Orange Magazine
  • Home
  • Advocacies
  • Arts & Culture
  • Entertainment
    • Books
    • Events
    • Gaming
    • Concerts
    • Movies
    • Music
    • Magazines
    • Theaters
    • TV
    • Tech
  • Lifestyle
    • Beauty & Wellness
    • Fashion & Brands
    • Food & Beverage
    • Home & Living
  • Featured
    • Exclusives
    • Interviews
    • Covers
    • Press Releases
    • Promos
  • About
  • Contact Us
Facebook X (Twitter) Instagram
Orange MagazineOrange Magazine
  • Home
  • Advocacies
  • Arts & Culture
  • Entertainment
    • Books
    • Events
    • Gaming
    • Concerts
    • Movies
    • Music
    • Magazines
    • Theaters
    • TV
    • Tech
  • Lifestyle
    • Beauty & Wellness
    • Fashion & Brands
    • Food & Beverage
    • Home & Living
  • Featured
    • Exclusives
    • Interviews
    • Covers
    • Press Releases
    • Promos
  • About
  • Contact Us
Orange Magazine


Home»Business»“Invisible” Attacks: Cybercriminals Breach Enterprises In 40 Countries Using Hidden Malware
Business

“Invisible” Attacks: Cybercriminals Breach Enterprises In 40 Countries Using Hidden Malware

Team OrangeBy Team OrangeFebruary 13, 2017Updated:February 13, 2017No Comments4 Mins Read
Facebook Twitter Pinterest
Share
Facebook Twitter LinkedIn Pinterest Email

Kaspersky Lab experts have discovered a series of “invisible” targeted attacks that use only legitimate software: widely available penetration-testing and administration tools as well as the PowerShell framework for task automation in Windows – dropping no malware files onto the hard drive, but hiding in the memory.

This combined approach helps to avoid detection by whitelisting technologies, and leaves forensic investigators with almost no artefacts or malware samples to work with. The attackers stay around just long enough to gather information before their traces are wiped from the system on the first reboot.

At the end of 2016, Kaspersky Lab experts were contacted by banks in CIS which had found the penetration-testing software, Meterpreter, now often used for malicious purposes, in the memory of their servers when it was not supposed to be there.

Kaspersky Lab discovered that the Meterpreter code was combined with a number of legitimate PowerShell scripts and other utilities. The combined tools had been adapted into malicious code that could hide in the memory, invisibly collecting the passwords of system administrators so that the attackers could remotely control the victim’s systems.

The ultimate goal appears to have been access to financial processes.

Kaspersky Lab has since uncovered that these attacks are happening on a massive scale: hitting more than 140 enterprise networks in a range of business sectors, with most victims located in the USA, France, Ecuador, Kenya, the UK and Russia.

In total, infections have been registered in 40 countries.

The geography of the organizations attacked

It is not known who is behind the attacks. The use of open source exploit code, common Windows utilities and unknown domains makes it almost impossible to determine the group responsible – or even whether it is a single group or several groups sharing the same tools. Known groups that have the most similar approaches are GCMAN and Carbanak.

Such tools also make it harder to uncover the details of an attack. The normal process during incident response is for an investigator to follow the traces and samples left in the network by the attackers. And while data in a hard drive can remain available for a year after an event, artefacts hiding in the memory will be wiped on the first reboot of the computer. Fortunately, on this occasion, the experts got to them in time.

“The determination of attackers to hide their activity and make detection and incident response increasingly difficult explains the latest trend of anti-forensic techniques and memory-based malware.”

That is why memory forensics is becoming critical to the analysis of malware and its functions. In these particular incidents, the attackers used every conceivable anti-forensic technique; demonstrating how no malware files are needed for the successful exfiltration of data from a network, and how the use of legitimate and open source utilities makes attribution almost impossible,” said Sergey Golovanov, Principal Security Researcher at Kaspersky Lab.

The attackers are still active, so it is important to note that detection of such an attack is possible only in RAM, the network and registry – and that, in such instances, the use of Yara rules based on a scan of malicious files are of no use.

Details of the second part of the operation, showing how the attackers implemented unique tactics to withdraw money through ATMs will be presented by Sergey Golovanov and Igor Soumenkov at the Security Analyst Summit, to be held from 2 to 6 April, 2017.

Kaspersky Lab products successfully detect operations using the above tactics, techniques and procedures. Further information on this story and Yara rules for forensic analysis can be found in the blog on Securelist.com. Technical details, including Indicators of Compromise were also provided to customers of Kaspersky Intelligence Services.

Combatting attacks by groups like GCMAN or Carbanak requires a specific set of skills from the security specialist guarding the targeted organization. During the Security Analysis Summit 2017, Kaspersky Lab’s top-notch specialists will be running exclusive security training sessions designed to help specialists detect sophisticated targeted attacks. Apply for training on “Hunting targeted attacks with Yara rules” here. Apply for training on Malware reverse engineering here.

kaspersky lab
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Team Orange
Team Orange

TEAM ORANGE is Orange Magazine TV's select contributors. It also contains Press Releases. Please follow @OrangeMagTV on Twitter for other updates.

Related Posts

Experience Cool Tech All Summer with the brand new TechLife Pad Plus 12” for only P9,999

May 15, 2025

Regus Victoria de Makati Sets New Standard for Flexible Workspaces in the Metro

May 15, 2025

Reclaim the Filipino Vote: Multi-sectoral group backs Comelec’s ‘Kontra-Bigay’ campaign with #MineAngBotoKo movement

May 15, 2025

Leave A Reply Cancel Reply

Facebook X (Twitter) Instagram
© 2025 OrangeMagazine.ph.

Type above and press Enter to search. Press Esc to cancel.