Friday, January 17, 2025
HomeCyber Security NewsCareto - A legendary Threat Group Targets Windows By Deploy Microphone Recorder...

Careto – A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files

Published on

SIEM as a Service

Follow Us on Google News

Recent research has linked a series of cyberattacks to The Mask group, as one notable attack targeted a Latin American organization in 2022, where attackers compromised the organization’s MDaemon email server and exploited the WorldClient webmail component to maintain persistent access. 

While the initial compromise vector remains unknown, the successful exploitation of the MDaemon server highlights the potential risks associated with outdated or misconfigured email systems.

The threat actor exploited a vulnerability in MDaemon WorldClient’s extension loading mechanism. By leveraging the WorldClient.ini configuration file, they were able to introduce malicious extensions. 

Sample of the WorldClient.ini file containing plugin entries
Sample of the WorldClient.ini file containing plugin entries

These extensions, designed to intercept and manipulate HTTP requests, provided a persistent backdoor into the email server, which allowed the attacker to maintain unauthorized access and potentially execute further malicious activities. 

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

The threat actor exploited WorldClient’s extension feature by crafting a malicious extension DLL and configuring it with malicious URLs in the CgiBase6 and CgiFile6 parameters. 

It allowed the actor to remotely interact with the malicious extension via HTTP requests to the specified URL on the webmail server, bypassing security measures and potentially gaining unauthorized access to sensitive information.

Authentication panel of the WorldClient component
Authentication panel of the WorldClient component

Attackers leveraged a malicious eThe extension to infiltrate a Latin American organization in 2022, which executed commands to gather system information and laterally move within the network. 

By employing legitimate software like HitmanPro Alert’s driver and malicious DLLs, .bat files, and XML files for scheduled tasks, they propagate the infection, compromising multiple systems within the organization. 

They exploited a vulnerability in the Tpm-HASCertRetr.xml description file to schedule tasks that executed commands from the ~dfae01202c5f0dba42.cmd file, which installed the hmpalert.sys driver, which, due to a lack of verification, could load malicious DLLs. 

By placing their payload DLLs at C:\Windows\System32\hmpalert.dll, the attackers were able to inject these DLLs into privileged processes like winlogon.exe and dwm.exe on system startup, gaining persistent and elevated access to the compromised systems.

In early 2024, adversaries exploited a vulnerability in the hmpalert.sys driver to infect a system. Unlike previous attacks, they bypassed scheduled tasks, employing a novel technique involving Google Updater. 

The malicious hmpalert.dll payload, identified as FakeHMP, enabled attackers to steal files, log keystrokes, capture screenshots, and deploy additional malware, where threat actors further compromised systems with a microphone recorder and file stealer. 

The organization was compromised by an advanced attack leveraging two malicious frameworks, Careto2 and Goreto, where Careto2, installed via a multi-stage process, used COM hijacking for persistence and a virtual filesystem to store plugins for various malicious activities. 

While Goreto, a Golang-based toolset, connected to Google Drive for command-and-control, executing commands, keylogging, and capturing screenshots. Both frameworks employed advanced techniques, indicating a sophisticated and persistent threat actor, likely the Mask. 

According to Secure List, the threat actor known as Careto remains a formidable force in the cyber threat landscape.

Despite a decade-long absence, the group continues to innovate, employing advanced techniques like persistence through MDaemon and implant loading via HitmanPro Alert. 

Their ability to craft intricate, multi-component malware underscores their technical prowess. While the timing of their next campaign is uncertain, it is anticipated to be equally sophisticated and disruptive.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Latest articles

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking...

PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability

A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking...