• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Internet

Never-before-seen attackers are targeting Mideast industrial organizations

March 25, 2020
Share on FacebookShare on Twitter

Researchers have unearthed an attack campaign that uses previously unseen malware to target Middle Eastern organizations, some of which are in the industrial sector.

Researchers with Kaspersky Lab, the security firm that discovered the campaign, have dubbed it WildPressure. It uses a family of malware that has no similarities to any malicious code seen in previous attacks. It’s also targeting organizations that don’t overlap with other known campaigns.

Milum, as the malware is dubbed, is written in C++ and contains clues that suggest developers may be working on versions written in other programming languages. While Milum uses configuration data and communication mechanisms that are common among malware developers, the researchers believe that both the malware and the targets are unique.

Attention getting

“A campaign that is, apparently, exclusively targeting entities in the Middle East (at least some of them are industrial-related) is something that automatically attracts the attention of any analyst,” Kaspersky researcher Denis Legezo wrote in a post published on Tuesday. “Any similarities should be considered weak in terms of attribution and may simply be techniques copied from previous well-known cases. Indeed, this ‘learning from more experienced attackers’ cycle has been adopted by some interesting new actors in recent years.”

Milum samples show a compilation date of March 2019, a time frame that’s consistent with the first known infection on May 31, 2019. Kaspersky first spotted Milum last August.

The malware uses the RC4 encryption cipher with a different 64-bit key for each target. It also uses the JSON format for configuration data and to communicate with control servers through HTTP POSTs. Fields inside the JSON data correspond to the C++ language and the .exe file extension. That clue led researchers to hypothesize that malware versions based on other languages are in the works or possibly already exist. To date, the researchers have collected three almost identical samples, all from the same undisclosed country.

The malicious application exists as an invisible toolbar window. The malware implements functions in a separate threat. Researchers were unable to access commands from control servers, but by analyzing command handlers in the malware, the researchers were able to piece together the following:

Code Meaning Features
1 Execution Silently execute received interpreter command and return result through pipe
2 Server to client Decode received content in “data” JSON field and drop to file mentioned in “path” field
3 Client to server Encode file mentioned in received command “path” field to send it
4 File info Get file attributes: hidden, read only, archive, system or executable
5 Cleanup Generate and run batch script to delete itself
6 Command result Get command execution status
7 System information Validate target with Windows version, architecture (32- or 64-bit), host and user name, installed security products (with WQL request “Select From AntiVirusProduct WHERE displayName “Windows Defender”)
8 Directory list Get info about files in directory: hidden, read only, archive, system or executable
9 Update Get the new version and remove the old one

When researchers took control of one of the campaign’s control servers, they observed mostly computers located in the Middle East connecting. (The researchers believe that the IP addresses not located in the Middle East belonged to network scanners, Tor Exit nodes, and VPN connections.) Some of those the Middle Eastern IP addresses belonged to organizations occupying the industrial sectors. Milum gets its name from a string found in one of the executable file names, as well as C++ class names inside the malware.

Kaspersky Lab

The above screenshot of a Kaspersky computer connecting to the sinkholed control server showed only devices based in Iran connecting. Tuesday’s post didn’t identify the countries of other infected organizations.

Over the past decade, the Middle East has emerged as a hotspot for hacking operations, with (to name only four) an attack targeting safety controls in critical infrastructure facilities, a reportedly US operation that hobbled Iran’s ability to target oil tankers, a destructive disk-wiping campaign against a Saudi Arabian gas company, and the Stuxnet and Flame malware that targeted Iran. The discovery of WildPressure and Milum suggest attacks in the region aren’t likely to die down anytime soon.

Next Post

New coronavirus research suggests vaccines developed to treat it could be long-lasting – TechCrunch

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • These OnePlus wireless earbuds were easy to recommend at full price, but at $40, they become a no-brainer
  • Does anyone even use 3-button navigation anymore?
  • I switched to Samsung after my Pixel was stolen, here’s what I miss
  • Minecraft is getting its first-ever theme park land
  • 5 reasons why your smartphone sucks for reading

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously