Joint Cybersecurity Advisory — #StopRansomware: Play Ransomware Group

Joint Cybersecurity Advisory — #StopRansomware: Play Ransomware Group

Joint Cybersecurity Advisory — #StopRansomware: Play Ransomware Group

DOWNLOAD FULL JSA PDF

Joint Cybersecurity Advisory -- #StopRansomware: Play Ransomware Group

SUMMARY

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) are releasing this joint CSA to disseminate the Play ransomware group’s IOCs and TTPs identified through FBI investigations as recently as October 2023.

Since June 2022, the Play (also known as Playcrypt) ransomware group has impacted a wide range of businesses and critical infrastructure in North America, South America, and Europe. As of October 2023, the FBI was aware of approximately 300 affected entities allegedly exploited by the ransomware actors.

In Australia, the first Play ransomware incident was observed in April 2023, and most recently in November 2023.

The Play ransomware group is presumed to be a closed group, designed to “guarantee the secrecy of deals,” according to a statement on the group’s data leak website. Play ransomware actors employ a double-extortion model, encrypting systems after exfiltrating data. Ransom notes do not include an initial ransom demand or payment instructions, rather, victims are instructed to contact the threat actors via email.

The FBI, CISA, and ASD’s ACSC encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents. This includes requiring multifactor authentication, maintaining offline backups of data, implementing a recovery plan, and keeping all operating systems, software, and firmware up to date.

Download a PDF version of this report:

AA23-352A #StopRansomware: Play Ransomware(PDF, 536.19 KB )

For a downloadable copy of IOCs, see:

AA23-352A STIX XML(XML, 34.87 KB )

AA23-352A STIX JSON(JSON, 30.22 KB )

TECHNICAL DETAILS

Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See the MITRE ATT&CK for Enterprise section for all referenced tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

Initial Access

The Play ransomware group gains initial access to victim networks through the abuse of valid accounts [T1078] and exploitation of public-facing applications [T1190], specifically through known FortiOS (CVE-2018-13379 and CVE-2020-12812) and Microsoft Exchange (ProxyNotShell [CVE-2022-41040 and CVE-2022-41082]) vulnerabilities. Play ransomware actors have been observed to use external-facing services [T1133] such as Remote Desktop Protocol (RDP) and Virtual Private Networks (VPN) for initial access.

Discovery and Defense Evasion

Play ransomware actors use tools like AdFind to run Active Directory queries [TA0007] and Grixba [1], an information-stealer, to enumerate network information [T1016] and scan for anti-virus software [T1518.001]. Actors also use tools like GMER, IOBit, and PowerTool to disable anti-virus software [T1562.001] and remove log files [T1070.001]. In some instances, cybersecurity researchers have observed Play ransomware actors using PowerShell scripts to target Microsoft Defender.[2]

Lateral Movement and Execution

Play ransomware actors use command and control (C2) applications, including Cobalt Strike and SystemBC, and tools like PsExec, to assist with lateral movement and file execution. Once established on a network, the ransomware actors search for unsecured credentials [T1552] and use the Mimikatz credential dumper to gain domain administrator access [T1003]. According to open source reporting [2], to further enumerate vulnerabilities, Play ransomware actors use Windows Privilege Escalation Awesome Scripts (WinPEAS) [T1059] to search for additional privilege escalation paths. Actors then distribute executables [T1570] via Group Policy Objects [T1484.001].

Exfiltration and Encryption

Play ransomware actors often split compromised data into segments and use tools like WinRAR to compress files [T1560.001] into .RAR format for exfiltration. The actors then use WinSCP to transfer data [T1048] from a compromised network to actor-controlled accounts. Following exfiltration, files are encrypted [T1486] with AES-RSA hybrid encryption using intermittent encryption, encrypting every other file portion of 0x100000 bytes. [3] (Note: System files are skipped during the encryption process.) A .play extension is added to file names and a ransom note titled ReadMe[.]txt is placed in file directory C:.

Impact

The Play ransomware group uses a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note directs victims to contact the Play ransomware group at an email address ending in @gmx[.]de. Ransom payments are paid in cryptocurrency to wallet addresses provided by Play actors. If a victim refuses to pay the ransom demand, the ransomware actors threaten to publish exfiltrated data to their leak site on the Tor network ([.]onion URL).

