Tuesday, December 3, 2024
HomeBackdoorCertificate Authority Hacked by Implanting Backdoor on Official Website

Certificate Authority Hacked by Implanting Backdoor on Official Website

Published on

SIEM as a Service

One of the largest certification authorities in Mongolia, the MonPass server has been hacked by the threat actors. 

The security researchers of Avast have pronounced that the threat actors have built a backdoor that has been built on Cobalt Strike into the company’s official client.

After the investigation, the experts confirmed that the backdoor was active from the 8th of February to the 3rd of March, 2021, on the official app.

- Advertisement - SIEM as a Service

The server was hacked by the threat actors nearly 8 times, and the experts found indication by eight various web shells and backdoors.

According to the security analysts of Avast, the main motive of the hackers was to infect different computers in Mongolia with malware. 

However, the security experts were investigating and working with the CERT Mongolia team as well as with MonPass from March to June so that they can find all the interventions.

Technical Analysis

After a proper investigation, the analysts declared that the malicious installer that has been used by the threat actors is an unsigned PE file. 

Here, the folder has been administered under a very unique process, that is whenever the users start downloading the authorized version of the installer from the MonPass official website the authorized version is grounded to the C:\Users\Public\ folder.  

However, this process ensures that the installer works as it used to work earlier, such as a regular user is absurd to mark anything unusual with the help of this process.

Compromised Web server content

During the investigation, the cybersecurity researchers of Avast found two compromised Web server content, and here we have mentioned them below:-

  • DNS.exe
  • Browser_plugin.exe

Clues lead to a Chinese threat actor

After a very long investigation process, the experts are yet not confirmed that who has initiated this attack. But as per the record of the previous attack that has happened to Mongolia and other Asian countries, they are speculating that it might be Beijing.

As they have got many clues that indicate, it might be Chines hacking group, well in December 2020 the experts detected that a Chines hacking group has attacked Mongolia by negotiating a software company that provided software to multiple Mongolian government offices.

Moreover, the Chinese cyber-espionage campaign has also attacked Mongolia by using spear-phishing emails, and not only this but the Chinese cyber-espionage group also break and embedded malware inside the certificate installation app that has been implemented by the Vietnam Government Certification Authority (VGCA).

After knowing all the details regarding the attack, the analysts have reported all the clients that are baffled in the attack, and as part of this, the experts have also asserted that the malware was using steganography to decrypt the Cobalt Strike beacon in their attack. 

In the meantime, the users were recommended to stay active, and should immediately remove the client and the backdoor that they have installed till now.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox

UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access...

Rekoobe Backdoor In Open Directories Possibly Attacking TradingView Users

APT31, using the Rekoobe backdoor, has been observed targeting TradingView, a popular financial platform,...

Researchers Backdoored Azure Automation Account Packages And Runtime Environments

Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages....