Rewterz Threat Advisory – Multiple Fortinet FortiOS and FortiProxy Vulnerabilities
June 19, 2023Rewterz Threat Advisory – CVE-2023-32535 – Trend Micro Apex Central Vulnerability
June 19, 2023Rewterz Threat Advisory – Multiple Fortinet FortiOS and FortiProxy Vulnerabilities
June 19, 2023Rewterz Threat Advisory – CVE-2023-32535 – Trend Micro Apex Central Vulnerability
June 19, 2023Severity
High
Analysis Summary
Gh0st RAT is a remote administration tool (RAT) that was created by a Chinese hacking group called C. Rufus Security Team in 2008. It was released as open-source software, which made it widely available and easy for threat actors to obtain and customize. Gh0st RAT has a range of features, including surveillance, persistence, and information stealing capabilities. It can be used to remotely access and control infected systems, steal sensitive information, and perform a variety of malicious actions. The tool has been used in various cyber attacks and is a known threat to organizations, particularly those in sensitive industries such as healthcare.
Gh0st RAT has a long history of being used by Chinese nation-state threat actors to target high-value organizations, such as governments, embassies, economic targets, and media. One notable operation was the GhostNet operation in 2009, which used Gh0st RAT to conduct surveillance and espionage on the Dalai Lama’s Tibetan exile centers in multiple countries. Despite being first identified almost 15 years ago, Gh0st RAT is still actively distributed today, as evidenced by the recent phishing campaign targeting a European-owned medical technology organization in China. The malware was delivered via an embedded link affiliated with Tencent and based in Hong Kong, and the C2 server was located on the CHINANET Jiangsu province network in the city of Nanjing. This highlights the ongoing threat posed by Gh0st RAT and the need for organizations to remain vigilant against such attacks.
phishing email to deliver Gh0st RAT via an embedded link: source
To protect against Gh0st RAT and other types of malware, it is important to keep your operating system and software up-to-date, use strong passwords and two-factor authentication, and avoid opening suspicious emails or downloading files from untrusted sources. Additionally, using anti-virus software and performing regular system scans can help detect and remove any potential infections.
Impact
- Credential Theft
- Unauthorized Access
- Theft of Sensitive Information
- File manipulation
- Remote command execution
Indicators of Compromise
MD5
- 99d3b263866a565ce24819e430c4e802
- 5f81262f5577b8a3e0ac70b25c7a706e
- c1cce28493f6d1dc7d8ac1a1c294d2fe
- be2a1668352f1be7c355b94d5b942721
SHA-256
- aecead7bb0ec85e54dc902a2d02a6051b70b1a5d273c839a41a9f1246872d7b4
- df220b8608808820d98603530b37c943fcd84f80d5086d23de669e53e22c4143
- 3fdc52a387a12b0bf5ef0cc14d57cb08e52a66774c0069625c05d2260ca2fdf5
- 9e53bc6c5fcbb2a32ca55647e429318879a80077aeb83a45f9745fce86e3ff8c
SHA-1
- d5c6e0962320324c2e5082bd090ca9bbd8c7e3aa
- 455a45c9f875c42a8980c4196424419b6222c19c
- 94c02fad70a1ae191aaff02d2f26895a33ef80c8
- 6012e12e862862760cd8e507e20621837aa8348b
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
- Patch and upgrade any platforms and software timely and make it into a standard security policy.
- Keep your operating system and software up-to-date: Gh0st RAT can exploit vulnerabilities in outdated operating systems and software. By keeping your system up-to-date with the latest security patches and updates, you can reduce the risk of being infected with Gh0st RAT.
- Use strong passwords and two-factor authentication: Strong passwords and two-factor authentication can make it more difficult for attackers to gain unauthorized access to your system.
- Be cautious with email attachments and links: Gh0st RAT can be distributed through phishing emails with malicious attachments or links. Be wary of emails from unknown senders and avoid opening attachments or clicking on links unless you are sure they are safe.
- Use a firewall: A firewall can help block unauthorized traffic from entering your system and prevent Gh0st RAT from connecting to its command and control servers.
- Regularly back up your important data: Backing up your data regularly can help you recover from a Gh0st RAT infection and minimize the impact of any data loss.
- It’s important to note that prevention is key when it comes to Gh0st RAT and other types of malware. By following these recommendations and staying vigilant, you can reduce the risk of being infected and protect your system and data.