Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop Resolver

0
222
Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop Resolver


Dec 09, 2022Ravie LakshmananMalware / Iranian Hackers

Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop Resolver

The subgroup of an Iranian nation-state group often called Nemesis Kitten has been attributed as behind a beforehand undocumented customized malware dubbed Drokbk that makes use of GitHub as a useless drop resolver to exfiltrate information from an contaminated pc, or to obtain instructions.

“The use of GitHub as a digital useless drop helps the malware mix in,” Secureworks principal researcher Rafe Pilling mentioned. “All the site visitors to GitHub is encrypted, which means defensive applied sciences cannot see what’s being handed backwards and forwards. And as a result of GitHub is a reliable service, it raises fewer questions.”

The Iranian government-sponsored actor’s malicious actions got here beneath the radar earlier in February 2022, when it was noticed exploiting Log4Shell flaws in unpatched VMware Horizon servers to deploy ransomware.

CyberSecurity

Nemesis Kitten is tracked by the bigger cybersecurity neighborhood beneath numerous monikers akin to TunnelVision, Cobalt Mirage, and UNC2448. It’s additionally a sub-cluster of the Phosphorus group, with Microsoft giving it the designation DEV-0270.

It is additional mentioned to share tactical overlaps with one other adversarial collective dubbed Cobalt Illusion (aka APT42), a Phosphorus subgroup that is “tasked with conducting info assortment and surveillance operations towards people and organizations of strategic curiosity to the Iranian authorities.”

Subsequent investigations into the adversary’s operations have uncovered two distinct intrusion units: Cluster A, which employs BitLocker and DiskCryptor to conduct opportunistic ransomware assaults for monetary achieve, and Cluster B, which carries out focused break-ins for intelligence gathering.

Microsoft, Google Mandiant, and Secureworks have since unearthed proof tracing Cobalt Mirage’s origins to 2 Iranian entrance firms Najee Technology and Afkar System that, based on the U.S. Treasury Department, are affiliated with the Islamic Revolutionary Guard Corps (IRGC).

Drokbk, the newly recognized malware, is related to Cluster B and is written in .NET. Deployed post-exploitation as a type of establishing persistence, it consists of a dropper and a payload that is used to execute instructions acquired from a distant server.

“Early indicators of its use within the wild appeared in a February 2022 intrusion at a U.S. native authorities community,” the cybersecurity firm mentioned in a report shared with The Hacker News.

This assault entailed the compromise of a VMware Horizon server utilizing the Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45046), in the end resulting in the supply of the Drokbk binary via a compressed ZIP archive hosted on a file switch service.

As a detection evasion measure, Drokbk employs a method known as useless drop resolver to find out its command-and-control (C2) server. The covert tactic refers to the usage of an current, reliable exterior internet service to host info that factors to further C2 infrastructure.

In the assault chain noticed by Secureworks, that is achieved by leveraging an actor-controlled GitHub repository that comprises the C2 server info throughout the README.md file.

“Drokbk supplies the menace actors with arbitrary distant entry and a further foothold alongside tunneling instruments like Fast Reverse Proxy (FRP) and Ngrok,” Pilling mentioned.

Found this text attention-grabbing? Follow us on Twitter and LinkedIn to learn extra unique content material we put up.

LEAVE A REPLY

Please enter your comment!
Please enter your name here