Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
The White Elephant Group is an Advanced Persistent Threat (APT) organization with origins in India. Their cyber attack activities date back to November 2009. A cybersecurity company, named the organization White Elephant in Chinese and first disclosed their attack activities in China in 2016. They subsequently released a series of reports detailing the White Elephant Group’s cyber attacks, focusing on their activities against China and tracking their attack patterns.
The White Elephant Group’s targets are widespread, but they primarily focus on China and Pakistan. They possess attack capabilities across multiple platforms, including Windows, Android, and macOS. The group specializes in using politically sensitive topics as bait to carry out targeted spear phishing attacks. They constantly upgrade their attack techniques to improve their effectiveness and avoid detection.
In an attack activity observed by researchers, the White Elephant Group targeted specific units within their own country. The attackers sent phishing emails to their targets, with the email attachment containing a compressed package housing a malicious LNK file. This LNK file served as a means to download the BADNEWS remote control Trojan, granting the attackers control over the compromised system and facilitating information theft.
Further analysis revealed that the LNK series of attacks are connected to recent network attacks on military and political targets in South Asia. These attacks employed mature commercial remote control tools such as Remcos. The attackers utilized LNK-based baits, including file names with military and political themes, phishing websites, and more, as the initial entry point for their attacks. They compromised a significant amount of network infrastructure to support load distribution and control communications.
The associated attacks have clear indications of having an Indian background, but they do not currently involve the reporting country. The only identified overlap with the White Elephant Group is a digital certificate. The attackers distributed the compressed package containing the malicious LNK file as an email attachment, disguising it as a PDF document to entice the target into opening and executing it.
Upon execution of the LNK file, it downloads a decoy file from a specific URL and saves it on the target system. Subsequently, the payload is downloaded from another URL and stored as “OneDrive.exe” in the C: ProgramDataMicrosoftDeviceSync directory. This OneDrive.exe file is the BADNEWS remote control Trojan, which enables various malicious functionalities such as file download, command execution, and screen capture. The OneDrive.exe file is digitally signed and bears a specific digital signature.
Once the BADNEWS Trojan is executed, it first determines the machine’s time zone. If the time zone corresponds to China standard time, it proceeds with executing further malicious operations. The Trojan creates a mutex named “qzex” to ensure its uniqueness within the current environment and registers a keyboard hook using the SetWindowsHookExW function.
The Trojan records keystrokes, storing them in a file named ” %temp%kednfbdnfby.dat” It utilizes web services like myexternalip.com, api.ipify.org, and ifconfig.me to obtain the host’s external network address. The external network IP is then queried using web services like api.iplocation.net and ipapi.co to determine the country associated with the IP.
The collected information is encrypted and sent back to the Command-and-Control (C2) server as part of the heartbeat packet. The data collected from the target machine includes sensitive information that undergoes Base64 encoding, AES-CBC-128 encryption using the key “qgdrbn8kloiuytr3” and IV “feitrt74673ngbfj,” and another round of Base64 encoding.
The Trojan establishes communication with the C2 server, utilizing the address “charlizard.shop,” communication port 443, and the URI “/tagpdjjarzajgt/cooewlzafloumm.php.” Different threads handle distinct tasks, and communication content is encrypted using AES–CBC-128.
One thread is responsible for sending basic information to verify if the target machine is powered on. Another thread facilitates remote control functionality, executing commands issued by the attacker. The thread responsible for executing cmd commands collects information such as the current user name, network configuration, DNS cache, system information, and process list. This information is encrypted and sent back to the C2 server.
The Trojan OneDrive.exe used in this attack shares similarities in code structure, encryption algorithm, and communication mode with the BADNEWS Trojan previously utilized by the White Elephant Group. The storage path for the BADNEWS Trojan, “C:ProgramDataMicrosoftDeviceSync,” is a common file path used by the organization. The correlation analysis suggests that the BADNEWS Trojan is associated with recent attacks on military and political targets in South Asia. The attackers heavily employ the Remcos commercial remote control Trojan to gain remote access and extract sensitive information from the targeted systems.
Remcos is a commercial remote control Trojan that offers a wide range of capabilities for unauthorized access and control over compromised systems. It provides functionalities such as remote desktop control, allowing the attacker to take control of the victim’s desktop environment. Additionally, it enables screen stealing, which involves capturing screenshots of the victim’s screen without their knowledge.
The Trojan also facilitates clipboard stealing, where it can monitor and collect data copied to the clipboard, potentially capturing sensitive information such as passwords or confidential data. Furthermore, Remcos supports camera and audio peeping, enabling the attacker to covertly access the victim’s webcam and microphone, potentially compromising their privacy.
In terms of digital certificate association, a specific digital signature used by the BADNEWS Trojan in the attack against relevant units in the reporting country has been found in several malicious files. One such file is named “Minutes-of-Meeting-Joint-Ops.exe,” uploaded from Bangladesh, which belongs to the Remcos remote control family. The associated C2 address for this Trojan is “45.137.116.253:443 (TCP).” Other files using this signature include Remcos remote control files with military and political themes.
To summarize, the attacks involving the White Elephant Group, as discovered by researchers, indicate that this Indian APT organization employs dedicated remote control Trojans through phishing attacks. The attack methods and codes align with their previous activities, with similarities observed in the BADNEWS Trojan. The association of the digital certificate with Remcos commercial Trojan usage suggests a growing trend among Indian organizations to procure commercial Trojan tools, reducing costs while increasing the efficiency of their cyber attack activities.