From the Front Lines | 8220 Gang Massively Expands Cloud Botnet to 30,000 Infected Hosts

Over the last month a crimeware group best known as 8220 Gang has expanded their botnet to roughly 30,000 hosts globally through the use of Linux and common cloud application vulnerabilities and poorly secured configurations. In a recent campaign, the group was observed making use of a new version of the IRC botnet, PwnRig cryptocurrency miner, and its generic infection script.

8220 Gang is one of the many low-skill crimeware gangs we continually observe infecting cloud hosts and operating a botnet and cryptocurrency miners through known vulnerabilities and remote access brute forcing infection vectors. While the group has operated for years, by mid 2021, the botnet was observed operating with roughly 2000 hosts globally. This month, we observed new campaigns utilizing long-running sets of infrastructure, bringing the botnet numbers up to today’s figure of around 30,000 infected hosts.

Who Are the 8220 Gang?

8220 Gang, also known as 8220 Mining Group, was first publicly reported by Talos in 2018. The name 8220 Gang comes from the group’s original use of port 8220 for C2 network communications. The group has evolved somewhat from their original interests and the use of “WhatMiner”, which was forked from another group known as Rocke. The targeting of Docker, Hadoop, Redis, Drupal, and other services has been a continuing trend since their first discovery. Based on Talos’ discovery of Github repository details and infrastructure, the group is believed to be a Chinese-speaking threat actor.

Victims of 8220 Gang are typically, but not exclusively, users of cloud networks operating vulnerable and misconfigured Linux applications and services. Attacks make use of SSH brute forcing post-infection to automate local and global spreading attempts. Victims using cloud infrastructure (AWS, Azure, GCP,  Aliyun, QCloud) are often infected via publicly accessible hosts running Docker, Confluence, Apache WebLogic, and Redis. Victims are not targeted geographically, but simply identified by their internet accessibility. At the time of writing, roughly 30,000 systems globally have been potentially infected with the 8220 Gang botnet.

8220 Cloud Botnet Infection Script

The infection script acts as the main code for the botnet to operate. Despite its lack of detection evasion or obfuscation, the script appears to be highly effective at infecting targets. The core functionality of the script has been widely reported on for a number of years as it has been reused by many amateur cryptocurrency mining groups and profit-seeking individuals. For that reason, researchers must be wary of attributing the script in its entirety to 8220 Gang.

We can summarize the script’s actions into the following buckets:

  1. Victim host preparation and cleanup, including the removal of common cloud security tools.
  2. IRC Botnet malware and miner download/configuration and remediation persistence.
  3. Tsunami IRC Botnet malware sample validation and connectivity.
  4. Internal network SSH scanner with lateral spreading capability.
  5. PwnRig cryptocurrency miner execution.
  6. Local SSH key collection, connectivity testing, and lateral spreading.

The script is notoriously ugly and often contains unused or outdated functions, allowing trivial tracking over time.

New and Old SSH Scanning Functions
New and Old SSH Scanning Functions

8220 Gang and other groups who make use of this same infection script can be observed changing it multiple times a month. In late June 2022, the group began making use of a separate file they call “Spirit” to manage some of the SSH brute forcing functionality outside of the script. Spirit contains a list of approximately 450 hardcoded credentials for SSH brute forcing. The list includes combinations of the root username, and default Linux device and application passwords.

Another evolution example is the use of block lists. 8220 Gang and others make use of block lists in the infection script to avoid infecting specific hosts, such as researcher honeypots, which may place their illicit efforts at risk. The method of implementing the block list has shifted from direct IPs listed in the script to a list in an additionally-downloaded file. The method of calling the list in the script varies across implementations.

Example of blocklist functionality in recent infection scripts
Example of blocklist functionality in recent infection scripts

What we can conclude is that the trivial design of the script allows for simple attacker experimentation, and it should not surprise researchers when specific functionality is added or reorganized.

Updated PwnRig Miner

PwnRig is a custom version of the open source XMRig miner that gained its name based on strings the author used in its early versions. More recent versions of PwnRig continue to make use of the same author name, while some functionality of the miner has been updated.

PwnRig Miner Execution Options - XMRig Variant
PwnRig Miner Execution Options – XMRig Variant

One of the notable features of PwnRig is the fake pool request for government domains. Early 2021 versions made use of fbi.gov; however, the latest version uses fbi.gov.br and 161.148.164.31. While the FBI subdomain is not real, the IP address is the active IP hosting the gov.br domain – the true Brazil federal government domain.

Conclusion

Over the past few years 8220 Gang has slowly evolved their simple, yet effective, Linux infection scripts to expand a botnet and illicit cryptocurrency miner. From our observations the group has made changes over the recent weeks to expand the botnet to nearly 30,000 victims globally. PwnRig, the IRC Botnet, and generic infection script are all incredibly simple and used opportunistically in the groups targeting.

Indicators of Compromise

Indicator Description
165f188b915b270d17f0c8b5614e8b289d2a36e2 Infection script, downloaded filename “jira”, locally found as “.lock” (Recent)
onlypirate[.]top, jira.onlypirate[.]top, pwn.onlypirate[.]top Actor controlled C2/Download Domain
letmaker[.]top, jira.letmaker[.]top, pwn.letmaker[.]top Actor controlled C2/Download Domain
oracleservice[.]top, a.oracleservice[.]top, b.oracleservice[.]top, pwn.oracleservice[.]top Actor controlled C2/Download Domain
pwndns[.]pw IRC Botnet / Tooling Domain
givemexyz[.]in Actor controlled C2/Download Domain
givemexyz[.]xyz Actor controlled C2/Download Domain
bashgo[.]pw IRC Botnet / Tooling Domain
51.255.171[.]23 IRC Botnet Server (Shared Infrastructure)
159.203.103[.]62 IRC Botnet Server (Shared Infrastructure)
a018d55214cf51f951dc5758fa818a45323db8d8 8220 Gang Associated Script
4180c193f366021f1c10890a5bcd2d3ecef47fa7 8220 Gang Associated Script
b400d9ebf27355d600b23d6b397832b1f427ff97 8220 Gang Associated Script
90b5a2cbc29f797bbe6c992f8d993ab337f1db89 8220 Gang Associated Script
e00a617be872d373f066962eb9d231482d0c7650 8220 Gang Associated Script
6f0c6c2625355b8da466127c6217f89132e13fdf 8220 Gang Associated Script
6148cd5d3193863f395c1a9675cbf20f47bb7f6e 8220 Gang Associated Script
7021e82e50b858c489659e1bd80f19049006c5f0 8220 Gang Associated Script
ca76533d3614024046b3cf2b2b166d22327bb859 8220 Gang Associated Script
09beb8d4bf01af519fc83a78adf5abf69594c080 8220 Gang Associated Script
61ac24e100dd0d3408f07b1f9e0ed7ca2e5d8db6 8220 Gang Associated Script
9229b3a232949df16772595f3fc2bb9ca14b3f86 8220 Gang Associated Script
9b5a448d335c20f23bed7ebcb983e1ea67fc7421 8220 Gang Associated Script
641b8d2ed9ed47ce90ec30f887a82cfef9db64af 8220 Gang Associated Script
26ed095c7102776ed4431e994252e97e9554d0e5 8220 Gang Associated Script
8e34816e82a189cf607187154eebee2089d75a18 8220 Gang Associated Script
c1fb3acdfd0627eedfc061e47fc0f5600254dc5b 8220 Gang Associated Script
bd8966ce091589c2b78f940bf955d0c8a4b99241 8220 Gang Associated Script
8c3beeb51860c8869a893f090756fa0dfdf691e3 8220 Gang Associated Script
da486a6ff50476c185c5118b1a8a32a5c3023d14 8220 Gang Associated Script
6ad4f21c5ac559b360ded60fb8308463552c47de 8220 Gang Associated Script
8953a9a896f90c6a1f3c8f54fd010b50920c0a6e 8220 Gang Associated Script
155b178be265fecc1d052e43a6ae13e581441d6f 8220 Gang Associated Script
8bb3c9c4036f25244a21e79723086fcec70aec77 8220 Gang Associated Script
34b747135ebb0a6a0af18ba28bf6d62359b261e0 8220 Gang Associated Script
09778a0a7af741b85bb7d022725bf25b468bba15 8220 Gang Associated Script
ac29e4a8aec19dd115a55f0adf45d8293566767a 8220 Gang Associated Script
5c53e4c53b83885e9ded6fd41ac215015539e89c 8220 Gang Associated Script
b305287aa72a74df432daf1a5b7c80c64c08dea4 8220 Gang Associated Script
79bf00fd518847886c69da3dca068c5ac2bacb80 8220 Gang Associated Script
5070e48e224627b16cf536356de89387c3c886e1 8220 Gang Associated Script
757e3f0517051272be6cc810536fd130d823ad2a 8220 Gang Associated Script
a830eb4cd77e92ee9516357cc47a5243d96fc683 8220 Gang Associated Script
4fb5b84f29d0b4ecaded0438fc9f7faca2003459 8220 Gang Associated Script
9298221acadac9b12dac4057d123ad0c05b26c22 8220 Gang Associated Script
0d780ecea75bf4cc405a777e40da46a49003cb84 8220 Gang Associated Script
99532847dee9466cbdfdb02db45a4657e45e8c34 8220 Gang Associated Script
cc9c21e5091a9e6b8d772090b7a68fa521772835 8220 Gang Associated Script
f5950d7ce28590a42a9c837dd019c04404340223 8220 Gang Associated Script
398e7149f547ec9a3181d1d033a71fdfb52a7a0d 8220 Gang Associated Script
1a4cc79937adcce2f2a1c59e8a3ff8d7b75eb843 8220 Gang Associated Script
7bdd4ffa86c069f945ed8d5d9e0089f7536f112b 8220 Gang Associated Script
c9dfb589ebe9e7daf9fd00040d29bdb0ff20a8ed 8220 Gang Associated Script
3fc7734dc537c33398e885630e03d6cea08dcaf1 8220 Gang Associated Script
07756ac7497f4011ce280e5f7d1d1c21ed973cd6 8220 Gang Associated Script
554677bff4a29bb286ab9d840ac7565d330a26db 8220 Gang Associated Script
b394f1c580abaac90980a868d6e6638d014b2dac 8220 Gang Associated Script
4f28f566f48580efce59908884906469063aec11 8220 Gang Associated Script
4ce0f5d71ab977ed2501e1559198684113dab48e 8220 Gang Associated Script
8f881f9f8f4754bb2949c7d825dee6035fd84d89 8220 Gang Associated Script
b8347f76903d25ea62d5b65797e8fea8b18a55f1 8220 Gang Associated Script
5cae484e9827067350bfdb5c835fad4db0fae7d8 8220 Gang Associated Script
798fbb973b7e06465779c48357e500e552a9d4eb 8220 Gang Associated Script
b8f405f77700f703fc0cd4130bac153d3515d0f4 8220 Gang Associated Script
9b93a71776480fc36b87329311772b58598bc47d 8220 Gang Associated Script
f7e4484a32a1c43f0978b0b9a779fa291d3917a0 8220 Gang Associated Script
51c829033a92963aa930e53d2b64cf61670d36fc 8220 Gang Associated Script
c31f32bb412dfc6be0c833dbcd0965a0a69b2187 8220 Gang Associated Script
dbf72af6d1e58aadba6ca0c54e31b276605e0143 8220 Gang Associated Script
6a6974167f0bb7f327c8e2ae3e773d74f379bcc7 8220 Gang Associated Script
48a94f6bd7c58f412d6c546ee296def3a8c26db6 8220 Gang Associated Script
651fdbfedbc31959b4cfbe83f01da659baec84e4 8220 Gang Associated Script
538390a7aa6e6678330b2bd775a3d9931fd177b4 8220 Gang Associated Script
094a989148421b455feb4a23460d7c833a44934b 8220 Gang Associated Script
b00d3376dbd8d9524cbab3ad52378b597d6b6c75 8220 Gang Associated Script
5cf3c2c35b26811806e421a2921ff0c2fb9f25d9 8220 Gang Associated Script
8d02d66a4ad12b5531465842124dc50e84b1db39 8220 Gang Associated Script
8dbddb5b0ef004b4608c4236d75c784a19e72e6c 8220 Gang Associated Script
ada2299756eb154b534943c31ffc46474b894dd2 8220 Gang Associated Script
a4b18e8d24a3c5cbbb1a544ba109ab49dce4ac06 8220 Gang Associated Script
0ad5316a897d4d724cb32690675941b60156a463 8220 Gang Associated Script
3a5eb4338c7d87e3dfa1ce4dea9e4c5904401f40 8220 Gang Associated Script
235b8373841e9b8bcee9517c5f2b7b8192975a53 8220 Gang Associated Script
01665c6da2a9711c1b091c50bab2272782664226 8220 Gang Associated Script
0f4eaf87aee6275c60c10b7bbf205f4968b5571b 8220 Gang Associated Script
9c34c1f55ec052ec4582b8476aa1299fc5264b42 8220 Gang Associated Script
4bd8130ea41d3b796e507f46ff0d04db8bdb326a 8220 Gang Associated Script
19958aba7665bfbe7a18e555515c8b3dd0b24fbd 8220 Gang Associated Script
aba592e4f58cb18094ed6423e4777a9f2956b6ba 8220 Gang Associated Script
c9b79d50d3588982c1a92b5533f55fe2d8a60657 8220 Gang Associated Script
52445f3e47ff90bbf6d8b46687af6ccfb8452831 8220 Gang Associated Script
caf1e814fba4d9889fa63e8e2fb7de3fc6b006aa 8220 Gang Associated Script
39eb1591ac1952cf32752abcc626da703ecb006c 8220 Gang Associated Script
63eae994b4fa5fe49e26bd00222dcf8de6e13dc5 8220 Gang Associated Script
bbbccc185f9c545fc56042baf13db5f52b17a27c 8220 Gang Associated Script
c89e70626815f2e632602046c83939fd8d5a5288 8220 Gang Associated Script
3e4c51160c74c48ee3fb02c1df21448559a51d82 8220 Gang Associated Script
4e147eeca85185dc8313770709279d31b43c7df0 8220 Gang Associated Script
2bd28b494f468a6416e297f7b4ead42a429a4683 8220 Gang Associated Script
62c9f4b9bfb86c201a54ee7ccb8ca0a01fa39517 8220 Gang Associated Script
3b1cd146b31f3b615152456c17498669547fdca5 8220 Gang Associated Script
fdc02e772b6e17f01c8cf33dd028184a5775a0bd 8220 Gang Associated Script
636d5c40108aa635feaaf2c15ddae103d746e51a 8220 Gang Associated Script
68696b704f9a6b0240316ff67984057b3f040f24 8220 Gang Associated Script
de5ea4db77f15855fea8893e4e188ccc2c85547b 8220 Gang Associated Script
34044407ff14930ae648d0167fac0e1476380ab9 8220 Gang Associated Script
a06c673ada72e8ec7214e1464b711112bbd9bcfa 8220 Gang Associated Script
de3b342dfb419d7903378ea55b8179d98ec010d7 8220 Gang Associated Script
c4851ff2ab8334918247494fb2aeec42c9c6226d 8220 Gang Associated Script
c57f3f8a4fc0d962a84887b3540788808a48519e 8220 Gang Associated Script
ce5413cc02fe84663136ecde86ba063d77077aa1 8220 Gang Associated Script
d5a3c26e5986ba9a24549abc4c96d17eaaef0659 8220 Gang Associated Script
3d8ea93c61029e266c529e1ec1f7fd1c714bd0bb 8220 Gang Associated Script
f3d132802e10b56551ed59c817cff04680e92411 8220 Gang Associated Script
acff0bc1b75127ef7502e23f46cf9acc3878766a 8220 Gang Associated Script
5e81f54164e44bd5ef8a3d97b7deb322fe88d8d7 8220 Gang Associated Script
9b3d75d00b2021e73bb9138501c3cda5eeaead03 8220 Gang Associated Script
08fab9009dcac6e5a9fa265a5f1e1c015f33f21a 8220 Gang Associated Script
3f27ec4f8d4b1df58b41c9e3be8f444596e0a921 8220 Gang Associated Script
445913e819d166ca72e7d1c7b250b398cf3c0deb 8220 Gang Associated Script
8487ecfbaa456787afbdde178b7e2e140970a38e 8220 Gang Associated Script
f5ac085147a9e4da35838ea97da7d89de51f9715 8220 Gang Associated Script
8c7c2a7f1872428b5a1e00431ba97f5f5211aab5 8220 Gang Associated Script
575f9441effcb0688d564733e4cc58743d565a6c 8220 Gang Associated Script
76ecb74747254b857b0822514e53d0b5f7a81d1c 8220 Gang Associated Script
9fba0735cf24a06142d9485d22a17b022b3ea725 8220 Gang Associated Script
ed5af8e2ab526991d583631e517cd613ebdc1b41 8220 Gang Associated Script
2ddcdddfe05bbc40477e7dfb071d8e4b3eaa0cd7 8220 Gang Associated Script
d61e00bce386a03aaa0efde9ade31e23bb2795f0 8220 Gang Associated Script
9e3194736c344b909addad65f6e69a627adba599 8220 Gang Associated Script
5dc23d673198a13e27e543927a4abd79770ccdaa 8220 Gang Associated Script
7fa2baab95c40550164e5bfd4c4057e82a4b41ce 8220 Gang Associated Script
55d640f245dcc7a43e4535f89993da272ae10479 8220 Gang Associated Script
80c35fc7eb4738878dcd2c9e8fa6e95799278dd8 8220 Gang Associated Script
e601833f18a35b2308504521532c284cf53a95da 8220 Gang Associated Script
f712066871d6bede64a95a7636795e70fb3f8ac9 8220 Gang Associated Script
e82970f8c693f636104690476f66b37c49949c18 8220 Gang Associated Script
7cdd222e2b4ec9896c53f24381efc6a02c6d1932 8220 Gang Associated Script
a0a0e2201501a20b77f5194f41b85416dd4ddcb0 8220 Gang Associated Script
ac3268c067851e7b74d9fc334d2134bfd0037a8e 8220 Gang Associated Script
5d6a8c0437bdf30079188283b0e60d063e649f27 8220 Gang Associated Script
58ff71135673fad731ae07bb510a46e7184f0b1f 8220 Gang Associated Script
ddde688f6afdff65de7019cefd7c3b08604a0bc3 8220 Gang Associated Script
800c962a8d57669cd27d68b4205a997c2d86b7c6 8220 Gang Associated Script
44eb23838bcacfcb094f6f9f1a0f8bc27e807e4f 8220 Gang Associated Script
90263a77a622a5464ff2c9470b9c40aa324e471d 8220 Gang Associated Script
ba6528c2c49337868dda95ca82f877c4e72f64ec 8220 Gang Associated Script
45b5c636223fe224d065f856fbb30596cb14b37f 8220 Gang Associated Script
78f5d9412655e94284b55292370f2387ebbf52fc 8220 Gang Associated Script
e6e29b66c3b0a1a051d001eec24f64b8fa4da184 8220 Gang Associated Script
5e2a6277c7e526734ce1cec573c829fe5c9adfd0 8220 Gang Associated Script
aafb88c74d5fce9ffc7632c00330e94d6f80b853 8220 Gang Associated Script
490e4bc10302b43aa00c510e457026e8546a91fc 8220 Gang Associated Script
87ed8ddca4a5d3f1d7267941ce1d817c0c5a7795 8220 Gang Associated Script

 
 

A Deep Dive Into the Residential Proxy Service ‘911’

The 911 service as it exists today.

For the past seven years, an online service known as 911 has sold access to hundreds of thousands of Microsoft Windows computers daily, allowing customers to route their Internet traffic through PCs in virtually any country or city around the globe — but predominantly in the United States. 911 says its network is made up entirely of users who voluntarily install its “free VPN” software. But new research shows the proxy service has a long history of purchasing installations via shady “pay-per-install” affiliate marketing schemes, some of which 911 operated on its own.

911[.]re is one of the original “residential proxy” networks, which allow someone to rent a residential IP address to use as a relay for his/her Internet communications, providing anonymity and the advantage of being perceived as a residential user surfing the web.

From a website’s perspective, the IP traffic of a residential proxy network user appears to originate from the rented residential IP address, not from the proxy service customer. These services can be used in a legitimate manner for several business purposes — such as price comparisons or sales intelligence — but they are massively abused for hiding cybercrime activity because they can make it difficult to trace malicious traffic to its original source.

Residential proxy services are often marketed to people seeking the ability to evade country-specific blocking by the major movie and media streaming providers. But some of them — like 911 — build their networks in part by offering “free VPN” or “free proxy” services that are powered by software which turns the user’s PC into a traffic relay for other users. In this scenario, users indeed get to use a free VPN service, but they are often unaware that doing so will turn their computer into a proxy that lets others use their Internet address to transact online.

The current prices for 911’s proxies.

Researchers at the University of Sherbrooke in Canada recently published an analysis of 911, and found there were roughly 120,000 PCs for rent via the service, with the largest number of them located in the United States.

“The 911[.]re network uses at least two free VPN services to lure its users to install a malware-like software that achieves persistence on the user’s computer,” the researchers wrote. “During the research we identified two free VPN services that [use] a subterfuge to lure users to install software that looks legitimate but makes them part of the network. These two software are currently unknown to most if not all antivirus companies.”

A depiction of the Proxygate service. Image: University of Sherbrooke.

The researchers concluded that 911 is supported by a “mid scale botnet-like infrastructure that operates in several networks, such as corporate, government and critical infrastructure.” The Canadian team said they found many of the 911 nodes available for rent were situated within several major US-based universities and colleges, critical infrastructures such as clean water, defense contractors, law enforcement and government networks.

Highlighting the risk that 911 nodes could pose to internal corporate networks, they observed that “the infection of a node enables the 911.re user to access shared resources on the network such as local intranet portals or other services.”

“It also enables the end user to probe the LAN network of the infected node,” the paper continues. “Using the internal router, it would be possible to poison the DNS cache of the LAN router of the infected node, enabling further attacks.”

The 911 user interface, as it existed when the service first launched in 2016.

THE INTERNET NEVER FORGETS

A review of the clues left behind by 911’s early days on the Internet paint a more complete picture of this long-running proxy network. The domain names used by 911 over the years have a few common elements in their original WHOIS registration records, including the address ustraffic@qq.com and a Yunhe Wang from Beijing.

That ustraffic email is tied to a small number of interesting domains, including browsingguard[.]com, cleantraffic[.]net, execlean[.]net, proxygate[.]net, and flashupdate[.]net.

A cached copy of flashupdate[.]net available at the Wayback Machine shows that in 2016 this domain was used for the “ExE Bucks” affiliate program, a pay-per-install business which catered to people already running large collections of hacked computers or compromised websites. Affiliates were paid a set amount for each installation of the software, with higher commissions for installs in more desirable nations, particularly Europe, Canada and the United States.

“We load only one software — it’s a Socks5 proxy program,” read the message to ExE Bucks affiliates. The website said affiliates were free to spread the proxy software by any means available (i.e. “all promotion methods allowed”). The website’s copyright suggests the ExE Bucks affiliate program dates back to 2012.

A cached copy of flashupdate[.]net circa 2016, which shows it was the home of a pay-per-install affiliate program that incentivized the silent installation of its software. “FUD” in the ad above refers to software and download links that are “Fully UnDetectable” as suspicious or malicious by all antivirus software.

Another domain tied to the ustraffic@qq.com email in 2016 was ExeClean[.]net, a service that advertised to cybercriminals seeking to obfuscate their malicious software so that it goes undetected by all or at least most of the major antivirus products on the market.

“Our technology ensures the maximum security from reverse engineering and antivirus detections,” ExEClean promised.

The Exe Clean service made malware look like goodware to antivirus products.

Yet another domain connected to the ustraffic email is p2pshare[.]net, which advertised “free unlimited internet file-sharing platform” for those who agreed to install their software.

p2pshare.net, which bundled 911 proxy with an application that promised access to free unlimited internet file-sharing.

Still more domains associated with ustraffic@qq.com suggest 911’s proxy has been disguised as security updates for video player plugins, including flashplayerupdate[.]xyz, mediaplayerupdate[.]xyz, and videoplayerupdate[.]xyz.

The earliest version of the 911 website available from the Wayback Machine is from 2016. A sister service called proxygate[.]net launched roughly a year prior to 911 as a “free” public test of the budding new residential proxy service. “Basically using clients to route for everyone,” was how Proxygate described itself in 2016.

For more than a year after its founding, the 911 website was written entirely in Simplified Chinese. The service has only ever accepted payment via virtual currencies such as Bitcoin and Monero, as well as Alipay and China UnionPay, both payment platforms based in China.

Initially, the terms and conditions of 911’s “End User License Agreement (EULA) named a company called Wugaa Enterprises LLC, which was registered in California in 2016. Records from the California Secretary of State office show that in November 2016, Wugaa Enterprises said it was in the Internet advertising business, and had named as its CEO as one Nicolae Aurelian Mazgarean of Brasov, Romania.

A search of European VAT numbers shows the same Brasov, RO address tied to an enterprise called PPC Leads SRL (in the context of affiliate-based marketing, “PPC” generally refers to the term “pay-per-click”).

911’s EULA would later change its company name and address in 2017, to International Media Ltd. in the British Virgin Islands. That is the same information currently displayed on the 911 website.

The EULA attached to 911 software downloaded from browsingguard[.]com (tied to the same ustraffic@qq email that registered 911) references a company called Gold Click Limited. According to the UK Companies House, Gold Click Limited was registered in 2016 to a 34-year-old Yunhe Wang from Beijing City. Many of the WHOIS records for the above mentioned domains also include the name Yunhe Wang, or some variation thereof.

In a response to questions from KrebsOnSecurity, 911 said the researchers were wrong, and that 911 has nothing to do with any of the other domains mentioned above.

“We have 911 SDK link and how it works described clearly in the “Terms of use” of affiliated partners products, and we have details of how the community powered network works on our webpages,” read an email response.

“Besides that, for protecting the end users, we banned many domains’ access and blocked the vulnerable ports, e.g. spamming emails, and torrent is not possible from the 911 network,” the reply continued. “Same as scanning and many others…Accessing to the Lan network and router is also blocked. We are monitoring 911 user’s account closely, once any abnormal behavior detected, we suspend the user’s account right away.”

FORUM ACTIVITY?

911 has remained one of the most popular services among denizens of the cybercrime underground for years, becoming almost shorthand for connecting to that “last mile” of cybercrime. Namely, the ability to route one’s malicious traffic through a computer that is geographically close to the consumer whose credit card they’re about to charge at some website, or whose bank account they’re about to empty.

Given the frequency with which 911 has been praised by cybercrooks on the top forums, it was odd to find the proprietors of 911 do not appear to have created any official support account for the service on any of several dozen forums reviewed by this author going back a decade. However there are two cybercriminal identities on the forums that have responded to individual 911 help requests, and who promoted the sale of 911 accounts via their handles.

Both of these identities were active on the crime forum fl.l33t[.]su between 2016 and 2019. The user “Transfer” advertised and sold access to 911 from 2016 to 2018, amid many sales threads where they advertised expensive electronics and other consumer goods that were bought online with stolen credit cards.

In a 2017 discussion on fl.l33t[.]su, the user who picked the handle “527865713” could be seen answering private messages in response to help inquiries seeking someone at 911. That identity is tied to an individual who for years advertised the ability to receive and relay large wire transfers from China.

One ad from this user in 2016 offered a “China wire service” focusing on Western Union payments, where “all transfers are accepted in China.” The service charged 20 percent of all “scam wires,” unauthorized wire transfers resulting from bank account takeovers or scams like CEO impersonation schemes.

911 TODAY

In August 2021, 911’s biggest competitor — a 15-year-old proxy network built on malware-compromised PCs called VIP72abruptly closed up shop. Almost overnight, an overwhelming number of former VIP72 customers began shifting their proxy activities to 911.

The login page for VIP72, until recently 911’s largest competitor.

That’s according to Riley Kilmer, co-founder of Spur.us — a security company that monitors anonymity services. Kilmer said 911 also gained an influx of new customers after the Jan. 2022 closure of LuxSocks, another malware-based proxy network.

“911’s user base skyrocketed after VIP72 and then LuxSocks went away,” Kilmer said. “And it’s not hard to see why. 911 and VIP72 are both Windows-based apps that operate in a similar way, where you buy private access to IPs.”

Kilmer said 911 is interesting because it appears to be based in China, while nearly all of the other major proxy networks are Russian-backed or Russian-based.

“They have two basic methods to get new IPs,” Kilmer said. “The free VPN apps, and the other is trojanized torrents. They’ll re-upload Photoshop and stuff like that so that it’s backdoored with the 911 proxy. They claim the proxy is bundled with legitimate software and that users all agree to their Terms of Service, meanwhile they can hide behind the claim that it was some affiliate who installed the software, not them.”

Kilmer said at last count, 911 had nearly 200,000 proxy nodes for sale, spanning more than 200 countries: The largest geographic concentration is the United States, where more than 42,000 proxies are currently for rent by the service.

PARTING THOUGHTS

Beware of “free” or super low-cost VPN services. Proper VPN services are not cheap to operate, so the revenue for the service has to come from somewhere. And there are countless “free” VPN services that are anything but, as we’ve seen with 911.

In general, the rule of thumb for transacting online is that if you’re not the paying customer, then you and/or your devices are probably the product that’s being sold to others. Many free VPN services will enlist users as VPN nodes for others to use, and some even offset costs by collecting and reselling data from their users.

All VPN providers claim to prioritize the privacy of their users, but many then go on to collect and store all manner of personal and financial data from those customers. Others are fairly opaque about their data collection and retention policies.

I’ve largely avoided wading into the fray about which VPN services are best, but there are so many shady and just plain bad ones out there that I’d be remiss if I didn’t mention one VPN provider whose business practices and transparency of operation consistently distinguish them from the rest. If maintaining your privacy and anonymity are primary concerns for you as a VPN user, check out Mullvad.net.

Let me make clear that KrebsOnSecurity does not have any financial or business ties to this company (for the avoidance of doubt, this post doesn’t even link to them). I mention it only because I’ve long been impressed with their candor and openness, and because Mullvad goes out of its way to discourage customers from sharing personal or financial data.

To that end, Mullvad will even accept mailed payments of cash to fund accounts, quite a rarity these days. More importantly, the service doesn’t ask users to share phone numbers, email addresses or any other personal information. Nor does it require customers to create passwords: Each subscription can be activated just by entering a Mullvad account number (woe to those who lose their account number).

I wish more companies would observe this remarkably economical security practice, which boils down to the mantra, “You don’t have to protect what you don’t collect.”

The Good, the Bad and the Ugly in Cybersecurity – Week 29

The Good

This week, an aeronautics firm with contracts with NASA, the U.S. Department of Defense, and other federal agencies agreed to pay $9 million USD in a settlement after a whistleblower alleged the firm misrepresented its cybersecurity compliance stances for key federal government contracts.

According to a statement from the U.S. Justice Department, the firm in question, Aerojet Rocketdyne Inc., was facing allegations that their misrepresentations violated the False Claims Act, which makes people and organizations that defraud government programs liable for their claims. The False Claims Act also includes whistleblower provisions that permit a private party to file a lawsuit on behalf of the U.S. and receive a portion of any recovered funds.

Source: U.S. Department of Justice

In this specific situation, Brian Markus, a former Aerojet employee brought these claims to court and reached a settlement by the trial’s second day. In the statement, the U.S. Attorney for the Eastern District of California celebrated the settlement, saying, “The qui tam action brought by Mr. Markus is an example of how whistleblowers can contribute to civil enforcement of cybersecurity requirements through the False Claims Act.”

This settlement comes as welcome news to the Justice Department’s Civil Cyber-Fraud Initiative, which was established to hold people who put U.S. systems and data at risk. It also demonstrates how both individuals and governments are taking cybersecurity compliance seriously, and taking steps to create a more secure cyber landscape.

The Bad

This week, an IT solutions provider supporting 15,000 technology partners disclosed a breach that took place over the Fourth of July holiday weekend. According to the disclosure and a timeline from security experts, cyber criminals launched a “coordinated and professional” malware attack against SHI International, an MSP based in Somerset, New Jersey.

SHI responded on July 6th with a disclosure that the “incident was swiftly identified and measures were enacted to minimize the impact on SHI’s systems and operations.” On July 8th, it was working with the FBI, CISA, and a digital forensics team to investigate the attack. However, SHI found no evidence of customer data access, or that third-party systems were breached.

However, although some services such as staff email were restored to their customers and over 5,000 employees by the 6th, it took a week for SHI to recover the remainder of their system, including SHI’s website. At the time of publication, SHI has not confirmed whether they knew who the attacker was.

This attack comes on the heels of an advisory from CISA and cybersecurity-focused law enforcement in the UK, Australia, Canada, and New Zealand warning of increasing threats against MSPs, and best practices they can deploy against cyber criminals targeting these MSPs to launch supply chain attacks against their businesses and end user systems.

The Ugly

According to disclosures this week, attackers associated with the Conti ransomware gang perpetrated one of the biggest health data breaches of 2022 back in February.

Earlier this month, Professional Finance Company, a healthcare debt collection firm colloquially known as PFC, disclosed that they had suffered a ransomware breach earlier this year. PFC is known for working with organizations to process outstanding balances and unpaid bills from customers and patients for healthcare organizations.

According to disclosures from the firm filed this week and separate filings with the U.S. Department of Health and Human Services, this attack impacted more than 650 healthcare providers and more than 1.91 million patients, stealing patient names, addresses, their outstanding balances and in the worst cases, patient PII, including Social Security numbers, health insurance information, medical treatment information, and birthdays.

To make matters worse, two of PFC’s partnered healthcare organizations have also disclosed data breaches, with one firm in Delaware reporting that 17,481 patients were affected by the PFC breach, while a Texas organization claimed 1,159 patients were breached.

Conti ransomware operators have demonstrated a capacity for sophisticated cyber attacks against healthcare frameworks, as demonstrated in their operations against Ireland’s public health service. This attack is the second largest health data breach of 2022, only rivaled by a March 2022 breach at another healthcare organization. As security professionals, we can only continue to contribute our research and remind organizations to stay vigilant against the latest threats by tightening their security posture.

Why 8kun Went Offline During the January 6 Hearings

The latest Jan. 6 committee hearing on Tuesday examined the role of conspiracy theory communities like 8kun[.]top and TheDonald[.]win in helping to organize and galvanize supporters who responded to former President Trump’s invitation to “be wild” in Washington, D.C. on that chaotic day. At the same time the committee was hearing video testimony from 8kun founder Jim Watkins, 8kun and a slew of similar websites were suddenly yanked offline. Watkins suggested the outage was somehow related to the work of the committee, but the truth is KrebsOnSecurity was responsible and the timing was pure coincidence.

In a follow-up video address to his followers, Watkins said the outage happened shortly after the Jan. 6 committee aired his brief video testimony.

“Then everything that I have anything to do with seemed to crash, so that there was no way for me to go out and talk to anybody,” Watkins said. “The whole network seemed to go offline at the same time, and that affected a lot of people.”

8kun and many other sites that continue to push the false narrative that the 2020 election was stolen from the 45th president have long been connected to the Internet via VanwaTech, a hosting firm based in Vancouver, Wash. In late October 2020, a phone call to VanwaTech’s sole provider of connectivity to the Internet resulted in a similar outage for 8kun.

Jim Waktins (top right), in a video address to his followers on Tuesday after 8kun was taken offline.

Following that 2020 outage, 8kun and a large number of QAnon conspiracy sites found refuge a Russian hosting provider. But when the anonymous “Q” leader of QAnon suddenly began posting on 8kun again earlier this month, KrebsOnSecurity received a tip that 8kun was once again connected to the larger Internet via a single upstream provider based in the United States.

On Sunday, July 10, KrebsOnSecurity contacted Psychz Networks, a hosting provider in Los Angeles, to see if they were aware that they were the sole Internet lifeline for 8kun et. al.  Psychz confirmed that in response to a report from KrebsOnSecurity, VanwaTech was removed from its network around the time of the Jan. 6 hearing on Tuesday.

8kun and its archipelago of conspiracy theory communities have once again drifted back into the arms of a Russian hosting provider (AS207651), which is connected to the larger Internet via two providers. Those include AS31500 — which appears to be owned by Russians but is making a fair pretense at being located in the Caribbean; and AS28917, in Vilnius, Lithuania.

8kun’s newfound Russian connections will likely hold, but Lithuania may be a different story. Late last month, pro-Russian hackers claimed responsibility for an extensive distributed denial-of-service (DDoS) attack against Lithuanian state and private websites, which reportedly was in response to Vilnius’s decision to cease the transit of some goods under European Union sanctions to Russia’s Kaliningrad exclave.

The Jan. 6 hearing referenced in this story is available via CSPAN.

How Attackers Exploit Security Support Provider (SSP) for Credential Dumping

Obtaining account login names and passwords in the form of hashes or clear text is a primary objective of adversaries. Credential dumping or credential exfiltration helps attackers to perform lateral movement, spreading further through an organization’s network, accessing restricted data and executing commands and programs with high privileges.

There are a number of well-known and relatively simple credential stealing attacks such as dumping the SAM database, stealing credentials with LSASS or extracting passwords from NTLMv2 that have been widely covered. However, obtaining Windows login credentials by exploiting Security Support Provider DLLs is another viable technique that security teams need to understand and defend against. In this post, we explain how attackers can exploit SSP DLLs to access encrypted and plain text passwords stored in Windows.

How Do Attackers Exploit SSP?

Windows operating systems have authentication mechanisms to automatically execute libraries or programs when the computer system boots up, or during the user account login. The organization can configure this function by placing these programs at designated locations or configuring them in a Windows Registry entry. Attackers can find a way to maintain persistence by modifying these system configurations or registering malicious Dynamic-Link Library (DLL) programs such as a Security Support Provider (SSPs) during system boot and escalate privileges.

What is a Security Support Provider (SSP)?

A Security Support Provider is a DLL that performs security-related operations such as authentication and makes one or more security packages available to applications.

The Security Support Provider Interface (SSPI) is a component of a Windows API that functions as a standard interface to several SSPs. This component enables Windows authentication methods to extend easily and add new SSPs without additional coding.

Attackers can modify registry keys to inject malicious SSPs that execute DLLs during computer system boot-up when Windows loads SSP DLLs into the Local Security Authority (LSA) process. Attackers can then extract encrypted and plaintext passwords stored in Windows, such as logged-on user’s Domain password or smart card PINs.

Using Mimikatz to Inject Windows Security Support Providers (SSPs)

The Mimikatz application supports the following two methods of implementing SSPs.

1. Registering SSP DLLs

In this manual method, Mimikatz provides a DLL file mimilib.dll that attackers copy to the same location as LSASS (C:WindowsSystem32). This DLL file is responsible for creating the kiwissp.log file, which stores credentials in plaintext.

Two Registry keys store the SSP configuration:

  • HKLMSYSTEMCurrentControlSetControlLsaSecurity Packages
  • HKLMSYSTEMCurrentControlSetControlLsaOSConfigSecurity Packages

The following PowerShell commands check the registry entries for the presence of SSP configuration entries. The figure below shows how attackers can add some standard Windows authentication SSPs (Kerberos, msv1_0, Schannel, wdigest, tspkg, and pku2u) when the query returns empty results.

Attackers can also verify the SSP entries from the registry editor by navigating through HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa.

Whenever the users reboot their computer systems, Windows creates a kiwissp.log file under C:WindowsSystem32. Attackers can access plaintext passwords stored for all domain users the system has authenticated.

2. In-memory Updating of SSPs

Mimikatz supports another method of leveraging in-memory technique that injects new SSPs into the LSASS memory using the “privilege::debug” and “misc::memssp” commands.

By running the above Mimikatz commands, attackers will create a mimilsa.log file under C:WindowsSystem32 that contains cleartext passwords of all logged-on users.

The two methods mentioned above allow attackers to inject a new SSP into a Windows system and automatically log locally authenticated credentials.

How to Detect and Mitigate Malicious SSPs

The SentinelOne Ranger AD solution continuously monitors Active Directory (AD) for exposures and misconfigurations at the domain, user, and computer levels. The solution monitors every domain controller and alerts when a new Security Package gets loaded.

Conclusion

An attacker with administrator privileges can steal credentials from the memory of compromised systems. Attackers can tamper with the registry key and add new or malicious SSPs. Organizations should deploy solutions that audit and detect unauthorized modifications on a Domain Controller to avoid attackers exploiting the Security Support Provider. For more information, please visit Singularity Ranger AD.

Singularity RANGER | AD Assessor
A cloud-delivered, continuous identity assessment solution designed to uncover vulnerabilities in Active Directory and Azure AD

Microsoft Patch Tuesday, July 2022 Edition

Microsoft today released updates to fix at least 86 security vulnerabilities in its Windows operating systems and other software, including a weakness in all supported versions of Windows that Microsoft warns is actively being exploited. The software giant also has made a controversial decision to put the brakes on a plan to block macros in Office documents downloaded from the Internet.

In February, security experts hailed Microsoft’s decision to block VBA macros in all documents downloaded from the Internet. The company said it would roll out the changes in stages between April and June 2022.

Macros have long been a trusted way for cybercrooks to trick people into running malicious code. Microsoft Office by default warns users that enabling macros in untrusted documents is a security risk, but those warnings can be easily disabled with the click of button. Under Microsoft’s plan, the new warnings provided no such way to enable the macros.

As Ars Technica veteran reporter Dan Goodin put it, “security professionals—some who have spent the past two decades watching clients and employees get infected with ransomware, wipers, and espionage with frustrating regularity—cheered the change.”

But last week, Microsoft abruptly changed course. As first reported by BleepingComputer, Redmond said it would roll back the changes based on feedback from users.

“While Microsoft has not shared the negative feedback that led to the rollback of this change, users have reported that they are unable to find the Unblock button to remove the Mark-of-the-Web from downloaded files, making it impossible to enable macros,” Bleeping’s Sergiu Gatlan wrote.

Microsoft later said the decision to roll back turning off macros by default was temporary, although it has not indicated when this important change might be made for good.

The zero-day Windows vulnerability already seeing active attacks is CVE-2022-22047, which is an elevation of privilege vulnerability in all supported versions of Windows. Trend Micro’s Zero Day Initiative notes that while this bug is listed as being under active attack, there’s no information from Microsoft on where or how widely it is being exploited.

“The vulnerability allows an attacker to execute code as SYSTEM, provided they can execute other code on the target,” ZDI’s Dustin Childs wrote. “Bugs of this type are typically paired with a code execution bug, usually a specially crafted Office or Adobe document, to take over a system. These attacks often rely on macros, which is why so many were disheartened to hear Microsoft’s delay in blocking all Office macros by default.”

