Rewterz Threat Alert -RedLine Stealer – Active IOCs
April 5, 2023Rewterz Threat Advisory – Multiple Google Chrome Vulnerabilities
April 6, 2023Rewterz Threat Alert -RedLine Stealer – Active IOCs
April 5, 2023Rewterz Threat Advisory – Multiple Google Chrome Vulnerabilities
April 6, 2023Severity
High
Analysis Summary
The Chinese nuclear energy industry has lately been under attack from a cyberespionage hacking group known as Bitter APT, which used phishing emails to infect computers with malware downloaders. Bitter APT group has been since at least 2021. In the past, the group has targeted organizations in Pakistan, China, Bangladesh, and Saudi Arabia. The group focuses on the energy and government sectors.
Experts have seen additional levels of obfuscation being used in recent attacks, as well as modifications to the first-stage payloads, in order to evade detection. Further decoys were used by threat actors for social engineering.
In a recent effort discovered by researchers, Bitter sends emails to numerous Chinese nuclear energy enterprises and academics involved in that subject while posing as the embassy of Kyrgyzstan in Beijing.
- phishing email
“We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipients in the nuclear energy industry in China. In some emails, people and entities in academia are also targeted, also related to nuclear energy. The phishing emails contain a lure that invites the recipients to join conferences on subjects that are relevant to them. The lures are designed to socially engineer the recipient to download and open an attached RAR file that contains either a Microsoft Compiled HTML Help (CHM) or Excel payload.” mentioned in the report
The email contains a RAR attachment, which is falsely claimed to contain an invitation card for a conference, but actually contains either a Microsoft Compiled HTML Help (CHM) file or a malicious Excel document.
The Bitter APT uses a CHM payload that executes commands to create scheduled tasks on the compromised system and download the next stage of the attack. This is a common tactic used by attackers to maintain persistence on a system and evade detection by security software.
When an Excel document is hidden in the downloaded RAR attachments, the scheduled task is added by exploiting an older Equation Editor vulnerability that is triggered by the opening of the malicious document. Equation Editor is a component of Microsoft Office that allows users to insert mathematical equations into their documents. The vulnerability in Equation Editor was first discovered in 2017 and allowed attackers to execute code remotely on a victim’s computer.
According to a researcher, the threat actor probably prefers CHM payloads since they work with the least amount of user involvement, don’t require the victim to run a susceptible version of Microsoft Office, and may avoid static analysis thanks to LZX compression.
- Infection chain
They also added,“The Excel payloads simply contain an Equation Editor exploit that creates two different scheduled tasks. There is no decoy in the document. “One scheduled task (shown below) runs every 15 minutes, to download a next stage EXE payload using cURL, also sending the actor the name of the infected machine. These tactics have been observed being used by Bitter APT in 2021/2022.”
The second-stage payload is an MSI or PowerShell file if a CHM payload is used, or an EXE file if an Excel document payload is utilized.
- malicious Powershell (in CHM file)
Analysts were unable to collect any actual payloads delivered in this campaign, although they suspected that they might have included keyloggers, RATs (remote access tools), and data stealers.
“Bitter APT have been conducting espionage campaigns for years using many tactics, including phishing, to achieve their goals. It is advised that entities in government, energy, and engineering especially those in the Asia-Pacific region should remain vigilant when receiving emails, especially those claiming to be from other diplomatic entities.” researchers conclude.
Impact
- Information Theft and Espionage
Indicators of Compromise
MD5
- 8d718d776529ab0262b09f1940827e42
- 3776ae6d55e371abaf7660a8eecead6d
- 5d0975c91e685fb8537c27f468390ba1
- 956ad7e87ee4ea4473408d1f2c6fe7ff
- 00dc44731957d5221588b2ed9eaef09a
- cce89f4956a5c8b1bec82b21e371645b
SHA-256
- b2566755235c1df3371a7650d94339e839efaa85279656aa9ab4dc4f2d94bbfa
- 33a20950e7f4b2191706ddf9089f1e91be1e5384cca00a57cf6b58056f70c96b
- 7e7e90b076ef3ea4ef8ed4ef14fb599a2acb15d9ce00c78e5949186da1e355cf
- 07504fcef717e6b74ed381e94eab5a9140171572b5572cda87b275e3873c8a88
- 06b4c1f46845cee123b2200324a3ebb7fdbea8e2c6ef4135e3f943bd546a2431
- ded0635c5ef9c3d63543abc36a69b1176875dba84ca005999986bd655da3a446
SHA-1
- 2c9cfe12afe936130931ba56468c69d12eb4149b
- e789e3c9aa6d943d995dd251dd379eca0233e0f8
- 0f5667c317bac167549b36f5788dce0224a32354
- 8df3955666c8a335c48da39820db0f88e4a6ac27
- e7e650578eeadcdf90f4d9349da234e7d2612e7f
- f41f991fe939ad19611e73c467721de79f860184
Remediation
- Search for IOCs in your environment. Block all threat indicators at your respective controls
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.Educate Employees: Organizations should provide security awareness training to their employees to ensure they understand the risks associated with phishing attacks and how to identify them. Employees should be cautious when receiving unexpected emails with attachments, especially if they are from an unknown sender.
- Update Software: Ensure that all software, including Microsoft Office, is up to date with the latest security patches to prevent vulnerabilities from being exploited by attackers.
- Implement Email Filtering: Deploy an email filtering system that can detect and block suspicious emails that may contain malware or phishing attempts.
- Limit Administrative Access: Restrict administrative access to critical systems and sensitive data to only those who require it.
- Implement Two-Factor Authentication (2FA): Implement 2FA as an additional layer of security to prevent unauthorized access to user accounts.
- Conduct Regular Backups: Regularly backup critical data and test the backup and recovery process to ensure that the organization can quickly restore operations in the event of a successful attack.
- Deploy Endpoint Detection and Response (EDR): Implement EDR solutions to detect and respond to any suspicious activity or malware on endpoints.
- Develop an Incident Response Plan: Organizations should have an incident response plan in place that outlines the steps to take in the event of a successful attack, including containment, eradication, and recovery.
- By following these steps, organizations can improve their overall security posture and mitigate the risk of falling victim to phishing attacks such as the one carried out by the Bitter threat actor group.