Friday, March 29, 2024

Malicious Hackers Abuse TeamViewer & RMS using Malware to Steal Money From Victim Organizations Accounts

Cybercriminals distributing powerful malware that abuse legitimate remote administration tools such as TeamViewer & RMS to gain the victim’s system control remotely and steal money from the target organization.

Attackers continuously targeting the industrial companies in different origins since 2017 and still the malware campaign distributing into various organizations.

The main goal of the attack is to steal the money from the targeted organization by compromising them via remote administration software.

Also, cybercriminals using the various new technique to evade the detection in the targeted system. Once the malware installed, the attacker connected to the targeted system to find the purchase documents, as well as the financial and accounting software used.

Criminals later used those collected details to commit the financial fraud and try to make the payment by spoofing the bank details.

Researcher believes that at least 400 industrial companies in Russia have been targeted by this attack, including companies in the following industries:

  • Manufacturing
  • Oil and gas
  • Metallurgy
  • Engineering
  • Energy
  • Construction
  • Mining
  • Logistics

After this case, attackers using various sophisticated malware in order to perform post exploitation such as privilege escalation and obtaining local administrator privileges, the theft of user authentication data for financial software and services, or Windows accounts for lateral movement.

The malware pack can incorporate spyware, extra remote organization utilities that expand the aggressors’ control of compromised systems, malware that can exploit the OS using various known vulnerabilities.

TeamViewer & RMS Infection Vector

Initially, malware spreading via phishing email campaign with an attachment that posed to connection with finance and compromises victims to follow the link that leads to downloading malware from various sources.

The malware used in these attacks installs legitimate remote administration software – TeamViewer or Remote Manipulator System/Remote Utilities (RMS).

An attacker using various techniques to launch the malware into the victim’s machine as we discussed above, such as poisoning or specially crafted script for the Windows command interpreter.

Once the script copying the malicious files into the system then it deletes itself and launching the legitimate Remote Manipulator System/Remote Utilities (RMS) software that enables attackers to control the infected system.

Same as RMS, attackers also using Teamviewer, but this case, stolen data using Teamviewer send to malware command and control server unlike RMS which send the data via Email.

When the malware launches the RMS, it loads the DLL’s for some of the program operations to control the printers, also its loads DLL library insecurely that leads to conduct a DLL hijacking attack.

Aslo attacker modifying the Remote administrative tools executable file to make it available on the targeted system that helps to perform following actvities by attackers.

  • Remotely controlling the system (RDP)
  • Transferring files to and from the infected system
  • Controlling power on the infected system
  • Remotely managing the processes of running application
  • Remote shell (command line)
  • Managing hardware
  • Capturing screenshots and screen videos
  • Recording sound and video from recording devices connected to the infected system
  • Remote management of the system registry

Later on infected machines name, username, the RMS machine’s Internet ID, etc will share into attacker via email that extracted from configuration files.

According to Kaspersky researcher, Hooking Windows API functions enables attackers to hide TeamViewer windows, protect malware files from being detected, and control TeamViewer startup parameters.

Finally Malware launching the configuration files that contains various parameter such as “the password used for remotely controlling the system, URL of the attackers’ command-and-control server, parameters of the service under whose name TeamViewer will be installed, the User-Agent field of the HTTP header used in requests sent to the command-and-control server, VPN parameters for TeamViewer, etc.”

Also, attackers using aditional malware to spyware to victim computers in order to collect logins and passwords for mailboxes, websites, SSH/FTP/Telnet clients, as well as logging keystrokes and taking screenshots.
 

Additional Malware families are capable of doing following malicious activities.

  • Logging keystrokes
  • Making screenshots
  • Collecting system information and information on installed programs and running processes
  • Downloading additional malicious files
  • Using the computer as a proxy server
  • Stealing passwords from popular programs and browsers
  • Stealing cryptocurrency wallets
  • Stealing Skype correspondence
  • Conducting DDoS attacks
  • Intercepting and spoofing user traffic
  • Sending any user files to the command-and-control server

You can find the Indicator of compromise for these attacks using Remote administrative tools.

Website

Latest articles

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government...

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to...

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles