Skip to content

Deconstructing Mikroceen: Researchers uncover spying backdoor attacking high-profile targets in Central Asia

The analysis is the result of joint research between ESET and Avast

BRATISLAVA, PRAGUE
 – ESET recently teamed up with Avast to research a widespread and constantly evolving remote access tool (RAT) with the usual backdoor functionality that ESET has dubbed Mikroceen. In the joint analysis, the researchers uncovered Mikroceen being used in espionage attacks against government and business entities (from the telecommunications and gas industries) in Central Asia.

The attackers were able to gain long-term access to affected networks, manipulate files and take screenshots. Victims’ devices could execute various commands delivered remotely from command and control servers.

The researchers investigated the custom implementation of Mikroceen’s client-server model, purpose-built for cyberespionage. “The malware developers put great effort in securing the client-server connection with their victims. Their malware was leveraged ‘in the wild,’ as the operators managed to penetrate high-profile corporate networks. We also saw a larger attack toolset being used and constantly developed, which consisted mainly of variations in obfuscation techniques,” comments Peter Kálnai, who led the ESET arm of the joint research team.

Mikroceen is under constant development, and security researchers have seen it used with backdoor capabilities in various targeted operations since late 2017. Among the tools used by the attackers to move within the infiltrated networks, ESET and Avast researchers also identified Gh0st RAT, an older, yet infamous, RAT created around 2008. There are many similarities between Gh0st RAT and Mikroceen, with the main shift between the projects in securing the connection with a certificate.

For more technical details about Mikroceen, read the blog post Mikroceen: Spying backdoor leveraged in high profile networks in Central Asia on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET Research discovers cyber espionage framework Ramsay

Bratislava, Montreal – ESET researchers have discovered a previously unreported cyber espionage framework they dub Ramsay. The framework is tailored for collecting and exfiltrating sensitive documents from air-gapped systems that are not connected to the internet or other online systems. Since the number of victims so far is very low, ESET believes that this framework is under an ongoing development process.

“We initially found an instance of Ramsay in a VirusTotal sample uploaded from Japan that led us to the discovery of further components and other versions of the framework along with substantial evidence to conclude that the framework is still in a developmental stage, with delivery vectors subject to fine testing,” says Alexis Dorais-Joncas, head of ESET’s Montreal-based research team.

According to ESET findings, Ramsay has gone through several iterations based on the different instances of the framework found, denoting a linear progression on the number and complexity of its capabilities. The developers in charge of infection vectors seem to be trying different approaches, such as using old exploits for Microsoft Word vulnerabilities from 2017 and deploying trojanized applications for delivery, potentially via spear-phishing. The three discovered versions of Ramsay differ in complexity and sophistication, with the latest third version being the most advanced, especially with regard to evasion and persistence.

Ramsay’s architecture provides a series of capabilities managed via a logging mechanism:

  • File collection and covert storage: The primary goal of this framework is to collect all existing Microsoft Word documents within a target’s file system.
  • Command execution: Ramsay’s control protocol implements a decentralized method of scanning and retrieving commands from control documents.
  • Spreading: Ramsay’s embeds a component that seems to be designed to operate within air-gapped networks.

“Especially noteworthy is how the architectural design of Ramsay, especially the relationship between its spreading and control capabilities, allows it to operate in air-gapped networks – meaning networks that are not connected to the internet,” says Dorais-Joncas.

For more technical details about Ramsay, read the blog post Ramsay: A cyber espionage toolkit tailored for air-gapped networks on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

居家辦公弱點曝,駭客詐騙趁虛入 – BEC 詐騙如何防範?

近日傳出某家銀行的海外分行員工,在居家辦公期間接到駭客假冒客戶的詐騙郵件,依指示轉帳被詐騙數十萬美元的事件。據悉,駭客假冒變造的電子郵件地址,與正確的郵件僅有一個字母之差,順利矇騙了承辦人員;其次行員在匯款前,並未透過第二管道與客戶確認,因而造成鉅額財務損失。

