Supply Chain Attacks occurs is an advanced threat that determines the weak link in the supply chain to infiltrate into the organization network.
Security researchers from TrendMicro and IssueMakersLab uncovered Operation Red Signature that launches supply chain attacks targeting organizations in South Korea.
The Threats actor’s behind Operation Red Signature have compromised the server of the support solution provider to deliver remote access tool “9002 RAT” though the update process. The RAT also contains an exploit tool for vulnerability CVE-2017-7269 and an SQL password dumper.
Threat actor’s configured the update servers of support solution provider to deliver malicious files if the victim in their range of interest based on the IP address and the target organizations.
Attackers stolen the codesigning certificates of the support solution providers and signed the malicious files with the stolen certificate and upload to the attacker’s server.
Then the hacked update server of support solution provider is configured to receive the file “update.zip” from the attacker’s server if the user found within the attacker’s interest.
The update.zip contains two files “update.ini” which holds the configuration of remote support solution program and downloads “file000.zip” and “file001.zip” and extracted as “rcview40u.dll” and “rcview.log“.
Then the file “rcview40u.dll” signed with the stolen codesigning certificate will be executed and the DDL files are responsible for decoding the rcview.log file.
The rcview.log is decrypted to 9002 RAT which is the final payload and it connect’s to the C&C server hosted at IP 66[.]42[.]37[.]101.
Researchers said that the 9002 RAT was compiled on July 17, 2018, and starting from 13:35 on July 18 the 9002 RAT being downloaded once the update started. The RAT also serves as a springboard to deliver other malware’s.
Beware of Dangerous Android Triout Malware That Records Phone Calls, Videos and Steals Pictures
Dark Tequila Malware Steals Financial Information and Login Details of Popular Websites
New Marap Malware Targeting Financial Institutions Via Microsoft Office and PDF Documents
A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed…
Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria Stealer,"…
Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass,…
The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated…
Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations designed…
A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated, state-sponsored…