YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Malware Repurposes Legit Apps for Cyber-espionage

Posted On 09 May 2017
By : Marty O'Brien

More than 500 government organizations worldwide have been infected with a piece of malware designed to collect sensitive data.More than 500 government organizations worldwide have been infected with a piece of malware designed to collect sensitive data. Until recently, their IT staffs didn’t realize they were the victims of cyber-espionage.

The culprit, Netrepser, differs from the majority of Trojans in that it infiltrates legitimate apps, hiding in plain sight while it steals information from high-level targets. Then, it covers its tracks using common utilities already on many computer networks.

Researchers at Bitdefender Labs accidentally uncovered the bug in May 2016 while examining a custom file-packing algorithm. A year later, they’ve unpacked the code, leading to a particularly chilling analysis: The payload is detected by antimalware systems, but even the most sophisticated label Netrepser a “potentially unwanted application” rather than dangerous. Because antimalware systems do not automatically disable PUAs, if the user ignores the warning, Netrepser recruits the compromised computer into a botnet network.

Typically, “a system administrator seeing an alert from the antivirus [software] about a PUA tool will have little to nothing to worry about,” said Bitdefender Senior E-threat Analyst Bogdan Botezatu.

The malware’s “unusual build could have easily made it pass for a regular threat like many of those that organizations block on a daily basis; however, telemetry information provided by our event correlation service has pointed out that most of its victims are government agencies,” the research team wrote in a blog post. “Paired with advanced spear phishing techniques and the malware’s primary focus to collect intelligence and exfiltrate it systematically, we presume that this attack is part of a high-level cyber-espionage campaign.”

According to the team, the malware undertakes a variety of activities, including keylogging and theft of passwords and cookies. After completing its dirty work, Netrepser employs legitimate, widely used utilities like Sysinternal SDelete to obscure forensic evidence, making tracing the attack to its source impossible.

The Trojan “is built around a legitimate, yet controversial, recovery toolkit provided by Nirsoft,” the researchers noted. “The controversy stems from the fact that the applications provided by Nirsoft are used to recover cached passwords or monitor network traffic via powerful command-line interfaces that can be instructed to run completely covertly. For a long time now, the antimalware industry has flagged the tools provided by Nirsoft as potential threats to security specifically because they are extremely easy to abuse and oversimplify the creation of powerful malware.”

According to the Bitdefender team, the hackers behind the attack delivered Netrepser using weaponized rich-text format (RTF) documents attached to emails. A similar method was used in a rash of advanced persistent threat (APT) attacks against human rights groups in Taiwan and Hong Kong and journalists in East Asia that took place in April 2016.

The delivery email message “purportedly comes from a Donald Spencer, who, according to this LinkedIn profile, is currently the Managing Director of Siguler Guff,” the Bitdefender researchers wrote in a whitepaper analyzing Netrepser. “Siguler Guff is a multi-strategy private equity investment firm which, by their own account, has over $11 billion of assets under management. Their real-estate portfolio spans from Mumbai to Moscow, where Drew Guff actually gave a speech at St. Petersburg International Economic Forum in June ’16.

“The headers reveal that the email originates from an inbox called piskulov@rp.co.ru,” the analysis continued. “Attached to the message is a DOC file containing a Visual Basic macro. If opened, the document would ask the user to enable macros in order to execute the dynamic content which would subsequently drop a JavaScript or JavaScript Encoded file to act as final payload.”

The Bitdefender researchers stopped short of accusations, but they noted evidence suggests the engineers behind the widespread government attacks may be Russian. Some file paths used by the Trojan were written in Cyrillic script, and what appeared to be Russian names embedded in the RTF documents actually translated to words like “installation” and “Ural.” In addition, analysis of the keylogger indicated some stolen information is sent to three email addresses in a Russian domain.

 

About the Author
Raised in the Appalachian Mountains of Kentucky, Marty O'Brien was the first of the O'Brien clan to obtain a college degree. A former sports journalist, O'Brien got a peek at the inner workings of the adult entertainment industry while on an assignment to cover the Los Angeles Lakers. He joined the YNOT editorial team in late 2010 and now specializes in technology , business news and ogling starlets.
  • google-share
Previous Story

Porn Drives Tech Not a Secret — and Not Entirely True

Next Story

7 Ways Daily Sex Can Change More than Your Sex Life

Related Posts

Report: Cryptominers Overtakes Ransomware As #1 Threat

Posted On 18 Apr 2018
, By GeneZorkin

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • The European Summit
    Industry Trade Show & Events
  • Mobile App Development Company in Noida
    Software & Scripts
  • Buy My Kiss
    Webcam Studios
  • Premiere Listing

    Clickadu – Your trusted traffic souce

    More Details

RECENT

POPULAR

COMMENTS

Beth McKenna Announces Latest Collaboration with "College Girls Reunion"

Posted On 16 Jun 2025

Ricky’s Room Bows Stunning New Anna Claire Clouds DP Scene

Posted On 16 Jun 2025

Ria Bentley Unveils Hot New Scene with Masculine Jason

Posted On 16 Jun 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Sex Toy Collective Dildo Sculptor

Posted On 19 Mar 2019

Find a good sex toy is now a problem,...

Posted On 18 Mar 2024

Thanks to the variety of sex toys, I can...

Posted On 02 Feb 2024

I understand the concerns about...

Posted On 05 Jan 2024

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy