RedEyes Hacking Group Uses Steganography Technique to Deploy Malware on PC & Mobile Phones

by Esmeralda McKenzie
RedEyes Hacking Group Uses Steganography Technique to Deploy Malware on PC & Mobile Phones

RedEyes Hacking Group Uses Steganography Technique to Deploy Malware on PC & Mobile Phones

RedEyes Hacking Neighborhood

RedEyes Hacking Neighborhood (aka APT37), a risk community identified for its cyber espionage activities, has currently adopted a contemporary tactic in its efforts to procure intelligence from targeted americans.

This community is now the usage of a posh malware referred to as “M2RAT,” which is particularly designed to evade detection by safety utility.

As well to to the usage of M2RAT, APT37 is additionally the usage of steganography, a technique that hides knowledge interior seemingly innocuous recordsdata or photos, to extra veil their activities.

The APT37 hacking community is judicious supported by North Korea, and it operates in cyberespionage. While APT37 is additionally identified by other names admire:-

  • RedEyes
  • ScarCruft

Initiates with Phishing

Right by means of the year 2022, this infamous hacking community was as soon as noticed making essentially the most of zero-day vulnerabilities within the current net browser, Net Explorer.

This community utilized these exploits as fragment of their efforts to distribute varied forms of malware to their targeted entities and americans.

A smartly-liked collection of cyber assaults was as soon as noticed by the AhnLab Safety Emergency Response Center (ASEC). These assaults began in January 2023 and alive to the targeted distribution of phishing emails containing malicious attachments to selected victims.

The attackers utilized social engineering tactics to entice their targets into opening the email and downloading the attachment.

When a consumer opens the malicious attachment that was as soon as disbursed within the most contemporary collection of cyber-assaults, it triggers the exploitation of an outmoded EPS vulnerability, which is identified as CVE-2017-8291.

This vulnerability is uncover within the Hangul be conscious processor, which is continuously extinct in South Korea.

A specific exploit has been identified that can perchance allow an attacker to stride a shellcode on a victim’s computer. This exploit is designed to be triggered when a consumer opens a JPEG image that has been tampered with by the attacker.

QYSvTnTTyHZdAGhxZg7W7n6WzfwHDspMZ4VfXmoCECvnp6Zadvs8 er SbPZ3hWQ0qk qNLbtW70l

Once the exploit is triggered, it causes the victim’s computer to procure and attain a malicious payload that is kept interior the JPEG image.

The community of risk actors directed their attention in direction of varied organizations primarily based fully within the European Union, deploying a contemporary variant of their mobile backdoor identified as “Dolphin.”

As well to to this, the community additionally utilized a customised some distance flung salvage admission to trojan (RAT) referred to as “Konni” of their assaults.

The attackers additionally targeted journalists positioned within the United States with a extremely-versatile kind of malware often referred to as “Goldbackdoor,” which permits for a unfold of customization alternate choices reckoning on the attackers’ targets.

WgyRvbld3tlaR6hCBZisin HLQqpBdr3Ipv7RELLHTOAaaNq7PKtHZNSgd13lN0Cb7JYBZkaW wtcL1HvcaQshlHcIDF7K4C5NNzR8OIeCeZHqYAWQRzh

The M2RAT malware employs a shared memory portion to keep up a correspondence and switch recordsdata, as smartly as to veil its activities, leaving minimal traces on the contaminated utility.

C&C of M2RAT and Commands

The M2RAT malware, which is utilized by the APT37 risk community, employs a particular diagram for talking with the attacker’s C&C server. Specifically, M2RAT receives commands from the server by embedding them interior the physique of the POST diagram.

This allows the attacker to ship directions to the malware in a diagram that is extra advanced for safety utility to detect.

4zLXTY517nb014j9flVqgE86LG3xpgGV7fji38IOX

Right here underneath we absorb mentioned the total commands extinct:-

  • OKR: Commands got on the time of initial C&C communication connection
  • URL: Registry key price modification for C&C update
  • UPD: Change the C&C it’s probably you’ll perchance even be currently connected to
  • RES: C&C connection termination (M2RAT termination)
  • UNI: C&C connection termination (M2RAT termination)
  • CMD: Build some distance flung control commands (keylogging, assignment introduction/execution, and so forth.)

In remark to name the victim machine, the attacker server of M2RAT makes exercise of the host’s MAC take care of as an identifier. In this case, the attacker’s server makes exercise of the encoded price of the MAC take care of to name the victim’s computer.

Home windows and Cell Devices are Targeted by M2RAT

M2RAT permits the attackers to execute some distance flung salvage admission to to an contaminated machine and develop a unfold of malicious activities, and these consist of:-

  • Keylogging
  • Info theft
  • Screech execution
  • Taking of screenshots from the desktop

Screenshots are taken periodically and the feature is operated without the need for an operator to present a particular expose for it to be activated.

In assert, it’s attention-grabbing to show mask that the malware is in a field to scan the Home windows computer for any transportable devices connected to it.

Upon detection of a transportable utility, a scan shall be performed to name any paperwork and relate recordings contained on the utility. If it detects any file, it copies the detected recordsdata and later exfiltrates them to a server controlled by the attacker.

There has been a current upward push in APT37’s exercise of evasive malware that is advanced to detect and analyze as fragment of its custom toolkit.

Source credit : cybersecuritynews.com

Related Posts