要防止偽冒變造的郵件,除了承辦人員需有良好的教育訓練和並多加留意之外,企業也應妥善運用有效的郵件防禦機制,在第一時間將偽冒的郵件阻擋在外,或為疑似偽冒的郵件加以標記。中華數位科技 SPAM SQR 與ADM進階防禦機制,可針對寄信來源潛藏偽造特徵的郵件、BEC 詐騙郵件、冒名偽造網域社交郵件及各式詐騙來源郵件進行檢測,並加以攔截。當上述郵件不慎被重送放行到使用者端時,系統會自動在此類郵件主旨加以標註警示,提醒使用者提高警覺,以降低被詐騙的風險。另外,Mail SQR Expert 的特定郵件外寄自動加密功能,可將內容含有匯款帳號,匯款金額關鍵字的外寄郵件,自動轉為 PDF 並加密,收件人必須透過第二管道取得原寄件人的密碼才能開啟郵件,避免企業的匯款資訊遭駭客攔截偽冒。

若不幸被騙,應立即採取行動向警方報案、聯繫匯款銀行申請退匯,越早察覺並處理,追回款項的機會就越高。此外,不論款項是否追回,也應尋求專業的鑑識夥伴。中華數位科技BEC鑑識服務團隊,協助清查鑑識受害電腦與關聯網路,改善資安問題並避免再度受駭。

BEC 詐騙是經過縝密計畫的針對型攻擊,同時混合了多種入侵與欺騙的手法。駭客在事前就開始鎖定詐騙目標,並且長期潛伏監控,以便在匯款的關鍵時刻介入偽冒。一旦被盯上後就有可能重複發生,背後的資安問題若未被正確地找到並解決,不論企業躲過幾次損失,未來還是有可能再次發生!

更多BEC 詐騙各階段補救與防禦重點,請參考 中華數位 BEC 詐騙解決方案

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於中華數位科技 Softnext Technologies Corp.
創立於2000年8月。
秉持著【We Secure Your Content】的服務理念,以提供企業資訊應用管理服務及打造資訊內容安全防護為宗旨。專精於提供網路應用服務技術,根據市場需求推出多款資訊內容安全的解決方案及應用服務,能夠協助企業透過符合資安管理規範並遵循法規的方式進行資訊內容安全管理,以維護員工的生產力、提升企業經營績效。

駭客運用映像檔躲避檢查關卡,對各產業發動攻擊

近期不少企業詢問關於附件檔夾帶 .ISO、.IMG 等映像檔的攻擊行為。事實上,ASRC 研究中心在「2019 年第三季電子郵件安全趨勢報告」中,便已揭露在 2019 年第三季觀察到不少駭客利用 UDF 映像檔附件做為攻擊工具的案例:UDF 映像檔原是用於光碟備份、燒錄前暫存、準備於大量複製光碟之用,其副檔名多為 .iso、.img… 等。由於這類映像檔有其特定用途,部分的防毒牆、防火牆、終端防毒軟體會忽略對這類格式檔案的大小限制或其內容的檢查,因此攻擊者就利用此缺口,將病毒嵌在標準合法的 UDF 映像檔格式內,以躲過各種檢查關卡。再次提醒管理者要意識到映像檔也可被運用於攻擊,並作為資安策略的考量。


這類型的攻擊主旨幾乎都與商業的交易行為有關,舉凡提及訂單、發票、詢價報價、交易通知,內容也十分在地化,亞洲區發現的樣本除了英文外,也可見到韓文、簡繁體中文。攻擊在 2019 年第四季達到高峰,2020 年第一季整體數量降至前一季的1/3,並且,除了 .ISO、.IMG 等常見的映像檔格式被利用之外,我們也觀察到有少量的.DAA 格式映像檔在外散播。


ASRC 與中華數位科技至今仍持續監控這類型的攻擊。事實上 .ISO、.IMG 夾帶惡意程式不是新聞,長期以來都是有的,可以把它想成是一種壓縮檔,類似 zip 中藏了惡意程式這樣的寄送方式。因此,以 .ISO 檔來說,有裝Winrar 的 Windows 會將他的圖示標為 Winrar 可支援的壓縮檔 (Winrar 預設關聯 .ISO 檔),對於收到這種 .ISO 檔的收件者來說,可能會自然的將它打開,並執行惡意程式。

ASRC 再度提醒企業小心留意,防禦映像檔攻擊可以這麼做:

    1. 取消隱藏副檔名,對映像檔附件多加留意。

 

    1. 加強人員安全意識,面對來路不明的郵件抱持高度懷疑的態度。

 

  1. 運用合適的郵件防禦設備,提供人員較安全的郵件使用環境。

    目前中華數位 SPAM SQR 已可防禦這類映像檔攻擊

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於中華數位科技 Softnext Technologies Corp.
創立於2000年8月。
秉持著【We Secure Your Content】的服務理念,以提供企業資訊應用管理服務及打造資訊內容安全防護為宗旨。專精於提供網路應用服務技術,根據市場需求推出多款資訊內容安全的解決方案及應用服務,能夠協助企業透過符合資安管理規範並遵循法規的方式進行資訊內容安全管理,以維護員工的生產力、提升企業經營績效。

【世界密碼日】這些年,大家一起用的弱密碼

您知道每個五月的第一個星期四是世界密碼日嗎?現代生活每天都過得十分繁忙,您有好好關心過您的密碼嗎?趁著世界密碼日,好好的了解一下關於密碼容易被忽視的問題。

根據 splashdata 的統計,2019 年的十大弱密碼仍是那幾個熟面孔,和 2018 年的榜單做個比較,上榜的密碼大同小異,雖然「sunshine」掉出 Top 10 榜外但也仍是第30名,新進榜的還是更弱的「123123」。並且毫無意外的,仍是「123456」奪下弱密碼冠軍寶座。


什麼是弱密碼呢?就是特別容易被猜中,或是許多人愛用的同一種邏輯所設定的密碼:例如,去年一位國外工程師曾在推特發問,為何 ji32k7au4a83 這個看似安全的密碼在 Have I been pwned 資料庫中出現上百次。然而,這個問題竟然只有台灣網友答得出來,對照注音鍵盤 ji32k7au4a83 = 我的密碼。不僅如此,網友還發現和password、iloveyou相同邏輯的 au4a83、ji394su3 密碼使用量遠超過 ji32k7au4a83。

根據最新美國標準與科技研究院(NIST)所提出的建議,高強度的密碼設定原則,最好包括15個字元以上,並由幾個不相干的名詞或數字組成:例如,VisonExamAttention2020YouLove,這樣超長的密詞可套用自己才知道的邏輯進行組合,比亂數形成的密碼方便記憶,也不容易被破解。另外,若無任何證據顯示密碼有外流的情況,頻率過高的更換密碼,為難的不是入侵者,而是密碼的使用者!

密碼的保護,除了應避免使用弱密碼外,也必須考慮外來的嘗試與破解!當系統遭遇錯誤率過高的外來的密碼嘗試時,應直接封鎖嘗試的來源,而非將該帳號封鎖,這樣才能在避免「暴力破解(Brute-force attack)」、「字典檔攻擊(Dictionary attack)」與「密碼噴灑(Password Spraying)」的時候,不至於困擾擁有正確密碼的主人。

最後,也是大家最容易疏忽的事:千萬不要在多個服務都使用同一組密碼!
一旦任一服務有密碼外洩事件發生時,使用相同密碼的其他服務也跟著一起曝險!

ASRC 研究中心的帳密安全提醒
1. 選擇使用者保護較嚴謹的系統服務,例如一定要有防密碼濫猜的機制
2. 切記,不要一套密碼走天下。不同的服務間使用相同的密碼,只要一個服務的帳密外洩,很容易牽連其他服務帳戶,尤其網路銀行登入密碼更要避免重覆使用。
3. 避免使用公開在外或社群網站可見的生日、姓名、手機等資料做為密碼
4. 雙因子驗證的搭配使用,比定期更換密碼的保護效益有用許多

驗證郵件密碼強度,SPAM SQR 密碼強度檢測模組
企業的電子郵件密碼安全,可透過中華數位科技 SPAM SQR 密碼強度檢測模組定期實施密碼稽核,確保密碼強健度,降低密碼被猜中的風險,避免員工的弱密碼成為資安破口。詳情請洽中華數位科技 02-25422526。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於中華數位科技 Softnext Technologies Corp.
創立於2000年8月。
秉持著【We Secure Your Content】的服務理念,以提供企業資訊應用管理服務及打造資訊內容安全防護為宗旨。專精於提供網路應用服務技術,根據市場需求推出多款資訊內容安全的解決方案及應用服務,能夠協助企業透過符合資安管理規範並遵循法規的方式進行資訊內容安全管理,以維護員工的生產力、提升企業經營績效。

關於 ASRC 垃圾訊息研究中心
ASRC 垃圾訊息研究中心 (Asia Spam-message Research Center),長期與中華數位科技合作,致力於全球垃圾郵件、惡意郵件、網路攻擊事件等相關研究事宜,並運用相關數據統計、調查、趨勢分析、學術研究、跨業交流、研討活動..等方式,促成產官學界共同致力於淨化網際網路之電子郵件使用環境。更多資訊請參考 www.asrc-global.com

×

Hello!

Click one of our contacts below to chat on WhatsApp

×