Friday, January 24, 2025
HomeMalwareHackers Using a Custom Malware to Steal Sensitive Data From a U.S....

Hackers Using a Custom Malware to Steal Sensitive Data From a U.S. Organization

Published on

SIEM as a Service

Follow Us on Google News

An organization in the DIB sector was compromised by state-funded hackers using a custom malware program, CovalentStealer, and the Impacket framework.

It took approximately ten months for the compromise to be resolved. There is a good chance that the organization was compromised by multiple APT groups. Last January, some of the perpetrators gained access to the victim’s Microsoft Exchange Server after they breached the victim’s security.

Defense Industrial Base Sector (DIB) entities are involved in the production, development, and provision of products and services that are required in support of military operations.

It has been recommended by the CISA, the FBI, and the NSA that critical infrastructure organizations and organizations in the DIB sector implement all the recommended mitigations.

Use of custom malware

Using the HyperBro RAT and more than a dozen samples of the ChinaChopper webshell, the hackers combined custom malware called CovalentStealer with Python classes from Impacket, an open-source Python library.

During the period when Microsoft released an emergency security update to resolve the set of four ProxyLogon vulnerabilities in Exchange Server, the threat actors also exploited them.

Here below we have mentioned those four ProxyLogon vulnerabilities:-

  • CVE-2021-26855
  • CVE-2021-26857
  • CVE-2021-26858
  • CVE-2021-27065

In mid-January of 2021, hackers were able to access the organization’s Exchange Server via an unknown access point and gain unauthorized access to the system.

Detection

For detection, the experts have recommended to following things:-

Ensure that your logs are monitored for unusual VPSs and VPN connections.

Make sure you are monitoring your account for any suspicious activity.

MAR-10365227-1 contains the YARA rules that need to be reviewed.

Make sure that no unauthorized software is installed on your computer.

Make sure that command-line activity is monitored for anomalous or known malicious activity.

The user accounts should be monitored for changes that are unauthorized.

Mitigations

Here below we have mentioned all the recommended mitigations:-

  • In order to separate the network segments based on roles and functions, network segmentation must be implemented.
  • Identify similar systems and isolate them
  • Provide granular access control and policy restrictions through micro-segmentation
  • Ensure that the systems are kept up to date
  • Create a process for controlling configuration changes
  • Utilize cybersecurity analytics and visibility tools
  • Ensure that scripting languages are being used appropriately
  • Make sure that the number of remote access tools is limited
  • Protect network communications by using encrypted services
  • The administration services for clear text should be disabled
  • Ensure that sensitive data and resources are protected by stringent access controls.
  • Keep an eye on VPN logins to make sure that no suspicious activity is taking place
  • Ensure that the use of administrative accounts is closely monitored.
  • Check that no elevated privileges are assigned to standard user accounts

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Zero-Click Outlook RCE Vulnerability (CVE-2025-21298), PoC Released

Microsoft issued a critical patch to address CVE-2025-21298, a zero-click Remote Code Execution (RCE)...

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular...

New Cookie Sandwich Technique Allows Stealing of HttpOnly Cookies

The "Cookie Sandwich Attack" showcases a sophisticated way of exploiting inconsistencies in cookie parsing...

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Murdoc Botnet Exploiting AVTECH Cameras & Huawei Routers to Gain Complete Control

Researchers have identified an active malware campaign involving a Mirai botnet variant, dubbed Murdoc,...

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...