Leveraged Tools

Table 1 lists legitimate tools Play ransomware actors have repurposed for their operations. The legitimate tools listed in this product are all publicly available. Use of these tools and applications should not be attributed as malicious without analytical evidence to support they are used at the direction of, or controlled by, threat actors.

Table 1: Tools Leveraged by Play Ransomware Actors
Name Description
AdFind Used to query and retrieve information from Active Directory.
Bloodhound Used to query and retrieve information from Active Directory.
GMER A software tool intended to be used for detecting and removing rootkits.
IOBit An anti-malware and anti-virus program for the Microsoft Windows operating system. Play actors have accessed IOBit to disable anti-virus software.
PsExec A tool designed to run programs and execute commands on remote systems.
PowerTool A Windows utility designed to improve speed, remove bloatware, protect privacy, and eliminate data collection, among other things.
PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems. Play ransomware actors have used it to assist with lateral movement and file execution.
Mimikatz Allows users to view and save authentication credentials such as Kerberos tickets. Play ransomware actors have used it to add accounts to domain controllers.
WinPEAS Used to search for additional privilege escalation paths.
WinRAR Used to split compromised data into segments and to compress files into .RAR format for exfiltration.
WinSCP Windows Secure Copy is a free and open-source Secure Shell (SSH) File Transfer Protocol, File Transfer Protocol, WebDAV, Amazon S3, and secure copy protocol client. Play ransomware actors have used it to transfer data [T1048] from a compromised network to actor-controlled accounts.
Microsoft Nltest Used by Play ransomware actors for network discovery.
Nekto / PriviCMD Used by Play ransomware actors for privilege escalation.
Process Hacker Used to enumerate running processes on a system.
Plink Used to establish persistent SSH tunnels.

Indicators of Compromise

See Table 2 for Play ransomware IOCs obtained from FBI investigations as of October 2023.

Table 2: Hashes Associated with Play Ransomware Actors
Hashes (SHA256) Description
453257c3494addafb39cb6815862403e827947a1e7737eb8168cd10522465deb Play ransomware custom data gathering tool
47c7cee3d76106279c4c28ad1de3c833c1ba0a2ec56b0150586c7e8480ccae57 Play ransomware encryptor
75404543de25513b376f097ceb383e8efb9c9b95da8945fd4aa37c7b2f226212 SystemBC malware EXE
7a42f96599df8090cf89d6e3ce4316d24c6c00e499c8557a2e09d61c00c11986 SystemBC malware DLL
7a6df63d883bbccb315986c2cfb76570335abf84fafbefce047d126b32234af8 Play ransomware binary
7dea671be77a2ca5772b86cf8831b02bff0567bce6a3ae023825aa40354f8aca SystemBC malware DLL
c59f3c8d61d940b56436c14bc148c1fe98862921b8f7bad97fbc96b31d71193c Play network scanner
e652051fe47d784f6f85dc00adca1c15a8c7a40f1e5772e6a95281d8bf3d5c74 Play ransomware binary
e8d5ad0bf292c42a9185bb1251c7e763d16614c180071b01da742972999b95da Play ransomware binary

MITRE ATT&CK TACTICS AND TECHNIQUES

See Table 3–Table 11 for all referenced threat actor tactics and techniques in this advisory.

Table 3: Play ATT&CK Techniques for Enterprise for Initial Access
Technique Title ID Use
Valid Accounts T1078 Play ransomware actors obtain and abuse existing account credentials to gain initial access.
Exploit Public Facing Application T1190 Play ransomware actors exploit vulnerabilities in internet-facing systems to gain access to networks.
External Remote Services T1133 Play ransomware actors have used remote access services, such as RDP/VPN connection to gain initial access.

 

Table 4: Play ATT&CK Techniques for Enterprise for Discovery
Technique Title ID Use
System Network Configuration Discovery T1016 Play ransomware actors use tools like Grixba to identify network configurations and settings.
Software Discovery: Security Software Discovery T1518.001 Play ransomware actors scan for anti-virus software.

 

Table 5: Play ATT&CK Techniques for Enterprise for Defense Evasion
Technique Title ID Use
Impair Defenses: Disable or Modify Tools T1562.001 Play ransomware actors use tools like GMER, IOBit, and PowerTool to disable anti-virus software.
Indicator Removal: Clear Windows Event Logs T1070.001 Play ransomware actors delete logs or other indicators of compromise to hide intrusion activity.

