Thursday, January 30, 2025
HomeBotnetAPT33 Hackers Launching Malware via Obfuscated C2 Server to Hack Organizations in...

APT33 Hackers Launching Malware via Obfuscated C2 Server to Hack Organizations in the Middle East, the U.S., and Asia

Published on

SIEM as a Service

Follow Us on Google News

Researchers uncovered a new wave of a targeted cyberattack against the organizations in the Middle East, the U.S., and Asia using an obfuscated Malware with dozen live Command and Control (C&C) botnet servers.

A Well-known threat group is known as APT33 behind the attack, and the group has a record of aggressively attack the oil aviation, governments, engineering, manufacturing, consulting, finance, telecoms, and several other sectors.

A dozen Obfuscated APT33 Botnet C&C servers are using for this malware campaign, and these botnets believed to be comprising a small group up to a dozen infected computers.

Malware that is delivered in this campaign has limited capabilities include downloading additional malware to process further infection.

Compared to other APT groups, APT33 has very aggressive attack records in the past 2 years and they are mostly using spear phishing emails to initiate the attack against the targeted companies.

APT33 Infection Chain with VPN Services

Several Command and control domains are being used for the small botnet that comprised of dozens of bots, and the C2 domains behind this campaign are hosting in the cloud-hosted proxies.

“These proxies relay URL requests from the infected bots to backends at shared webservers that may host thousands of legitimate domains. The backends report bot data back to a data aggregator and bot control server that is on a dedicated IP address. “

Attackers using a private VPN network to connect the aggregator and issue a command to the bots via a VPN connection.

Using private VPN networks for infecting the target is very common nowadays. To hide their whereabouts activities, APT33 actors often using commercial VPN services during the maintenance of C&C Botnet servers and reconnaissance activities.

According to Trend Micro research, Though the connections from private VPN networks usch as OpenVPN still come from seemingly unrelated IP addresses around the world, this kind of traffic is actually easier to track. Once we know that an exit node is mainly being used by a particular actor, we can have a high degree of confidence about the attribution of the connections that are made from the IP addresses of the exit node.

In this current attack, APT33 using exclusive exit nodes and the researchers tracked down the several exit nodes that used by APT 33 includes few private VPN exit nodes.

These private VPN exit nodes are also used for reconnaissance of networks that are relevant to the supply chain of the oil industry.

With the help of a Private VPN network, APT33  access websites of penetration testing companies, webmail, websites on vulnerabilities, I also used to read hacker blogs and forums.

It’s highly recommended to check the existence of following IP addresses in the oil and gas industry computer networks.

5.135.120.57
5.135.199.25
31.7.62.48
51.77.11.46
54.36.73.108
54.37.48.172
54.38.124.150
88.150.221.107
91.134.203.59
109.169.89.103
109.200.24.114
137.74.80.220
137.74.157.84
185.122.56.232
185.125.204.57
185.175.138.173
188.165.119.138
193.70.71.112
195.154.41.72
213.32.113.159
216.244.93.137

Trend Micro researchers witnessed some of the above listed IP addresses doing reconnaissance on the network of an oil exploration company and military hospitals in the Middle East, as well as an oil company in the U.S.

Indicator of Compromise

File nameSHA256
MsdUpdate.exee954ff741baebb173ba45fbcfdea7499d00d8cfa2933b69f6cc0970b294f9ffd
MsdUpdate.exeb58a2ef01af65d32ca4ba555bd72931dc68728e6d96d8808afca029b4c75d31e
MsdUpdate.exea67461a0c14fc1528ad83b9bd874f53b7616cfed99656442fb4d9cdd7d09e449
MsdUpdate.exec303454efb21c0bf0df6fb6c2a14e401efeb57c1c574f63cdae74ef74a3b01f2
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations...