Zeus Panda’s Modular Functions Provide Insight into Botnet Malware Capabilities

One core element of the information security mission is the successful assessment of the risk posed to an organization by a malware sample or malware variety delivered by a phishing email. In 2017, phishers have embraced the use of adaptable and flexible malware to gain initial footholds in a network before monetizing the infected host. The intersection of these two missions creates a scenario in which open-ended, adaptable botnet malware challenges information security professionals to prepare for a wide array of malware capabilities–in some case without much insight into the real risks posed by a malware tool.

However, in some cases a malware tool can reveal most, if not all, of its capabilities in a way that helps an organization identify malware risks. The Zeus Panda botnet malware is one of the more popular malware tools this year, and its use has been documented in numerous phishing attacks. It wholly embodies the principles of a multipurpose botnet tool by providing threat actors with a number of avenues for monetizing infected hosts. The tenacity and creativity with which threat actors have delivered this malware makes it a prominent constituent of the threat landscape but with limited expressions of its capabilities. Yet, understanding those capabilities is crucial for network defenders to understand the impact this malware can have within a protected environment.

Through analysis of behavior exhibited by Zeus Panda samples, PhishMe researchers uncovered a comprehensive assessment of this botnet tool’s capabilities. These capabilities were described through a list of module commands to either execute a task or update a module to support enhanced capabilities. The list below lists some operations for these modules.

Zeus Panda module tasks
mod_execute grab2 user_cookies_get
mod_execute grab2 user_passes_get
mod_execute info get_info
mod_update grab2
mod_update http
mod_update info
mod_update klog
mod_update pony
mod_update socks
mod_update vnc_p
mod_update vnc_p2
mod_update vnc_p3
user_execute url

Figure 1 – Zeus Panda modules provide a great deal of information about its capabilities

These module execution and update references can be interpreted as a guide to the capabilities of the Zeus Panda malware. For example, “grab2 user_cookies_get” and “grab2 user_passes_get” both imply that information stored in a browser cookie cache or password safe may be available to the “grab2” module. This could provide an avenue for threat actors to steal browser-session data or passwords for reuse. Similarly, the “info” module may provide reconnaissance about infected environments via the collection of information about the infected host. This information can be in turn leveraged in conjunction with the “user_execute” command to customize an attack through the deployment of a more specialized malware tool.

Other available modules–“klog”, “pony”, and “socks”–imply keylogger, Pony information stealer, and SOCKS proxy capabilities are available to the threat actor. Each of these would greatly enhance the threat actor’s insight into victim activity, stored passwords and credential data, and the ability to abuse the infected machine as a network proxy or traffic relay respectively. Additionally, a series of VNC modules would give the threat actor an option for full remote control of infected hosts.

Each of these elements from this brief list of module execution and update operations can be used to provide network defenders and information security professionals with an assessment of the risks posed by Zeus Panda. Furthermore, if a sample of this malware is present within a protected environment, comparing network communications and endpoint artifacts with this list of capabilities can help in the response process as well.

As malware creators and phishing threat actors further commoditize malware tools to maximize their opportunities and options regarding infected hosts, collecting intelligence on the capabilities available to those threat actors becomes increasingly important. A comprehensive defense strategy must include response plans and anticipatory defenses to limit a malware’s impact as well as prevent its successful deployment. The first step is empowering email users to recognize phishing techniques and report suspicious emails. Beyond this crucial first step, responders must be empowered to understand the risks posed by the malware these emails deliver to better defend the enterprise.

Don’t become another statistic: PhishMe® is now FREE for small businesses under 500 employees. Learn more.

The PhishMe 2017 Excellence Awards Nominations are Open!

Make your nominations for the 2017 PhishMe® Excellence Awards today!

Every day, 1000s of companies use PhishMe as a cornerstone of their phishing defense program. The PhishMe Excellence Awards recognize the outstanding achievements of security professionals and organizations with innovative, successful anti-phishing and phishing defense programs to minimize the risk and impacts associated with phishing attacks.

PhishMe Launches First Free Phishing Simulation Solution for Small Businesses

Human Phishing Defense Solution Designed to Reduce SMB End-User Susceptibility to Phishing

LEESBURG, VA. – August 10, 2017 – Today PhishMe®, the leading provider of human phishing defense solutions, announced the availability of PhishMe Free™ – a no-cost phishing simulation solution for small businesses under 500 employees to condition employees and fortify their defenses against today’s advanced cyberattacks, such as ransomware, business email compromise and spear-phishing.

With 90 percent of network security breaches attributed to phishing attacks,[1] no business – large or small – is immune to cyberthreats. Small businesses in particular are at risk, with more than 55 percent of SMBs having experienced a cyberattack in the past 12 months and 50 percent reporting a data breach.[2] As widespread breaches continue to threaten businesses worldwide, organizations must adopt security measures that utilize human intelligence to protect critical assets.

“Every company – regardless of size or resources – should have access to effective cybersecurity solutions,” said Rohyt Belani, co-founder and CEO of PhishMe. “61% of cyberattacks target small and medium businesses (SMBs) and the ensuing damages cost, on average, $800,000 USD[3]. To help such organizations shore up their defenses we created PhishMe Free. This solution is tailored specifically for companies with 500 employees or less. The goal is to help SMBs build a conditioned firewall of human sensors to act as a first line of defense against attacks that bypass traditional email filtering technologies.”

PhishMe Free leverages the foundational elements and expertise behind PhishMe Simulator, the leading anti-phishing solution that reduces end-user susceptibility to phishing attacks by up to  95 percent. Much like the company’s flagship product, PhishMe Free delivers simulated email campaigns that mimic real-life spear phishing scenarios and provide instant learning opportunities for recipients who fall for the exercises. It also equips IT teams with the tools needed to educate and engage employees in their efforts to thwart phishing attacks. Key benefits include:

  • Fast deployment with an easy to manage SaaS application
  • Reporting and analytics to easily view risk exposures and monitor progress
  • Real results through a simplified enterprise- grade solution that delivers 18 templates and runs up to 12 scenarios per year
  • Mimics real-life attack tactics with threat-based scenario content and training templates for end users
  • Full access to PhishMe CBT modules, including four compliance modules and 17 interactive modules covering today’s biggest threats

“Today, small businesses are just as likely to be targeted by cyberattacks as large enterprises but the financial and reputation damages could be much more devastating,” notes Scott Crawford, research director for information security with 451 Research. “With organizations like PhishMe providing strong anti-phishing solutions catered to SMBs at no cost, more organizations can take the necessary steps to fortify their defenses to reduce the chances of phishing related breaches.”

Also included in the PhishMe Free license is access to PhishMe Community, an online customer portal where users can discuss product issues with PhishMe representatives and exchange ideas with fellow users, receive product support, access PhishMe’s exhaustive knowledge base, and learn more about the exciting things happening in the world of PhishMe.

For more information about PhishMe Free, please visit: https://phishme.com/pm-free.

 

About PhishMe

PhishMe is the leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today’s top attack vector — spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report and mitigate spear phishing, malware and drive-by threats. Our open approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization’s security decision-making process. PhishMe’s customers include the defense industrial base, energy, financial services, healthcare and manufacturing industries, as well as other Global 1000 entities that understand how changing user security behavior will improve security, aid incident response and reduce the risk of compromise.

 

References:

[1] PhishMe, “PhishMe 2016 Enterprise Phishing Susceptibility and Resiliency Report”

[2] Ponemon Institute, “2016 State of Cybersecurity in Small and Medium-Sized Business,” June 2016.

[3] Ponemon Institute, “2016 State of Cybersecurity in Small and Medium-Sized Business,” June 2016.

Even the “Smart Ones” Fall for Phishing

It’s easy to believe that phishing only happens to people who aren’t smart enough to detect it. This simply isn’t true. As the tech-savvy developers at software company a9t9 have indicated in their statement[1] about a phishing incident last week, even smart developers can be fooled with a phish.

As reported by Tripwire, a Chrome plugin developer fell for a phishing attack that allowed the threat actor to take control of a9t9’s account in the Chrome Store.  This means that the Copyfish plugin built by a9t9 was no longer under its control.  Meanwhile, the plugin has already been used to “insert ads/spam into websites” according to the statement by a9t9.

The original phishing message that lured the developer carried a link on the URL shortening service called Bit.ly.  As Tripwire explained, the victim did not notice the odd link because he was viewing the message in webmail.  However, in the screenshot of the message in its text format, the Bit.ly link is clearly-visible.  One of the great features of Bit.ly for those creating “bitlinks” is that you can view statistics about the locations and user agents of who clicks on your link.  Others can also see a few stats by appending a plus (+) sign to the end of the URL.  Below is what we saw when we did this:

The stats tell us that the bitlink was created on July 28th and leads to a URL on rdr11.top, a domain first registered on that same day via NameCheap but under privacy protection.  Once the victim clicked on the link, he was redirected to the rdr11.top URL which itself then redirected to a URL on chrome-extensions.top, to the page[2] seen below:

The domain chrome-extensions.top was also registered via NameCheap using privacy protection on July 28th.

The rdr11.top and chrome-extensions.top hosts resolve to Saint Petersburg, Russia, IP address 31.186.103.146, part of a /23 net block owned by Moscow Selectel Service.

Also known to resolve to have resolved to 31.186.103.146 is the domain chrome-extensions.pro, registered July 21st with NameCheap, using privacy protection.

A third resolution to the same IP, 31.186.103.146, was the phishy-sounding domain cloudflaresupport.site, also registered via NameCheap under privacy protection, on July 18th.  A similar domain, cloudflaresupport.info, was registered with NameCheap on June 21st and even used the Cloudflare service for phishing Cloudflare accounts, but it is now under Cloudflare’s control.  See the tweet[3] below that included screenshots of the phishing message and spoofed Cloudflare login page:

 

In the Comments of that tweet are screenshots showing further redirection to a Google login phishing page on webstoresupport.top, registered with NameCheap using privacy protection on June 20th.  Other comments reveal that on June 21st CloudFlare actively engaged the customer support software ticketing service being used by the threat actor to send the phishing messages, FreshDesk.  However, a9t9’s statement mentions that FreshDesk was still being used on July 28th when the a9t9 developer was lured in by a phishing email message.

Bottom-line

There are some lessons that can be learned about two factor authentication for such important accounts as your Chrome Store or Cloudflare logins; however, the main issue here is that the victim was not even thinking about the possibility of phishing while responding to his email messages. Phishing, now commonly used against all types of accounts and for increasingly-creative purposes, is known to be the number one way that attackers breach our critical processes, steal our intellectual property, and bring businesses to a screeching halt.  We can also thank a9t9 for owning up to its mistakes so that we can all learn from them.  Their share helps us to connect the dots and discover more about the phisher and his methods and infrastructure.

You can use PhishMe to make sure your employees know how to recognize, report, and respond to these growing threats.

References:

[3] https://twitter.com/LawrenceAbrams/status/877666254974316544

[2] hxxps://login.chrome-extensions.top/ServiceLogin/?https://accounts.google.com/ServiceLogin?service=chromewebstore&passive=1209600&continue=https://chrome.google.com/webstore/developer/dashboard&followup=https://chrome.google.com/webstore/developer/dashboard

[1] https://a9t9.com/blog/chrome-extension-adware/

Threat Actors Use Advanced Delivery Mechanism to Distribute TrickBot Malware

Threat actors’ consistent pursuit of improved efficiency is a key characteristic of the phishing threat landscape. One method for improving efficiency is to use a unique delivery technique that not only allows threat actors to distribute malware but also succeeds in evading anti-virus software and technologies.

Ribbon Cutting – Running Macros with CustomUI Elements

PhishMe® Research has generally seen macro execution in PowerPoint tied to specific actions and events, such as a mouse interaction with an object or custom actions. But the “Ribbon Cutting” technique uses a different method; it runs macro code by creating a UI callback that is triggered when the file is opened. Although in the example below we use PowerPoint, the technique can be used in other Office applications that support ribbon customizations.

Threat Actor Employs Hawkeye Malware with Multiple Infection Vectors

On July 13, 2017, the Phishing Defense Center reviewed a phishing campaign delivering Hawkeye, a stealthy keylogger, disguised as a quote from the Pakistani government’s employee housing society. Although actually a portable executable file [1], once downloaded, it masquerades its icon as a PDF. 

Karo Ransomware Raises Stakes for Victims by Threatening to Disclose Private Information

A ransomware victim must have a compelling reason to go through the burdensome process of obtaining Bitcoin and paying the ransom. For many victims, the threat of permanently losing access to their files is enough. However, some ransomware authors and criminals seek to push victims harder by raising the stakes even further.