 

Table 6: Play ATT&CK Techniques for Enterprise for Credential Access
Technique Title ID Use
Unsecured Credentials T1552 Play ransomware actors attempt to identify and exploit credentials stored unsecurely on a compromised network.
OS Credential Dumping T1003 Play ransomware actors use tools like Mimikatz to dump credentials.

 

Table 7: Play ATT&CK Techniques for Enterprise for Lateral Movement
Technique Title ID Use
Lateral Tool Transfer T1570 Play ransomware actors distribute executables within the compromised environment.

 

Table 8: Play ATT&CK Techniques for Enterprise for Command and Control
Technique Title ID Use
Domain Policy Modification: Group Policy Modification T1484.001 Play ransomware actors distribute executables via Group Policy Objects.

 

Table 9: Play ATT&CK Techniques for Enterprise for Collection
Technique Title ID Use
Archive Collected Data: Archive via Utility T1560.001 Play ransomware actors use tools like WinRAR to compress files.

 

Table 10: Play ATT&CK Techniques for Enterprise for Exfiltration
Technique Title ID Use
Exfiltration Over Alternative Protocol T1048 Play ransomware actors use file transfer tools like WinSCP to transfer data.

 

Table 11: Play ATT&CK Techniques for Enterprise for Impact
Technique Title ID Use
Data Encrypted for Impact T1486 Play ransomware actors encrypt data on target systems to interrupt availability to system and network resources.
Financial Theft T1657 Play ransomware actors use a double-extortion model for financial gain.

MITIGATIONS

These mitigations apply to all critical infrastructure organizations and network defenders. The FBI, CISA, and ASD’s ACSC recommend that software manufacturers incorporate secure-by-design and -default principles and tactics into their software development practices to limit the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems), thus, strengthening the security posture for their customers.
For more information on secure by design, see CISA’s Secure by Design and Default webpage and joint guide.

The FBI, CISA, and ASD’s ACSC recommend organizations apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Play ransomware. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

  • Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 2.F, 2.R, 2.S] in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).
  • Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with NIST’s standards for developing and managing password policies [CPG 2.C].
    • Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 2.B];
    • Store passwords in hashed format using industry-recognized password managers;
    • Add password user “salts” to shared login credentials;
    • Avoid reusing passwords;
    • Implement multiple failed login attempt account lockouts [CPG 2.G];
    • Disable password “hints”;
    • Refrain from requiring password changes more frequently than once per year.
      Note: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password “patterns” cyber criminals can easily decipher.
    • Require administrator credentials to install software.
  • Require multifactor authentication [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems. Also see Protect Yourself: Multi-Factor Authentication | Cyber.gov.au.
  • Keep all operating systems, software, and firmware up to date. Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats. Prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E]. Organizations are advised to deploy the latest Microsoft Exchange security updates. If unable to patch, then disable Outlook Web Access (OWA) until updates are able to be undertaken. Also see Patching Applications and Operating Systems | Cyber.gov.au.
  • Segment networks [CPG 2.F] to prevent the spread of ransomware. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement. Also see Implementing Network Segmentation and Segregation.
  • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool. To aid in detecting the ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network [CPG 1.E]. Endpoint detection and response (EDR) tools are particularly useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.
  • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems. This prevents actors from directly connecting to remote access services they have established for persistence. Also see Inbound Traffic Filtering – Technique D3-ITF.
  • Install, regularly update, and enable real time detection for antivirus software on all hosts.
  • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts [CPG 1.A, 2.O].
  • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
  • Disable unused ports [CPG 2.V].
  • Consider adding an email banner to emails [CPG 2.M] received from outside your organization.
  • Disable hyperlinks in received emails.
  • Implement time-based access for accounts set at the admin level and higher. For example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
  • Disable command-line and scripting activities and permissions. Privileged escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally [CPG 2.E].
  • Maintain offline backups of data and regularly maintain backup and restoration [CPG 2.R]. By instituting this practice, an organization ensures they will not be severely interrupted, and/or only have irretrievable data.
  • Ensure backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.K].

VALIDATE SECURITY CONTROLS

In addition to applying mitigations, the FBI, CISA, and ASD’s ACSC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The FBI, CISA, and ASD’s ACSC recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

To get started:

  1. Select an ATT&CK technique described in this advisory (see Tables 3-11).
  2. Align your security technologies against this technique.
  3. Test your technologies against this technique.
  4. Analyze your detection and prevention technologies performance.
  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

The FBI, CISA, and ASD’s ACSC recommend continually testing your security program at scale and in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

RESOURCES

REPORTING

The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Play ransomware actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

The FBI, CISA, and ASD’s ACSC do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office, the FBI’s Internet Crime Complaint Center (IC3), or CISA via CISA’s 24/7 Operations Center (report@cisa.gov or 888-282-0870).

Australian organizations that have been impacted or require assistance in regard to a ransomware incident can contact ASD’s ACSC via 1300 CYBER1 (1300 292 371), or by submitting a report to cyber.gov.au.

DISCLAIMER

The information in this report is being provided “as is” for informational purposes only. CISA and the FBI do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.

REFERENCES

[1] Symantec: Play Ransomware Group Using New Custom Data-Gathering Tools
[2] TrendMicro: Play Ransomware Spotlight
[3] SentinelLabs: Ransomware Developers Turn to Intermittent Encryption to Evade Detection

North Korea’s Lazarus Group’s DLang-Based RAT Targeting VMWare Horizon Servers via Log4j

North Korea’s Lazarus Group’s DLang-Based RAT Targeting VMWare Horizon Servers via Log4j

North Korea’s Lazarus Group’s DLang-Based RAT Targeting VMWare Horizon Servers via Log4j

DOWNLOAD PDF

SUMMARY

The Lazarus group (North Korea) continues to leverage the Log4Shell vulnerability (CVE-2021-44228) as an opportunity to deploy 3 Dlang-based malware families.

TECHNICAL DETAILS

Cisco Talos identified several attacks that exploited the Log4Shell vulnerability, specifically targeting VMWare Horizon servers publicly exposed and utilizing a Log4j version susceptible to remote code execution (RCE).  Talos named this attack campaign “Operation Blacksmith”, which uncovered 2 new remote access trojans (RATs), NineRAT and DLRAT, along with a malware downloader named BottomLoader.  A noteworthy shift in Lazarus’ tactics is observed, marked by the uncommon use of the D programming language to develop the malware strains, possibly to evade detection:

  • NineRAT leverages the Telegram API for command-and-control communication, executing commands and exfiltrating files from compromised systems.
  • DLRAT, a trojan and downloader that initiates its activity by collecting system information and sending it to a command-and-control server.
  • BottomLoader fetches and executes payloads using PowerShell, establishing persistence, and allowing file exfiltration.

Talos also indicated that Lazarus may share the collected victim data with other APT groups or clusters within its umbrella, based on observed system “re-fingerprinting”.

INDICATORS OF COMPROMISE

SHA256:

HazyLoad

  • 000752074544950ae9020a35ccd77de277f1cd5026b4b9559279dc3b86965eee

NineRAT

  • 534f5612954db99c86baa67ef51a3ad88bc21735bce7bb591afa8a4317c35433
  • ba8cd92cc059232203bcadee260ddbae273fc4c89b18424974955607476982c4
  • 47e017b40d418374c0889e4d22aa48633b1d41b16b61b1f2897a39112a435d30
  • f91188d23b14526676706a5c9ead05c1a91ea0b9d6ac902623bc565e1c200a59
  • 5b02fc3cfb5d74c09cab724b5b54c53a7c07e5766bffe5b1adf782c9e86a8541
  • 82d4a0fef550af4f01a07041c16d851f262d859a3352475c62630e2c16a21def

BottomLoader

  • 0e416e3cc1673d8fc3e7b2469e491c005152b9328515ea9bbd7cf96f1d23a99f

DLRAT

  • e615ea30dd37644526060689544c1a1d263b6bb77fe3084aa7883669c1fde12f
  • 9a48357c06758217b3a99cdf4ab83263c04bdea98c347dd14b254cab6c81b13a

Domains and IPv4:

  • tech[.]micrsofts[.]com
  • tech[.]micrsofts[.]tech
  • 27[.]102[.]113[.]93
  • 185[.]29[.]8[.]53
  • 155[.]94[.]208[.]209
  • 162[.]19[.]71[.]175
  • 201[.]77[.]179[.]66
  • hxxp://27[.]102[.]113[.]93/inet[.]txt
  • hxxp[://]162[.]19[.]71[.]175:7443/sonic/bottom[.]gif
  • hxxp[://]201[.]77[.]179[.]66:8082/img/lndex[.]php
  • hxxp[://]201[.]77[.]179[.]66:8082/img/images/header/B691646991EBAEEC[.]gif
  • hxxp[://]201[.]77[.]179[.]66:8082/img/images/header/7AEBC320998FD5E5[.]gif

 

RECOMMENDATIONS

  • Urgently update and patch the Log4j library on all publicly facing VMWare Horizon servers to address the vulnerability and prevent remote code execution.
  • Implement network segmentation to restrict access to critical systems and reduce the attack surface, isolating the VMWare Horizon servers from unnecessary exposure.
  • Review and reinforce access controls, ensuring that only authorized personnel have access to critical systems. Employ the principle of least privilege to minimize potential attack vectors.
  • Endpoint protection is crucial to thwart the execution of the malware outlined in this advisory.
  • Implement web scanning tools to proactively block access to malicious websites and identify malware commonly used in such attacks.
  • For email security, deploy solutions to block malicious emails that threat actors may use as part of their campaigns.
  • Utilize advanced firewall appliances capable of detecting and mitigating malicious activities associated with emerging threats.
  • Leverage malware analytics tools to identify and proactively protect against malicious binaries, integrating robust security across your infrastructure.
  • Secure your internet gateway to block connections to malicious domains, IPs, and URLs, regardless of user location.
  • Automate web security measures to automatically block potentially harmful sites and assess suspicious sites before user access.
  • Enhance protection by leveraging additional security measures tailored to your specific environment and threat data.
  • Implement multi-factor authentication solutions to ensure only authorized users access your network securely.

 

REFERENCES

 

 

North Korea’s Lazarus Group’s DLang-Based RAT Targeting VMWare Horizon Servers via Log4j

Krasue RAT Linux Malware

Krasue RAT Linux Malware

DOWNLOAD PDF

SUMMARY

Krasue is a remote access trojan (RAT) designed for Linux systems, specifically within telecommunications companies in Thailand.  Krasue was identified by security researchers at Group-IB and has been seen successfully evading detection since 2021.  Analyzing the Krasue binary found seven different variants of a rootkit that supports various versions of the Linux kernel.  This RAT appears to be constructed with code derived from three distinct open-source projects.

TECHNICAL DETAILS

Group-IB provided details of their analysis of Krasue, including its primary function of ensuring persistent access to the infected host system.  This persistence may also indicate potential deployment via a botnet or distribution by initial access brokers for threat actors looking for specific targets.   Although the method of distribution remains unclear, potential vectors include exploiting vulnerabilities, credential brute force attacks, or disguising itself as a legitimate product when downloaded from untrusted sources.  Krasue seems to be concentrating its efforts on targeting telecommunications companies in Thailand.

Group-IB’s analysis of the rootkit embedded within the Krasue binary found that it operates as a Linux Kernel Module (LKM), presenting itself as an unsigned VMware driver upon execution and at the same security level as the underlying operating system. The rootkit’s compatibility with Linux Kernel versions 2.6x/3.10.x allows it to go undetected, exploiting the limited Endpoint Detection and Response coverage on older Linux servers. All seven iterations of the embedded rootkit have consistent system call and function call hooking capabilities.  Examination of the code found that Krause is derived from three open-source LKM rootkits—Diamorphine, Suterusu, and Rooty—all of which have been available since 2017.

Capabilities of Krasue include port manipulation, process invisibility, root privilege provision, execution of the kill command for any process ID, and adept concealment of malware-related files and directories.  When communicating with a command and control (C2), Krasue responds to commands that include ping responses, master configuration settings, information retrieval requests, restart and respawn processes, and even self-termination commands.

Group-IB’s investigation found 9 distinct C2 IP addresses hardcoded into the malware, with the address utilizing port 554 that is associated with Real Time Streaming Protocol (RTSP) connections.  The utilization of RTSP for C2 communication adds a distinctive characteristic to Krasue’s behavior.

Though Krasue’s origin is still unclear, researchers have observed overlaps with XorDdos Linux malware, suggesting a potential common author or operator. It is also plausible that the Krasue developer had access to the code of XorDdos.

RECOMMENDATIONS

  • Consider reviewing the Group-IB provided indicators of compromise (IOCs) and YARA rules for detection, potentially encouraging collaborative research efforts among the cybersecurity community.
  • Implement network traffic monitoring to detect and analyze unusual patterns, especially on port 554, as Krasue utilizes this uncommon approach for communication.
  • Strengthen EDR solutions to ensure comprehensive coverage, especially on older Linux servers where Krasue exploits potential vulnerabilities.
  • Conduct regular security audits to identify and address vulnerabilities promptly. Implement robust patch management practices to ensure that systems are up-to-date and protected against known exploits.
  • Employ behavioral analysis tools and anomaly detection mechanisms to identify suspicious activities, particularly those associated with rootkit functionalities such as process invisibility and port manipulation.
  • Enforce multi-factor authentication (MFA) to mitigate the risk of credential brute force attacks, a potential avenue for Krasue’s distribution.
  • Educate users about the risks associated with downloading software from untrusted sources, emphasizing the importance of obtaining applications from reputable repositories.

Indicators of Compromise

Hashes:

  • 902013bc59be545fb70407e8883717453fb423a7a7209e119f112ff6771e44cc
  • b6db6702ca85bc80599d7f1d8b1a9b6dd56a8e87c55fc831dc9c689e54b8205d
  • ed38a61a6b7af436120465d352baa4cdf4ed8f01a7db7245b6254353e52f818f
  • afbc79dfc4c7c4fd9b71b5fea23ef12adf0b84b1af22a993ecf91f3d829967a4
  • 97f08424b14594a5a39d214bb97823690f1086c78fd877558761afe0a032b772
  • 38ba7790697da0a736c80fd9a04731b8b0bac675cca065cfd42a56dde644e353
  • e0748b32d0569dfafef6a8ffd3259edc6785902e73434e4b914e68fea86e6632
  • 4428d7bd7ae613ff68d3b1b8e80d564e2f69208695f7ab6e5fdb6946cc46b5e1
  • c9552ba602d204571b9f98bd16f60b6f4534b3ad32b4fc8b3b4ab79f2bf371e5
  • 3e37c7b65c1e46b2eb132f98f65c711b4169c6caeeaecc799abbda122c0c4a59
  • 8a58dce7b57411441ac1fbff3062f5eb43a432304b2ba34ead60e9dd4dc94831

IP Address(es):

  • 199.226[.]11:554

REFERENCES

North Korea’s Lazarus Group’s DLang-Based RAT Targeting VMWare Horizon Servers via Log4j

Zero-Day: Google Chrome

Zero-Day: Google Chrome

DOWNLOAD PDF

SUMMARY

Google released security patches addressing 7 Chrome browser vulnerabilities, one is a zero-day being actively exploited. The Zero-Day is CVE-2023-6345, a high-severity vulnerability described as an integer overflow bug within Skia, an open-source 2D graphics library.

VULNERABILITY DETAILS

Google responded to the zero-day vulnerability with an immediate security update ad it is aware of the exploit’s presence in the wild.

The vulnerability is an integer overflow weakness within the Skia open-source 2D graphics library. Potential risks associated with this vulnerability range from system crashes to arbitrary code execution.   Skia is a graphics engine for various products, including ChromeOS, Android, and Flutter.  Discovered on November 24 by Google’s Threat Analysis Group (TAG), this vulnerability follows a pattern exploited by state-sponsored hacking groups in espionage campaigns targeting notable individuals, such as journalists and opposition politicians.

Users are strongly advised to upgrade to Chrome versions 119.0.6045.199/.200 for Windows and 119.0.6045.199 for macOS and Linux to mitigate potential security threats. Additionally, users of Chromium-based browsers, including Microsoft Edge, Brave, Opera, and Vivaldi, are encouraged to promptly apply provided fixes as they become available.

RECOMMENDATIONS

  • Users are strongly advised to update Chrome browsers to the latest versions (119.0.6045.199/.200 for Windows, 119.0.6045.199 for macOS and Linux).
  • Ensure all devices running Chrome are updated to the latest versions.
  • If using browsers like Microsoft Edge, Brave, Opera, or Vivaldi that are based on Chromium, stay informed about security updates for these browsers and apply them as they become available.

REFERENCES