Feeds

You dirty RAT: Trend Micro spots new Asia-wide attack

Campaign targeting governments, telcos, and other organisations

Using blade systems to cut costs and sharpen efficiencies

Security researchers are warning of yet another advanced, large-scale attack campaign using sophisticated techniques to hide itself from its targets – organisations across Asia.

Trend Micro has dubbed the campaign Naikon, based on the HTTP user-agent string “NOKIAN95/WEB” found in various targeted attacks across the region in India, Malaysia, Singapore, and Vietnam and elsewhere.

The attacks begin in time-honoured fashion with a spear-phishing email “using messages related to diplomatic discussions in the Asia Pacific region”, according to Trend Micro threat analyst Maharlito Aquino.

Targets range from governments to media, oil and gas, telecommunications and other organisations.

The malicious email attachment exploits CVE-2012-0158 – a vulnerability in Windows Common Controls which was also used in the "Safe" campaign discovered by researchers last month and thought to be connected to the “cyber criminal underground in China”.

When the attachment is opened all the victim sees is a “decoy document”, however in the background the BKDR_RARSTONE Remote Access Tool (RAT) is being dropped onto the user’s machine.

First discovered back in February and used subsequently in email attacks using the Boston Marathon Bombings as a subject line lure, RARSTONE uses several techniques to evade detection by traditional security tools, Aquino said.

The RAT loads its backdoor component from a C&C server directly into memory, hiding it from traditional file-based scanners, for example.

Aquino continued:

What makes RARSTONE unique from PlugX – and other RATs – is its ability to get installer properties from Uninstall Registry Keys. This is so that it knows what applications are installed in the system and how to uninstall them, in the case that these applications inhibit RARSTONE’s functions. It also uses SSL to encrypt its communication with its C&C server, which not only protects that connection but also making it blend in with normal traffic.

The attackers also aimed to hide their efforts from the likes of Trend Micro by using either dynamic DNS domains or registrars with privacy protection, he said.

There's no info on exactly what the attackers were looking for in their campaign, although BKDR_RARSTONE is apparently capable of all the usual backdoor tricks, including "enumerating files and directories, downloading, executing, and uploading files, and updating itself and its configuration".

Trend Micro urged organisations to bolster their defences against such attacks by supplementing blacklisting and perimeter-based controls with file integrity monitoring and other tools which can offer greater insight into network traffic to identify suspect behaviour. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.