Thursday, January 9, 2025
HomeComputer SecurityOperation Red Signature Deliver's Malware to Target Organizations Through Outside Partner Network

Operation Red Signature Deliver’s Malware to Target Organizations Through Outside Partner Network

Published on

Supply Chain Attacks occurs is an advanced threat that determines the weak link in the supply chain to infiltrate into the organization network.

Security researchers from TrendMicro and IssueMakersLab uncovered Operation Red Signature that launches supply chain attacks targeting organizations in South Korea.

The Threats actor’s behind Operation Red Signature have compromised the server of the support solution provider to deliver remote access tool “9002 RAT” though the update process. The RAT also contains an exploit tool for vulnerability CVE-2017-7269 and an SQL password dumper.

Threat actor’s configured the update servers of support solution provider to deliver malicious files if the victim in their range of interest based on the IP address and the target organizations.

How Operation Red Signature Works

Attackers stolen the codesigning certificates of the support solution providers and signed the malicious files with the stolen certificate and upload to the attacker’s server.

Operation Red Signature

Then the hacked update server of support solution provider is configured to receive the file “update.zip” from the attacker’s server if the user found within the attacker’s interest.

The update.zip contains two files “update.ini” which holds the configuration of remote support solution program and downloads “file000.zip” and “file001.zip” and extracted as “rcview40u.dll” and “rcview.log“.

Operation Red Signature

Then the file “rcview40u.dll” signed with the stolen codesigning certificate will be executed and the DDL files are responsible for decoding the rcview.log file.

The rcview.log is decrypted to 9002 RAT which is the final payload and it connect’s to the C&C server hosted at IP 66[.]42[.]37[.]101.

Researchers said that the 9002 RAT was compiled on July 17, 2018, and starting from 13:35 on July 18 the 9002 RAT being downloaded once the update started. The RAT also serves as a springboard to deliver other malware’s.

Also Read

Beware of Dangerous Android Triout Malware That Records Phone Calls, Videos and Steals Pictures

Dark Tequila Malware Steals Financial Information and Login Details of Popular Websites

New Marap Malware Targeting Financial Institutions Via Microsoft Office and PDF Documents

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace

Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has...

New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks

A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to...

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

Researchers Reveal Exploitation Techniques of North Korean Kimsuky APT Group

Since 2013, the advanced persistent threat (APT) known as Kimsuky, which the North Korean...