white supremacist websites in the U.S., it appears as if Sto...
-
SANTA FE, NM --(Marketwired - March 26, 2016) - CrowdReviews.com, a provider of web hosting reviews and ratings, has released a statement...
Blog Archive
- December (19)
- November (25)
- October (28)
- September (26)
- August (28)
- July (31)
- June (26)
- May (27)
- April (28)
- March (30)
- February (28)
- January (31)
- December (31)
- November (30)
- October (31)
- September (29)
- August (44)
- July (56)
- June (53)
- May (54)
- April (48)
- March (55)
- February (44)
- January (3)
- December (5)
- November (5)
- October (26)
- September (25)
- August (29)
- July (26)
- June (18)
- September (1)
About Me
Total Pageviews
BAIJIU malware abused Japanese web hosting service
Cylance researchers spotted a phishing campaign dubbed "BAIJIU" that looks to capitalize on those curious about the hermit kingdom of North Korea.
While the goal of the campaign is unclear, researchers said the group behind the attacks has been linked to long-term espionage activities in the past, according to a May 12 blog post.
The victims are lured with an email offering insight about a natural disaster that caused massive flooding in 2016 playing upon interest in news from North Korea. The email is used to deploy a set of cyberespionage tools through a downloader dubbed "TYPHOON" and a set of backdoors dubbed "LIONROCK."
Researchers said the unusual complexity of the attack, the appropriation of the GeoCities web hosting service, and the use of multiple methods of obfuscation drew their attention to the campaign which they say has evaded nearly every legacy AV and NextGen AV solution on the market.
Geocities is a free service owned by Yahoo which does not require users to identify themselves beyond providing a Yahoo email address making it an attractive service for threat actors.
The malware takes advantage of Geocities JP for free high-bandwidth unattributable hosting and uses simple tricks to defeat emulation and automated analysis, making the malware unique, Cylance Director of Threat Intelligence Jon Gross told SC Media.
"The infection vector is complicated and used to deliver payloads with pinpoint accuracy while making it more difficult for researchers and unintended targets to receive the final payloads," Gross said.
The malware uses a custom obfuscation method that appears to have not been picked out by heuristics.
"Obfuscated strings can end with an arbitrary number of @'s and an arbitrary amount of junk characters can be inserted into the beginning of the strings as well," Gross said "In addition simple 1byte XOR with variable length byte shifts have also been observed."
He added that the malware has been successful because it the AntiVirus detection methods haven't seen the activity and threat patterns before.
Researchers said the CYPHOON/LIONROCK's provenance is likely Chinese, and that it probably evolved from the Egobot codebase and is subsequently connected to the larger Dark Hotel Operation.
"BAIJIU's circuitous route from LNK file to LIONROCK backdoor through multiple DLL files and PowerShell scripts – and its ability to obfuscate itself through each stage while doing so – makes this attack stand out," the post said. "BAIJIU attackers likely employed this strategy to throw researchers and investigators off their track, and ensure only the targeted victims received the payloads."
Source: BAIJIU malware abused Japanese web hosting service
0 comments:
Post a Comment