Thursday, March 28, 2024

APT Groups Register Domain Used for C&C Long Before The Attack To Prevent Detection

The APT groups are massively exploiting the long before registered domains for C&C to prevent detection. Exceedingly the higher numbers of malicious, dormant domains pose a serious risk to all internet users. 

As security researchers from Unit 42 Palo Alto have warned recently that some 22.3% of strategically aged domain owners can still cause something dangerous.

This recent revelation has stunned the security experts since the threat actors behind SolarWinds have exploited the aged domains for all their malicious activities. 

It implies that they don’t use any newly-registered domains for their malicious activities, instead, they use the domains that they have registered years before.

In SolarWinds supply chain attack, the threat actors have used SUNBURST trojan, and since the discovery of the SolarWinds supply chain attack, in October 2020, to uncover the other characteristics and detect generic APTs the Palo Alto Networks has constantly analyzed the campaign.

Moreover, the efforts to find old domains and systems before they get a chance to launch attacks and support malicious activities have increased.

Analysis

In the month of September 2021, the security analysts at Palo Alto Networks has analyzed tens of thousands of domains each day to conduct their analysis and findings.

After investigating they concluded the output of their finding for domains in percentage:-

  • Approximately 3.8% are straight-out malicious.
  • Approximately 19% are suspicious.
  • 2% are unsafe for work environments.

Why aged domains?

The threat actors registered domains years before exploiting them, due to the creation of a clean record. Doing so will allow them to evade security detection systems and successfully execute their malicious campaigns.

Since the security solutions are efficient in detecting the suspicious newly registered domains (NRDs), in short, the NRDs are more prone to be vulnerable. That’s why they always prefer to use aged domains, as they are three times more malicious than NRDs.

Tools and TTPs used

The tools and the TTPs used by the threat actors are:-

  • APT Spyware
  • Phishing
  • Wildcard DNS Abuse

It’s concluded that for a long period of time or for years the malware can remain dormant, and then through their C2 domains, it can produce a massive amount of malicious traffic.

Ahead of the attacking services and then creating levelsquatting hostnames all these suspicious domains can abuse the DGA (Domain Generation Algorithm) to do the following things:-

  • Exfiltrate data through DNS traffic
  • Provide proxy layers

Apart from this, by monitoring the following DNS data the defenders can defend themself:-

  • Queries
  • Responses
  • IP addresses
  • Focusing on identifying patterns

All these are possible due to the complexity of DGA, as detecting DGA activity is still very challenging.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles