Tuesday, March 4, 2025
HomeComputer SecurityOceanLotus APT Group Uses Undetected Ratsnif Remote Trojan to Leverage Network Attack's

OceanLotus APT Group Uses Undetected Ratsnif Remote Trojan to Leverage Network Attack’s

Published on

SIEM as a Service

Follow Us on Google News

OceanLotus APT Group also known as APT32, SeaLotus, and CobaltKitty uses undetected Remote Access trojans Ratsnif to leverage network attack capabilities. The trojan was active since 2016, and it has features like packet sniffing, gateway/device ARP poisoning, DNS poisoning, HTTP injection, and MAC spoofing.

The Cylance Threat Research Team detected four distinct samples of Ratsnif trojan, out of four, three of them found developed in 2016 and one sample in 2018. There is no significant change with the version developed in 2016, and they are similar in functionality.

The fourth sample was developed in the second half of 2018; it has significant changes when compared to the previous version. Previous samples entirely depend on C2 servers, whereas the current sample doesn’t rely on C2 servers for operations.

It also includes some new features such as HTTP injection, protocol parsing, and SSL hijacking. It uses WolfSSL library for traffic decryption and http_parser.c for parsing HTTP traffic.The new sample also includes features like protocol parsing, ARP poisoning, DNS spoofing, HTTP redirection, and HTTP injection.

Ratsnif Multi-stage Infection

The initial payload is the loader DLL that copies 1st stage shellcode into memory and execute it. Which decompress the 2nd stage payload is the shellcode that executes into the memory and hooks several API functions that responsible for returning command line.

Researchers identified a bug in Ratsnif that could lead to memory read violation when parsing a specific parameter (“dwn_ip’). What happens is that the value is passed as a string and it should be passed as a pointer to a string.

The 2018 variant employs multiple sniffers for harvesting sensitive information from packets and to minimize the data extraction and to exfiltrate the process.

Ratsnif contains Base64 encoded C2 URL, but the trojan didn’t use it. Instead, it logs the captured information in a text, and uses another module to exfiltrate it, reads the analysis.

“Ratsnif is an intriguing discovery considering the length of time it has remained undetected, likely due to limited deployment. It offers a rare glimpse of over two years of feature development, allowing us to observe how threat actors tailor tooling to their nefarious purposes.”

In the previous campaign, OceanLotus uses steganography method to hide the encrypted malware payload within a .png image file to infect the targeted system.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...