![]() ![]() Visual Basic scripts that perform system reconnaissance after initial infection and then send information to Waterbug command and control (C&C) servers.It then uses WebDAV to upload to a Box cloud drive. A USB data collecting tool that checks for a connected USB drive and steals certain file types, encrypting them into a RAR file.A custom hacking tool that combines four leaked Equation Group tools (EternalBlue, EternalRomance, DoublePulsar, SMBTouch) into a single executable.A new custom dropper typically used to install Neptun as a service.The group has also followed the current shift towards “living off the land,” making use of PowerShell scripts and PsExec, a Microsoft Sysinternals tool used for executing processes on other systems.Īside from new tools already mentioned above, Waterbug has also deployed: Waterbug’s most recent campaigns have involved a swath of new tools including custom malware, modified versions of publicly available hacking tools, and legitimate administration tools. This was probably done to avoid them being written to the file system. Prior to execution, the PowerShell scripts were stored Base64-encoded in the registry. This tool is designed to bypass detection aimed at identifying malicious PowerShell usage. This backdoor used code derived from the publicly available PowerShellRunner tool to execute PowerShell scripts without using powershell.exe. The third campaign deployed a different custom RPC backdoor to that used in the second campaign. wav extension in order to disguise its true purpose. Waterbug has been using Meterpreter since at least early 2018 and, in this campaign, used a modified version of Meterpreter, which was encoded and given a. One attack during this campaign involved the use of infrastructure belonging to another espionage group known as Crambus (aka OilRig, APT34).Ī second campaign used Meterpreter, a publicly available backdoor along with two custom loaders, a custom backdoor called photobased.dll, and a custom Remote Procedure Call (RPC) backdoor. Neptun is also able to download additional tools, upload stolen files, and execute shell commands. This passive listening capability makes the malware more difficult to detect. Neptun is installed on Microsoft Exchange servers and is designed to passively listen for commands from the attackers. One campaign involved a new and previously unseen backdoor called Neptun ( Backdoor.Whisperer). Recent Waterbug activity can be divided into three distinct campaigns, characterized by differing toolsets. The Waterbug espionage group (aka Turla) has continued to attack governments and international organizations over the past eighteen months in a series of campaigns that have featured a rapidly evolving toolset and, in one notable instance, the apparent hijacking of another espionage group’s infrastructure. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2023
Categories |