Monday, June 17, 2024

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer’s popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.

Threat actors target TeamViewer for their illicit purposes because it is a widely used remote desktop software with potential security weaknesses. 

Exploiting vulnerabilities in TeamViewer can provide unauthorized access to systems and sensitive data, enabling cybercriminals to carry out various malicious activities, such as data theft, financial fraud, or even using compromised systems to launch attacks on other targets.

In late 2022, QiAnXin Threat Intelligence Center identified a new threat actor group using fake software download sites with manipulated search rankings to distribute unofficial but seemingly valid installation packages created with Inno Setup.

Russian Hackers Bypass EDR

Attribution was challenging due to the attackers’ complex attack chain and manual operations. 

In mid-2023, TeamViewer’s DLL Sideloading was delivered via SFTP, hinting at a connection to the attacks on security researchers in 2021.

Phishing activity timeline
Phishing activity timeline (Source – Qianxin)

The execution chain focuses on SSH reverse tunnels, leveraging OpenSSH to bypass EDR endpoint detection. 

Attackers employed sftp-server.exe to deliver the TeamViewer hijacking component, revealing the use of MINEBRIDGE RAT. 

AnyDesk and PsExec were also used for lateral propagation, with data decryption occurring within the victim’s user context.

Attack chain
Attack chain (Source – Qianxin)

In total, four legitimate signatures were used in this phishing operation, some still valid in the report, with an enigmatic use of Amadey Trojan.

  • GUTON LLC: FC2BDF5BD23470669F63B9A5BAE6305160DCBC67
  • NTB CONSULTING SERVICES INC: A05536924F1BA8F99BA6B1AA3C97B809E32A477E
  • OOO RIMMA: A1C753F5271F24B8067AC864BB4192C37265840C
  • KATEN LLC: 9A865A28A85CABC3F79C88BE54AF3B20962BC35C

Researchers uncovered a new MINEBRIDGE RAT variant with LLVM obfuscation, removing old C&C instructions. 

The sample retrieves a DLL from the server to execute PowerShell commands for SSH component download, consistent with previous scripts.

Attribution

The group has been active since 2021 based on domain registration times. They used Cloudflare CDN to obscure their IP, but few OSINT reports on MINEBRIDGE made tracking challenging.

QiAnXin’s data shows that the malicious domains communicated with both corporate dedicated lines and home broadband in mainland China during their Cloudflare CDN phase.

The enterprises involved were in the following sectors:-

  • Cryptocurrency
  • Electronic components
  • Technology
  • Investment
  • Healthcare

Recent findings suggest Storm-0978 (RomCom), TA505, and MINEBRIDGE have strong connections, possibly indicating shared activities beyond economic motivations.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Website

Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Tushar Subhra Dutta
Tushar Subhra Dutta
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles