DarkUniverse – A Weaponized APT Framework Found via Interesting Script that Used in NSA Hacking Attack

Researchers found the existence of the new APT Framework named “DarkUniverse” using Tips from a script that used in the NSA breach in 2017 in which, shadow brokers published their well-known ‘Lost in Translation’ Hacking tools leak.

“Lost in Translation” cyber-espionage campaign leaked some of the deadliest exploits such as DarkPulsar, Eternal Blue that cause billions of dollar loss by giving its power to WannaCry and NotPetya ransomware.

The script discovered by the researchers who described as the 27th function of this script that actually checks the traces to other APT activities in the hacked systems.

Researchers believe that the “DarkUniverse” APT Framework was active at least 8 years from 2009 until 2017, and the traces indicate that it also tied with ItaDuke, an actor that used PDF exploits for dropping previously unknown malware.

The malicious framework targetted various countries including Syria, Iran, Afghanistan, Tanzania, Ethiopia, Sudan, Russia, Belarus and the United Arab Emirates. The victims included both civilian and military organizations.

DarkUniverse APT Framework Infection process

Further analysis reveals that the campaign is mostly using the spear-phishing emails to deliver the malware through the weaponized Microsoft Office document attachment.

There are different versions of the sample has been used for this campaign between 2009 to 2017, and the latest version of the malware used until 2017.

APT campaigns’ command and control server deployed in the cloud storage at mydrive.ch. “For every victim, the operators created a new account there and uploaded additional malware modules and a configuration file with commands to execute it.”

It performs the following actions once it connected to the C2 server:

  • downloaded the command file to the working directory;
  • uploaded files collected and prepared by additional malicious modules
  • downloaded additional malware modules

According to Kaspersky research, The glue30.dll malware module provides keylogging functionality. The updater.mod module uses the Win API function SetWindowsHookExW to install hooks for the keyboard and to inject glue30.dll into processes that get keyboard input. After that, glue30.dll loads and begins intercepting input in the context of each hooked process.

DarkUniverse campaign collecting various sensitive information including Email conversations, Files from specific directories, Screenshots, information from the Windows registry, Sends a file to the C2, Credentials from Outlook Express, Outlook, Internet Explorer, Windows Mail and more.

“DarkUniverse is an interesting example of a full cyber-espionage framework used for at least eight years. The malware contains all the necessary modules for collecting all kinds of information about the user and the infected system and appears to be fully developed from scratch.” Kaspersky said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Windows 11 CLFS Driver Vulnerability Let Attackers Escalate Privileges – PoC Exploit Released

A critical security vulnerability has been identified in the Common Log File System (CLFS) driver…

2 days ago

10 Best Linux Distributions In 2024

The Linux Distros is generally acknowledged as the third of the holy triplet of PC…

2 days ago

AWS CDK Vulnerabilities Let Takeover S3 Bucket

A significant security vulnerability was uncovered in the AWS Cloud Development Kit (CDK), an open-source…

2 days ago

NVIDIA Patch Multiple GPU Display Driver for Windows & Linux

NVIDIA has issued essential security updates for its GPU Display Driver, addressing multiple vulnerabilities affecting…

2 days ago

GitLab Patches HTML Injection Flaw Leads to XSS Attacks

GitLab has announced the release of critical security updates for its Community Edition (CE) and…

3 days ago

Xerox Printers Vulnerable to Remote Code Execution Attacks

Multiple Xerox printer models, including EC80xx, AltaLink, VersaLink, and WorkCentre, have been identified as vulnerable…

3 days ago