HomeCyber BalkansOilRig C#/.NET Backdoor Targeting Diverse Industries for Attacks

OilRig C#/.NET Backdoor Targeting Diverse Industries for Attacks

Published on

spot_img

The Iranian cyberespionage group, OilRig (APT34), has been actively operating since 2014, targeting various Middle Eastern governments and industries. These industries include chemical, energy, finance, and telecom. In their recent campaigns, OilRig launched DNSpionage in 2018-2019 against Lebanon and the UAE, followed by the 2019-2020 HardPass campaign, which used LinkedIn to target the energy and government sectors.

According to cybersecurity researchers at ESET, two new campaigns by OilRig have been identified and analyzed. These campaigns are named Outer Space (2021) and Juicy Mix (2022). Unlike their previous campaigns, these two campaigns specifically targeted Israeli organizations, showing a shift in the group’s focus to the Middle East. The attacks were carried out through infiltration via legitimate websites, and the group employed VBS droppers to deploy C#/.NET backdoors and post-compromise data tools.

The Outer Space campaign utilized an Israeli HR site as a command-and-control (C&C) server for the Solar backdoor. The Solar backdoor led to the SC5k downloader, while MKG was used for browser data exfiltration. On the other hand, the Juicy Mix campaign, launched in 2022, used upgraded tools to compromise a job portal for C&C, followed by an attack on an Israeli healthcare organization using the Mango backdoor, browser-data dumpers, and a Credential Manager stealer.

Both campaigns employed VBS droppers, most likely delivered through spear-phishing emails, to gain access to the targeted systems. These droppers installed the Mango or Solar backdoors and connected to the C&C server. The embedded backdoor utilized base64 encoding and simple string deobfuscation techniques to conceal its presence. Additionally, the droppers scheduled the backdoors to run at regular intervals and sent the compromised computer’s name to the C&C server via a base64-encoded POST request.

In the Outer Space campaign, OilRig used the Solar backdoor, which is a versatile tool capable of downloading and executing files, as well as autonomously exfiltrating staged data. However, in the Juicy Mix campaign, Solar was replaced with the Mango backdoor. Mango shared similar functionalities with Solar but featured some significant distinctions. One such difference was the replacement of Solar’s Venus task with a new exfiltration command in Mango.

Along with the backdoors, OilRig used post-compromise tools to further exploit the compromised systems. These tools include the SC5k downloader, which is used for downloading additional payloads, browser-data dumpers for collecting sensitive information from web browsers, and a Windows Credential Manager stealer for stealing user credentials.

OilRig’s evolution from Solar to Mango signifies their advancement in post-compromise techniques. While they still rely on conventional methods for user data collection, they also employ specialized technologies to enhance their capabilities.

In conclusion, OilRig’s recent campaigns targeting Israeli organizations demonstrate their continued cyberespionage activities in the Middle East. Their utilization of VBS droppers, backdoors, and post-compromise tools highlights their sophistication and evolving techniques. It is crucial for organizations in the targeted industries to stay vigilant and implement robust cybersecurity measures to defend against such attacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...