Connect with us

Hi, what are you looking for?

HEADLINES

Cloud Atlas APT upgrades its arsenal with polymorphic malware

Cloud Atlas is a threat actor that has a long history of cyber-espionage operations targeting industries, government agencies and other entities. It was first identified in 2014 and has been active ever since.

Photo by Taskin Ashiq from Unsplash.com

Cloud Atlas, an advanced persistent threat (APT), also known as Inception, has updated its attack arsenal with new tools which allow it to avoid detection through standard Indicators of Compromise. This updated infection chain has been spotted in the wild in different organizations in Eastern Europe, Central Asia and Russia.

Cloud Atlas is a threat actor that has a long history of cyber-espionage operations targeting industries, government agencies and other entities. It was first identified in 2014 and has been active ever since. Recently, Kaspersky researchers have seen Cloud Atlas targeting the international economics and aerospace industries as well as governmental and religious organizations in Portugal, Romania, Turkey, Ukraine, Russia, Turkmenistan, Afghanistan and Kyrgyzstan among other countries. Upon successful infiltration, Cloud Atlas would:

  • collect information about the system to which it has gained access
  • log passwords
  • exfiltrate recent .txt .pdf. xls .doc files to a command and control server.

While Cloud Atlas hasn’t dramatically changed its tactics, since 2018, recent waves of attacks research has discovered it has started to implement a novel way of infecting its victims and conducts lateral movement through their network.

https://lh3.googleusercontent.com/r1xROVxQRGtTPVHPGCm503lKx7ZIBJCxA_57QJ-vcf7POK1SIVisEl-zcs_Jm5qlp5q1PbsBuTtRGSJh-7VntGxIUiYspkhFsEjenjVCktqp_2TC4XGPG6DIDtJaYlky8juGUqEp

Fig.1: The infection chain that was used by Cloud Atlas before April 2019.

Previously, Cloud Atlas would first send a spear-phishing email with a malicious attachment to a target. In the case of a successful exploitation, PowerShower – the attached malware, used for initial reconnaissance and to download additional malicious modules – would then be executed to allow cyberattackers to proceed with an operation.

The newly updated chain of infection postpones the execution of PowerShower until a later stage; instead, after the initial infection, a malicious HTML app is now downloaded and executed on the target machine. This application will then collect initial information about the attacked computer, and download and execute VBShower – another malicious module. VBShower then erases evidence of the presence of malware in the system and consults with its masters through command and control servers, to decide on further actions. Depending on the command received, this malware will then download and execute either PowerShower or another well-known Cloud Atlas’ second stage backdoor.

https://lh4.googleusercontent.com/p8N7gv_3PJqNy19O6ylS6h1fvh-q3gGQ809ZR1dm_d3kcuYir49uyEbQjaXUY6LLZn-j_XwLmD6-dZj9TJpZtNY67FtKC9UdkzSPJuJcr5_EhUKTmt8ok2qZ01Jfp9TUd94nWY7Y

Fig 2. The updated Cloud Atlas infection chain

While this new infection chain is in general much more complicated than the previous model, its main differentiator is the fact that a malicious HTML application and the VBShower module are polymorphic. This means that the code in both modules will be new and unique in each case of infection. According to Kaspersky experts, this updated version is carried out in order to make the malware invisible to security solutions relying on familiar Indicators of Compromise.

Advertisement. Scroll to continue reading.

“It has become good practice in the security community to share the Indicators of Compromise (IoC) of malicious operations we find through research. This practice allows us to respond to ongoing international cyber-espionage operations quite swiftly, preventing any further damage they could cause. However, as we predicted as early as 2016, IoC have become obsolete as a reliable tool to spot a targeted attack in your network, “ said Felix Aime, security researcher, Kaspersky Global Research and Analysis Team.

 “This first emerged with ProjectSauron, which would create a unique set of IoC for each of its victims and continued with the trend of using open source tools in espionage operations instead of unique ones. This is now continuing with this recent example of polymorphic malware. This doesn’t mean that actors are becoming harder to catch, but that security skills and the defenders toolkit needs to evolve along with the toolkit and skills of the malicious actors they are tracking,” Aime added.

Kaspersky recommends that organizations use anti-targeted attack solutions enhanced with Indicators of Attack (IoA) that focus on the tactics, techniques or actions that malefactors may take when preparing for an attack. IoAs track the techniques deployed, no matter what specific tools are used. The latest versions of Kaspersky Endpoint Detection and Response, and Kaspersky Anti Targeted Attack both feature a new database of IoAs, maintained and updated by Kaspersky’s own expert threat hunters.

Other recommendations for organizations from Kaspersky:

  • Educate your staff on digital hygiene and explain how they can recognize and avoid potentially malicious emails or links. Consider introducing dedicated awareness training for employees
  • Use an endpoint security solution fitted with anti-spam and anti-phishing components, as well as application control functionality with a default deny mode to block the execution of unauthorized applications — such as Kaspersky Endpoint Security for Business
  • For endpoint level detection, investigation and timely remediation of incidents, implement an EDR solution such as Kaspersky Endpoint Detection and Response, to catch even unknown banking malware
  • Implement a corporate-grade security solution that detects advanced threats on the network at an early stage, such as Kaspersky Anti Targeted Attack Platform
  • Integrate threat intelligence into your Security Information and Event Management (SIEM) services  and security controls, in order to access the most relevant and up-to-date threat data.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

In a new report covering Q2 2024 – Q1 2025, Kaspersky has found over 250,000 cyberattacks disguised as popular anime among other shows and streaming platforms...

HEADLINES

From January to December 2024, Kaspersky solutions used by businesses here detected and blocked more than 53 million bruteforce attacks. 

HEADLINES

According to Kaspersky experts, 2024 saw over 3 billion malware attacks globally, with a daily average of 467,000 malicious files detected. Windows systems were...

HEADLINES

Cybercriminals target SMBs, schools, and other smaller organizations because they often have less robust security compared to large corporations and other institutions. 

HEADLINES

Sophos Counter Threat Unit revealed the NICKEL TAPESTRY threat group’s scheme involving fraudulent workers operating on behalf of North Korea (formally known as the...

HEADLINES

PRSP is a staunch advocate of communication based on honesty and integrity. While our role is to uphold and strengthen the reputation of our...

HEADLINES

Poor password management is compounded by a reliance on common combinations of names, dictionary words and numerals. Not only are these passwords relatively easy...

White Papers

This demonstrates that despite a slight improvement from last year, cybersecurity preparedness remains low as hyperconnectivity and AI introduce new complexities for security practitioners.

Advertisement