HomeCyber BalkansResearchers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Researchers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Published on

spot_img

Zloader, a notorious Trojan, has undergone significant enhancements in its latest version, 2.9.4.0, which have heightened its stealth capabilities and destructive potential. The introduction of a custom DNS tunnel for covert command and control (C2) communications has allowed this malware to bypass traditional network security measures, posing a serious threat to organizations globally.

With the addition of an interactive shell, cyber attackers now have precise control over infected systems, enabling sophisticated attacks such as ransomware deployment. Zloader’s continuous evolution, including the implementation of refined anti-analysis techniques and targeted attack strategies, has made it a persistent and formidable adversary in the cybersecurity landscape.

In a shift from large-scale spam campaigns, Zloader is now predominantly involved in smaller, targeted attacks. One common tactic observed is the use of voice-based phishing techniques, often as part of a multi-stage infection chain that leverages popular remote monitoring and management (RMM) tools like AnyDesk, TeamViewer, and Microsoft Quick Assist.

GhostSocks, a newly identified payload, appears to play a crucial role in this infection chain, indicating the evolving nature of cyber threats. Attackers are increasingly relying on sophisticated methods to evade traditional security defenses and deploy malicious payloads like Zloader.

The latest version of Zloader, 2.9.4.0, employs XOR operations to derive the RC4 key for decryption. Moreover, it utilizes DNS tunneling through a custom protocol embedded in DNS records, along with fallback DNS servers for C2 communication. These advanced techniques help Zloader evade detection and maintain covert communication channels.

To further enhance its evasion capabilities, Zloader now employs a dynamic method for environment checks, ensuring that it can identify and terminate sandbox environments. During the infection process, it modifies the executable to incorporate unique identifiers and hashes, thus complicating detection and analysis by security researchers.

Zloader’s API resolution has also evolved, now utilizing a modified CRC algorithm and XOR operations to dynamically calculate DLL indices. Additionally, the introduction of an interactive shell with various commands for remote execution of binaries, shellcode, file transfers, process management, and directory navigation enables threat actors to carry out complex operations on compromised systems.

According to reports from Zscaler, Zloader primarily uses HTTPS with POST requests for its C2 communication, encrypting the traffic using Zeus VisualEncrypt and RC4 key. The malware also employs a custom protocol layered on top of DNS, allowing it to construct its own DNS packets for stealthy communication.

The increasing use of DNS tunneling by Zloader underscores the ongoing efforts of threat actors to evade detection and establish persistent communication channels for malicious activities. Organizations are advised to bolster their security measures by monitoring and inspecting both web and DNS traffic to mitigate the risks posed by such advanced malware strains.

In conclusion, the evolving capabilities of Zloader highlight the need for continuous vigilance and robust cybersecurity defenses to combat advanced threats. By staying informed about the latest tactics employed by malware developers and adopting proactive security measures, organizations can better protect their networks and mitigate the impact of ransomware attacks and other malicious activities.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...