HomeCyber BalkansNew I2PRAT Malware Utilizing encrypted peer-to-peer communication to Avoid Detection

New I2PRAT Malware Utilizing encrypted peer-to-peer communication to Avoid Detection

Published on

spot_img

The cybersecurity landscape is facing a new and sophisticated threat in the form of a malware strain called “I2PRAT.” This malware utilizes encrypted peer-to-peer communication via the Invisible Internet Project (I2P) network, making it incredibly difficult to detect and trace.

First brought to light by researcher Gi7w0rm on November 19, I2PRAT has raised serious concerns within the global cybersecurity community due to its advanced infection chain and innovative evasion techniques.

One of the standout features of I2PRAT is its use of I2P, an encrypted P2P overlay network designed for anonymous communication. This network obscures the source and destination of data, making it incredibly challenging for security tools to intercept or trace the malicious traffic.

The malware leverages I2PD, an open-source I2P client, to establish covert command-and-control channels, allowing it to exfiltrate data and receive commands without detection. This stealthy approach to communication sets I2PRAT apart from traditional malware strains that rely on more easily traceable C2 methods.

The infection chain of I2PRAT begins with targeted phishing emails that lure victims into clicking on malicious links that lead to fake CAPTCHA verification pages. These pages use deceptive JavaScript to trick users into executing a malicious PowerShell script, which then downloads the first-stage malware loader. This loader disables Windows Defender and deploys further malicious payloads, setting the stage for a sophisticated and persistent attack.

Key steps in the infection chain include disabling Windows Defender to bypass antivirus protections, deploying Windows Filtering Platform (WFP) filters to block security updates, installing a Remote Access Trojan (RAT) as a system service, and establishing encrypted C2 communication through I2P.

I2PRAT incorporates multiple layers of obfuscation and defense evasion tactics to evade detection. For example, it deploys batch scripts to disable Microsoft Defender updates, excludes key directories from scans, and uses WFP filters to block telemetry data from Microsoft’s security cloud, rendering the infected device vulnerable and blind to updates.

Additionally, the malware employs a clever trick by creating a hidden directory that mimics the “My Computer” system shortcut, making its files difficult to locate. Permissions within this directory are restricted using utilities like icacls.exe, further concealing the malware’s presence.

At the core of I2PRAT is a modular RAT that uses plugins to deliver various malicious functionalities. Communication with the C2 infrastructure is encrypted and anonymized through I2P, allowing threat actors to issue commands, exfiltrate data, and deploy additional payloads while evading traditional network monitoring.

The use of encrypted P2P communication highlights an alarming evolution in cyber threats, as malware developers increasingly turn to networks like I2P to outmaneuver cybersecurity defenses. This trend underscores the need for organizations to adopt advanced threat detection systems, implement robust email security protocols, and provide end-user awareness training to mitigate the risk of successful exploits.

The cybersecurity community is actively analyzing I2PRAT to develop effective countermeasures, but the malware’s use of encrypted P2P communication poses a significant challenge for detection and mitigation efforts. As threats like I2PRAT continue to evolve, it is crucial for organizations to stay vigilant and proactively protect their networks and systems against sophisticated cyberattacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...