Kevin Breen, director of cyber threat research at Immersive Labs, said CVE-2022-22047 is the kind of vulnerability is typically seen abused after a target has already been compromised.

“Crucially, it allows the attacker to escalate their permissions from that of a normal user to the same permissions as the SYSTEM,” he said. “With this level of access, the attackers are able to disable local services such as Endpoint Detection and Security tools. With SYSTEM access they can also deploy tools like Mimikatz which can be used to recover even more admin and domain level accounts, spreading the threat quickly.”

After a brief reprieve from patching serious security problems in the Windows Print Spooler service, we are back to business as usual. July’s patch batch contains fixes for four separate elevation of privilege vulnerabilities in Windows Print Spooler, identified as CVE-2022-22022, CVE-2022-22041, CVE-2022-30206, and CVE-2022-30226. Experts at security firm Tenable note that these four flaws provide attackers with the ability to delete files or gain SYSTEM level privileges on a vulnerable system.

Roughly a third of the patches issued today involve weaknesses in Microsoft’s Azure Site Recovery offering. Other components seeing updates this month include Microsoft Defender for Endpoint; Microsoft Edge (Chromium-based); Office; Windows BitLocker; Windows Hyper-V; Skype for Business and Microsoft Lync; and Xbox.

Four of the flaws fixed this month address vulnerabilities Microsoft rates “critical,” meaning they could be used by malware or malcontents to assume remote control over unpatched Windows systems, usually without any help from users. CVE-2022-22029 and CVE-2022-22039 affect Network File System (NFS) servers, and CVE-2022-22038 affects the Remote Procedure Call (RPC) runtime.

“Although all three of these will be relatively tricky for attackers to exploit due to the amount of sustained data that needs to be transmitted, administrators should patch sooner rather than later,” said Greg Wiseman, product manager at Rapid7. “CVE-2022-30221 supposedly affects the Windows Graphics Component, though Microsoft’s FAQ indicates that exploitation requires users to access a malicious RDP server.”

Separately, Adobe today issued patches to address at least 27 vulnerabilities across multiple products, including Acrobat and Reader, Photoshop, RoboHelp, and Adobe Character Animator.

For a closer look at the patches released by Microsoft today and indexed by severity and other metrics, check out the always-useful Patch Tuesday roundup from the SANS Internet Storm Center. And it’s not a bad idea to hold off updating for a few days until Microsoft works out any kinks in the updates: AskWoody.com usually has the lowdown on any patches that may be causing problems for Windows users.

As always, please consider backing up your system or at least your important documents and data before applying system updates. And if you run into any problems with these updates, please drop a note about it here in the comments.

Introducing the New Singularity XDR Process Graph

Data is at the heart of XDR. The ability to ingest petabytes of data real-time from any technology product or platform allows organizations to see and find security issues in a way never previously possible. However, to fully realize that potential, security analysts need tools that present that data in ways that make it easier to identify trends, patterns, and outliers within large data sets. Powered by Storyline and the same technology that underlies DataSet, the new Singularity XDR Process Graph empowers analysts by delivering context and insight through the power of visualization.

From the initial execution of a process to its classification by the SentinelOne agent and its correlation to the MITRE ATT&CK™ knowledge base, the new Process Graph exposes hidden connections, suspicious events, and a timeline of valuable Indicators of Attack (IOAs).

How the Process Graph Empowers Security Analysts

The new Singularity Process Graph offers security analysts multiple benefits.

Faster Triage

With Process Graph, analysts can reduce triage time by easily expanding and moving between processes and their graphs with one click. New graphs are opened without overriding the current view, maintaining context and allowing a side-by side graph investigation for faster triage.

Moreover, every process on the graph can be clicked to see additional information – from basic data such as its image path, signature and hashes to counters of behaviors performed by that process.

The graph timeline is now enriched with more data than ever before with related events, indicators of attack, cross-process activity and threat intelligence indications. Analysts can see aggregated information, drill down to a specific point in time to conduct further analysis, and click on any event or process to get more information.

Better Discovery

Process Graph uncovers hidden connections identified by the SentinelOne Storyline. While most products only present the chain of execution as seen by the OS, with Process Graph, analysts can choose either OS view or a more comprehensive view identified by the SentinelOne Storyline, with multiple correlated alerts appearing in one contextual story.

In addition, the analyst can choose to view cross processes just by clicking a checkbox. Cross-process connections are triggered when a process modifies another running process—injecting code, duplicating handles, or reading/writing memory in that process. The representation of cross-process activity provides more context by tracing threat execution from the original source to actions undertaken under the auspices of other supposedly legitimate processes.

Visibility Into the Cyber Kill Chain®

The new graph allows analysts to highlight processes identified with behaviors like evasion, exploitation, persistence, privilege escalation and more, immediately within the graph.

Highlighting processes based on the Cyber Kill Chain® framework enhances visibility into an attack and enriches the analyst’s understanding of an adversary’s tactics, techniques, and procedures.

Enhanced Correlation of TTPs with MITRE ATT&CK®

Adding to SentinelOne’s existing close integration with the MITRE ATT&CK® framework, the new graph allows analysts to view indicators at the process level, enriching the information available and leading to better understanding of further risk factors.

Behavioral indicators are now assigned to every individual process. With the graph, you can see which indicators are associated with each process and why, offering security teams a further way to understand the nature of a detection, even if it was prevented and did not cause any harm.

Instant Insights into Process Behaviors

The new graph utilizes PowerQuery to provide aggregations and statistics per process automatically, within milliseconds, allowing the analyst to quickly identify suspicious and malicious behaviors with no manual stitching needed.

The events table now displays up to 20,000 related events for the process node: its file, network, cross process, registry activity and more, as well as the indicators triggered on that process activity identified by the SentinelOne agent. Each individual value (or a mix of values) in the events table can be used to initiate a new investigation with a single click.

Process Graph Use Case | WastedLocker Ransomware

WastedLocker is a ransomware family that has been targeting high-value enterprises across industries since 2020, including US-based Fortune 500 companies.

WastedLocker is fully prevented and detected by the SentinelOne Singularity platform, but it provides a good case study to show how Process Graph can help analysts conduct root cause analysis.

A process graph derived from operating system events alone would look as follows:

When in Storyline view, the graph reveals critical information like the deletion of Shadow Copies, a common technique used in ransomware activity.

wasted locker ransomware detection

Conclusion

Whether for threat analysis or threat hunting, SentinelOne’s new Singularity XDR Process Graph takes extended detection and response to the next level with consolidated telemetry that transforms disjointed data into insights and valuble visual indicators.

With SentinelOne Singularity and deep analytics applied across billions of disjointed and siloed data elements, Process Graph empowers threat analysts to understand and triage malicious and suspicious activity faster than ever before.

To learn more about how SentinelOne Singularity and the new Process Graph can empower your security operations, contact us or request a free demo.

Experian, You Have Some Explaining to Do

Twice in the past month KrebsOnSecurity has heard from readers who’ve had their accounts at big-three credit bureau Experian hacked and updated with a new email address that wasn’t theirs. In both cases the readers used password managers to select strong, unique passwords for their Experian accounts. Research suggests identity thieves were able to hijack the accounts simply by signing up for new accounts at Experian using the victim’s personal information and a different email address.

John Turner is a software engineer based in Salt Lake City. Turner said he created the account at Experian in 2020 to place a security freeze on his credit file, and that he used a password manager to select and store a strong, unique password for his Experian account.

Turner said that in early June 2022 he received an email from Experian saying the email address on his account had been changed. Experian’s password reset process was useless at that point because any password reset links would be sent to the new (impostor’s) email address.

An Experian support person Turner reached via phone after a lengthy hold time asked for his Social Security Number (SSN) and date of birth, as well as his account PIN and answers to his secret questions. But the PIN and secret questions had already been changed by whoever re-signed up as him at Experian.

“I was able to answer the credit report questions successfully, which authenticated me to their system,” Turner said. “At that point, the representative read me the current stored security questions and PIN, and they were definitely not things I would have used.”

Turner said he was able to regain control over his Experian account by creating a new account. But now he’s wondering what else he could do to prevent another account compromise. That’s because Experian does not offer any type of multi-factor authentication options on consumer accounts.

“The most frustrating part of this whole thing is that I received multiple ‘here’s your login information’ emails later that I attributed to the original attackers coming back and attempting to use the ‘forgot email/username’ flow, likely using my SSN and DOB, but it didn’t go to their email that they were expecting,” Turner said. “Given that Experian doesn’t support two-factor authentication of any kind — and that I don’t know how they were able to get access to my account in the first place — I’ve felt very helpless ever since.”

To be clear, Experian does have a business unit that sells one-time password services to businesses. But it does not offer this directly to consumers who sign up to manage their credit file at Experian’s website.

Arthur Rishi is a musician and co-executive director of the Boston Landmarks Orchestra. Rishi said he recently discovered his Experian account had been hijacked after receiving an alert from his credit monitoring service (not Experian’s) that someone had tried to open an account in his name at JPMorgan Chase.

Rishi said the alert surprised him because his credit file at Experian was frozen at the time, and Experian did not notify him about any activity on his account. Rishi said Chase agreed to cancel the unauthorized account application, and even rescinded its credit inquiry (each credit pull can ding your credit score slightly).

But he never could get anyone from Experian’s support to answer the phone, despite spending what seemed like eternity trying to progress through the company’s phone-based system. That’s when Rishi decided to see if he could create a new account for himself at Experian.

“I was able to open a new account at Experian starting from scratch, using my SSN, date of birth and answering some really basic questions, like what kind of car did you take out a loan for, or what city did you used to live in,’ Rishi said.

Upon completing the sign-up, Rishi noticed that his credit was unfrozen.

Like Turner, Rishi is now worried that identity thieves will just hijack his Experian account once more, and that there is nothing he can do to prevent such a scenario. For now, Rishi has decided to pay Experian $25.99 a month to more closely monitor his account for suspicious activity. Even using the paid Experian service, there were no additional multi-factor authentication options available, although he said Experian did send a one-time code to his phone via SMS recently when he logged on.

“Experian now sometimes does require MFA for me now if I use a new browser or have my VPN on,” Rishi said, but he’s not sure if Experian’s free service would have operated differently.

“I get so angry when I think about all this,” he said. “I have no confidence this won’t happen again.”

In a written statement, Experian suggested that what happened to Rishi and Turner was not a normal occurrence, and that its security and identity verification practices extend beyond what is visible to the user.

“We believe these are isolated incidents of fraud using stolen consumer information,” Experian’s statement reads. “Specific to your question, once an Experian account is created, if someone attempts to create a second Experian account, our systems will notify the original email on file.”

“We go beyond reliance on personally identifiable information (PII) or a consumer’s ability to answer knowledge-based authentication questions to access our systems,” the statement continues. “We do not disclose additional processes for obvious security reasons; however, our data and analytical capabilities verify identity elements across multiple data sources and are not visible to the consumer. This is designed to create a more positive experience for our consumers and to provide additional layers of protection. We take consumer privacy and security seriously, and we continually review our security processes to guard against constant and evolving threats posed by fraudsters.”

ANALYSIS

KrebsOnSecurity sought to replicate Turner and Rishi’s experience — to see if Experian would allow me to re-create my account using my personal information but a different email address. The experiment was done from a different computer and Internet address than the one that created the original account years ago.

After providing my Social Security Number (SSN), date of birth, and answering several multiple choice questions whose answers are derived almost entirely from public records, Experian promptly changed the email address associated with my credit file. It did so without first confirming that new email address could respond to messages, or that the previous email address approved the change.

Experian’s system then sent an automated message to the original email address on file, saying the account’s email address had been changed. The only recourse Experian offered in the alert was to sign in, or send an email to an Experian inbox that replies with the message, “this email address is no longer monitored.”

After that, Experian prompted me to select new secret questions and answers, as well as a new account PIN — effectively erasing the account’s previously chosen PIN and recovery questions. Once I’d changed the PIN and security questions, Experian’s site helpfully reminded me that I have a security freeze on file, and would I like to remove or temporarily lift the security freeze?

How does Experian differ from the practices of Equifax and TransUnion, the other two big consumer credit reporting bureaus? When KrebsOnSecurity tried to re-create an existing account at TransUnion using my Social Security number, TransUnion rejected the application, noting that I already had an account and prompting me to proceed through its lost password flow. The company also appears to send an email to the address on file asking to validate account changes.

Likewise, trying to recreate an existing account at Equifax using personal information tied to my existing account prompts Equifax’s systems to report that I already have an account, and to use their password reset process (which involves sending a verification email to the address on file).

KrebsOnSecurity has long urged readers in the United States to place a security freeze on their files with the three major credit bureaus. With a freeze in place, potential creditors can’t pull your credit file, which makes it very unlikely anyone will be granted new lines of credit in your name. I’ve also advised readers to plant their flag at the three major bureaus, to prevent identity thieves from creating an account for you and assuming control over your identity.

The experiences of Rishi, Turner and this author suggest Experian’s practices currently undermine both of those proactive security measures. Even so, having an active account at Experian may be the only way you find out when crooks have assumed your identity. Because at least then you should receive an email from Experian saying they gave your identity to someone else.

In April 2021, KrebsOnSecurity revealed how identity thieves were exploiting lax authentication on Experian’s PIN retrieval page to unfreeze consumer credit files. In those cases, Experian failed to send any notice via email when a freeze PIN was retrieved, nor did it require the PIN to be sent to an email address already associated with the consumer’s account.

A few days after that April 2021 story, KrebsOnSecurity broke the news that an Experian API was exposing the credit scores of most Americans.

Emory Roan, policy counsel for the Privacy Rights Clearinghouse, said Experian not offering multi-factor authentication for consumer accounts is inexcusable in 2022.

“They compound the problem by gating the recovery process with information that’s likely available or inferable from third party data brokers, or that could have been exposed in previous data breaches,” Roan said. “Experian is one of the largest Consumer Reporting Agencies in the country, trusted as one of the few essential players in a credit system Americans are forced to be part of. For them to not offer consumers some form of (free) MFA is baffling and reflects extremely poorly on Experian.”

Nicholas Weaver, a researcher for the International Computer Science Institute at University of California, Berkeley, said Experian has no real incentive to do things right on the consumer side of its business. That is, he said, unless Experian’s customers — banks and other lenders — choose to vote with their feet because too many people with frozen credit files are having to deal with unauthorized applications for new credit.

“The actual customers of the credit service don’t realize how much worse Experian is, and this isn’t the first time Experian has screwed up horribly,” Weaver said. “Experian is part of a triopoly, and I’m sure this is costing their actual customers money, because if you have a credit freeze that gets lifted and somebody loans against it, it’s the lender who eats that fraud cost.”

And unlike consumers, he said, lenders do have a choice in which of the triopoly handles their credit checks.

“I do think it’s important to point out that their real customers do have a choice, and they should switch to TransUnion and Equifax,” he added.

More greatest hits from Experian:

2017: Experian Site Can Give Anyone Your Credit Freeze PIN
2015: Experian Breach Affects 15 Million Customers
2015: Experian Breach Tied to NY-NJ ID Theft Ring
2015: At Experian, Security Attrition Amid Acquisitions
2015: Experian Hit With Class Action Over ID Theft Service
2014: Experian Lapse Allowed ID Theft Service Access to 200 Million Consumer Records
2013: Experian Sold Consumer Data to ID Theft Service

The Good, the Bad and the Ugly in Cybersecurity – Week 28

The Good

According to a recent announcement, AstraLocker ransomware is ceasing development and shutting down its operations. As part of the shutdown, the ransomware’s developer has released its decryption keys to VirusTotal (via an uploaded ZIP archive). After testing a key against a recently encrypted file, researchers believe the keys are legitimate, and security experts are working on a universal decrypter for AstraLocker victims.

While it was based on leaked Babuk ransomware code, AstraLocker did not initially compromise the device by leveraging other malware or vulnerabilities to gain a foothold into a targeted device like other notable ransomware. Instead, the threat actor behind AstraLocker directly deployed malicious payloads through phishing emails. The malicious Microsoft Word documents attached to the phishing emails would conceal the payload within an OLE object. When opening the attachment, a target only has to click “Run” in the warning notification to deploy the payload.

MalwareBazaar
Source: MalwareBazaar

Recent attacks following the release of AstraLocker 2.0 had brought the lesser-known ransomware into the spotlight, and experts speculate that the actors behind the ransomware decided to shut down operations to avoid being arrested by law enforcement.

Although those behind the distribution of AstraLocker have yet to be caught or identified, law enforcement continue to pursue cyber criminals. We hope that the fear of arrest will deter more threat actors, and that this shutdown will provide some degree of closure to AstraLocker victims.

The Bad

In a startling turn of events, a former cybersecurity employee was caught using security reports and company property for personal gain. In an incident report addressed to its customers, the vulnerability management and bug bounty firm HackerOne disclosed that an employee had anonymously disclosed vulnerability-related information outside of the HackerOne platform to claim additional bug bounties.

Source: HackerOne via Twitter

According to HackerOne’s timeline, one of their customers requested an investigation based on an off-platform communication with someone with the username “rzlr” disclosing a vulnerability. Due to the “intimidating language” in the disclosure, and the fact that it contained several similarities to an existing HackerOne disclosure, the security team quickly launched an incident investigation.

Upon expanding the scope of the investigation to look into other off-platform disclosures to HackerOne customers from “rzlr”, the firm’s security team first investigated the prospect of a group of insiders being responsible before focusing on a HackerOne employee account as a potential point of entry for a threat actor. The investigation found that the threat actor had leveraged a HackerOne sockpuppet account to collect bounties for a “handful of disclosures”. Information from payment providers confirmed that an employee with access to HackerOne systems between April 4th and June 23rd, 2022 was the threat actor in question. The employee identified was promptly dismissed.

It’s incredibly disheartening to see a cybersecurity employee break the trust of their coworkers and the customers that put their trust in them. Moreover, it acts as a stark reminder that organizations need to take insider threats seriously and ensure they have measures in place to protect themselves and their clients.

The Ugly

After announcing it would block VBA macros on downloaded documents by default in February, Microsoft has suddenly changed course without explanation or warning.

Source: Microsoft

Microsoft customers initially noticed that Office was no longer blocking VBA macros this Wednesday, and began asking the company for clarification. Eventually, a Microsoft manager confirmed the unannounced rollback had taken place.

Customers and security professionals had been highly anticipating the change because VBA macros are a widely abused means of pushing ransomware like AstraLocker (see above), committing fraud through business email compromise and delivering various forms of malware, including Emotet, TrickBot, Qbot, and Dridex via phishing attacks with malicious Office document attachments.

In a notification on the Microsoft 365 message center on Thursday, Microsoft said it was rolling back the feature “based on feedback”, and that it was “working to make improvements in this experience”.

In response, customers accused Microsoft of sacrificing the safety of individual customers and smaller businesses and criticized the company for rolling back the blocking of macros without first notifying them.

Microsoft’s reversal is a major loss for security-conscious Windows users, and it is unfortunate that customers were not told about the decision ahead of time. We can only hope that Microsoft takes feedback from across its customer base onboard to produce a better, more secure experience for everyone.

From the Front Lines | New macOS ‘covid’ Malware Masquerades as Apple, Wears Face of APT

  1. Earlier this year, we reported on ESET’s discovery of OSX.DazzleSpy, an information stealer and backdoor likely targeted at Hong Kong’s pro-democracy activists. As part of our own threat hunting activities into DazzleSpy and related malware campaigns such as Zuru, Macma, Gimmick and pymafka, we recently came across a new malware sample that at first sight appeared to be a DazzleSpy variant. Further analysis, however, made that attribution tough to call, but the sample’s novel characteristics and use of multiple open-source projects should make it of interest to threat hunting and detection teams.

Dropper and Persistence

On 20th April, 2022, a DMG named ‘vpn’ was uploaded to VirusTotal.

malicious disk image on VirusTotal

Apparently unremarkable, further analysis showed that the disk image contained an application bundle called ‘vpn.app’, an application built with Platypus, an open-source toolkit that allows developers to turn scripts into Mac applications.

Platypus Mac Application

Platypus applications use a launcher executable in the app bundle to run the script in the bundle’s Resources folder. Since the script is simply a plain text file, it’s easy enough to examine to see what the “application” is really intended to do.

In this case, the script file (shown below) revealed that the supposed ‘vpn.app’ was really something quite different.

vpn malware script

The script begins by creating a hidden folder, ~/.androids, in the User’s home directory. It then checks to see if the host architecture is x86_64 or not via the uname utility.

Depending on the architecture, the script downloads one of two possible second stage Mach-Os from IP http[:]//46[.]137.201.254. Although we were only able to retrieve the x86_64 payload, we can assume that since the Platypus-built application only runs on macOS that the alternative payload would be an arm64 executable built for Apple’s M1 architecture.

The payload is installed in the invisible directory as ~/.androids/softwareupdated. This executable is the target for the persistence LaunchAgent that the script writes to ~/Library/LaunchAgents/com.apple.softwareupdate.plist.

After installing the persistence agent, the script downloads and executes a further payload, dropped with the name covid. This is written to the user’s home directory and neither attempts stealth nor persistence.

Softwareupdated

The choice of the name ‘softwareupdated’ is a masquerade of an Apple system binary of the same name that lives at /System/Library/CoreServices/Software Update.app/Contents/Resources/softwareupdated.

Our initial assumption that this may have been a DazzleSpy variant stemmed from the fact that the persistence agent uses the same filename as DazzleSpy, i.e.,  ~/Library/LaunchAgents/com.apple.softwareupdate.plist, and an almost identical target executable name (DazzleSpy uses ‘softwareupdate’, rather than ‘softwareupdated’.). On top of that, both use a hidden folder in the user’s home directory to house the target executable (.local in the case of DazzleSpy, .androids here). However, those indicators might easily have been chosen to deliberately confuse attribution, and it is not beyond the realms of possibility that the indicators are merely coincidental.

Things become more interesting when we look at the payload. Static analysis of the malicious softwareupdated shows it to be a Sliver implant.

Sliver

Sliver is an open source red team framework written in Go that supports C2 communications over a variety of protocols, including TLS, HTTP, and DNS.

Sliver on github

While DazzleSpy used a mixture of open-source repos for various tasks, including  the tonymillion Reachability framework, YYModel, and GCDAsyncSocket, this is the first time we’ve seen Sliver used in malware masquerading as Apple binaries and using com.apple labels for persistence.

Sliver implants offer the operator multiple functions useful to adversaries, including opening a shell on the target machine. The softwareupdated binary periodically checks in with the C2 to retrieve scheduled tasks, execute them, and return the results. Sliver implants also have the ability to allow the operator to open an interactive real time session for direct tasking and exploitation.

Covid Binary

The covid binary is also a Go executable, this time packed with UPX. After unpacking, the binary turns out to be an NSApplication built using MacDriver, another open-source project available on Github that provides a toolkit for working with Apple frameworks and APIs in Go.

MacDriver

As with the Sliver implant, the covid executable reaches out to http[:]//46[.]137.201.254,  this time on port 8001, and checks for the number of logical cores via sysctl as a means to detect whether it is running in a virtual machine. Executing the covid binary pops a WebKit view in a standard macOS application window.

webkit in disassembly

More importantly, however, the covid binary uses a “fileless” technique to execute a further payload in-memory, evidenced by the tell-tale signs of NSCreateObjectFileImageFromMemory and NSLinkModule. This technique has been seen in a few campaigns in recent years, including by North Korean-linked APT Lazarus.

NSCreateObjectFileImageFromMemory

While presenting a distracting interface to the user, perhaps around the supposed ‘vpn’ capabilities, the covid binary retrieves and executes a third stage payload.

NSLinkModule

As the final payload was not available to us at the time of the analysis due to the C2 being offline, we are unable to say what the ultimate purpose of the covid binary was intended to be.

Conclusion

The indicators around this particular malware align neatly with what we might expect to see in a red team exercise – a red-teaming framework, singular (now offline) C2 hosted on Amazon, and the use of free and readily available open source tools like UPX, Sliver, MacDriver and Platypus, and, of course, binaries built from Go source code (an increasingly popular choice for malware authors of all stripes). We also note the lack of coherence and stealth used by the actors: an unsigned ‘vpn app’ dropping a payload called ‘covid’ in the User’s home directory doesn’t, at least without more context, make much sense of itself.

However, threat actors of all kinds can now easily imitate one another, and the use of indicators recently associated directly with the DazzleSpy campaign appears to be one of an unhappy accident, deliberate misdirection, or a genuine variant in a known campaign.

We also note that thanks to the use of free, publicly available software, this entire campaign targeting macOS devices was built without using any proprietary Apple tools or software, such as the Xcode IDE. For threat hunters and detection teams, we hope that awareness of the kind of TTPs reported here will aid detection of similar infection attempts, regardless of the nature of the threat actor.

Indicators of Compromise

Name SHA1
vpn.dmg 563d75660e839565e4bb1d91bc1236f5ec3c3da7
script fa2556765290b0a91df3b34e3b09b31670762628
softwareupdated 0cfde0edb076154162e2b21e4ab4deb279aa9c7b
covid (packed) d0eb9c2c90b6f402c20c92e2f6db0900f9fff4f7
covid (unpacked) b4ab73b52a42f995fbabacb94a71f963fc4cda01

File paths
~/covid
~/.androids/softwareupdated
~/Library/LaunchAgents/com.apple.softwareupdate.plist

Network
46[.]137.201.254

Open-Source or Publicly-available Software Used
Go
MacDriver
Platypus
Sliver
UPX