Skip to content

ESET uncovers new Linux backdoor from SparklingGoblin APT group, targeting a Hong Kong university again

BRATISLAVA, MONTREAL — SEPT. 14, 2022 — ESET researchers have discovered a Linux variant of the SideWalk backdoor, one of the multiple custom implants used by the SparklingGoblin APT group. This variant was first deployed against a Hong Kong university in February 2021 — the same university that had already been targeted by SparklingGoblin during the student protests in May 2020. SparklingGoblin is an APT group with targets mostly in East and Southeast Asia, though ESET Research has seen SparklingGoblin targeting a broad range of organizations and verticals around the world, with a particular focus on the academic sector.

“The SideWalk backdoor is exclusive to SparklingGoblin. In addition to the multiple code similarities between the Linux variants of SideWalk and various SparklingGoblin tools, one of the SideWalk Linux samples uses a C&C address that was previously used by SparklingGoblin. Considering all of these factors, we attribute with high confidence SideWalk Linux to the SparklingGoblin APT group,” explains Vladislav Hrčka, an ESET researcher who made the discovery along with Thibault Passilly and Mathieu Tartare.

SparklingGoblin first compromised the particular Hong Kong university in May 2020, and we first detected the Linux variant of SideWalk in that university’s network in February 2021. The group continuously targeted this organization over a long period of time, successfully compromising multiple servers, including a print server, an email server, and a server used to manage student schedules and course registrations. This time, it is a Linux variant of the original backdoor. This Linux version exhibits several similarities with its Windows counterpart, along with some technical novelties.

One particularity with SideWalk is the use of multiple threads to execute a single specific task. We noticed that in both variants there are exactly five threads executed simultaneously, with each of them having a specific task. Four commands are not implemented or are implemented differently in the Linux variant. “Considering the numerous code overlaps between the samples, we believe that we actually found a Linux variant of SideWalk, which we dubbed SideWalk Linux. The similarities include the same customized ChaCha20, software architecture, configuration, and dead-drop resolver implementation,” says Hrčka.

“The Windows variant of SideWalk goes to great lengths to conceal the objectives of its code. It trimmed out all data and code that was unnecessary for its execution and encrypted the rest. On the other hand, the Linux variants contain symbols and leave some unique authentication keys and other artifacts unencrypted, which makes the detection and analysis significantly easier,” concludes Hrčka.

For more technical information about SideWalk Linux, check out the blog post “You never walk alone: SideWalk backdoor gets a Linux variant” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

CISAnalysis – September 14, 2022

Coming off a spectacular run last week with a dozen vulnerabilities, CISA has come back down to Earth, adding a pair of vulnerabilities to the Known Exploited Vulnerabilities Catalog. It’s a peculiar predicament for sworn enemies and strange bedfellows Apple and Microsoft——two peas in a pod….or shall I say, kernel 😜.

First up, Apple

The flaw in Apple iOS, iPadOS, and macOS allows malicious apps to “promote” themselves to kernel level privileges. What does kernel privileges give you? Everything. Full, unrestricted access to all machine resources——hardware, software, you name it. CISA is typically behind when it comes to cataloging, but they are not taking a Sunday stroll with this one. Apple disclosed the vulnerability on Sep 12 and two days later——bam!——it’s listed. Kudos, CISA, particularly when there is active exploitation and exploit code swirling on the black market.

Microsoft: we’re twinning

The twin flaw is in Windows Common Log File System Driver. Why the twin label? Because with a successful exploit, you get system privileges, which are analogous to kernel on Mac. So you get the whole kit and caboodle. This zero-day is being actively exploited in the wild, so you better get your bug spray out and go to town, stat.

Popcorn is great for a date night at the movies. But you don’t want these kernel(s) to explode 💥. Apply the vendor updates immediately.

#cisa #cisanalysis #apple #microsoft #zeroday

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VRX
VRX is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

Politicians aren’t the only ones at risk: how to tell if your mobile or PC passwords have been stolen

The increasing use of new technologies by the population has increased the risk of theft. Not only on the street can one fall victim to thieves, but one can also lose sensitive information such as passwords or banking keys in the cloud.

In this case it is even easier not to realize that virtual robbers are committing a crime. 

In addition, security no longer depends on you, but the security of third parties, those we shared our data with, becomes important.

What you don’t know about the security of your platforms

How can you maximize individual security on the network? 

Easy-peasy. 

Periodically modifying passwords and following some basic tips. 

The first thing is to know whether the user has been affected by any breach in any platform. The process could be complex for someone who is not really used to all of this, but there are free and secure portals where you may just enter some identifying data of your account to find out whether the passwords are in danger.

Haveibeenpwned.com is one of the examples. 

*As if it were a Google search engine, users only have to enter their email or phone number to find out whether the passwords of that profile have been leaked. 

In case that leak is confirmed (a message appears in just one second and in a very intuitive red color), the procedure is simple

Go to all those accounts and change the password

As experts indicate, you have to set different passwords depending on the platform.

Cuida la seguridad de tus plataformas.
“It makes no sense to set the same password on all applications and systems. 

That equals making things easier for thieves, because by taking profit from a single security breach they can take control of all your accounts for not having different passwords”, explains Sancho Lerena, CEO of the monitoring company Pandora FMS.

The fact of setting different passwords is usually a problem for the user, who risks either forgetting some of them if they do not keep them safe or losing some speed in the accessibility processes to the different applications. 

Despite this, it is essential to reinforce the security barrier. 

And that is because not only large entities should be protected.

One of the easiest things to verify is the strength of the passwords used, and implementing a system that monitors this may seem simple and innocent, but it is the first step to a safer system. 

Security monitoring

Security monitoring is used to control key security aspects, such as backup verification, or the execution of anti-virus security programs.

The most powerful organizations on the market are a clear example of the importance of cloud security and data protection

Until recently there was a specific department to manage all IT information and its protection, but the increase of that data bag and the increase of the danger in the cloud have turned monitoring into the most effective solution

Monitoring the IT structure of a company means centralizing the control of all the information and, in addition, it allows to alert and anticipate each error. 

In addition, those in charge, both of the IT structure and of data security, do not have as much workload and can perform their functions 100%. 

“Our monitoring solution, for example, strengthens security where it is installed. 

Businesses are placing increasing emphasis on the security of their IT information, and monitoring is critical to that end. 

Any failure or error is reported instantly, so action is faster and losses smaller. 

However, ordinary users should not forget that their information is also valuable for cyber criminals”, underlines the expert at Pandora FMS, aware of the interest of large organizations in protecting their data with systems such as monitoring.

Conclusion

Cybercrime has increased over time

Users, given the number of processes that must be developed online, share more and more information. 

A scenario that has made companies take their chances on monitoring systems such as that of Pandora FMS and that extends to individuals the need to protect their data on the network.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×