Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Hacker-for-hire Group Develops New Stealthy Windows Backdoor

Hacker-for-hire Group Develops New Stealthy Windows Backdoor

Kaspersky researchers discovered a previously undocumented Windows PowerShell malware dubbed PowerPepper and developed by the hacker-for-hire group DeathStalker.

DeathStalker (previously known as Deceptikons) is a threat actor whose activity goes back to at least 2012 [1, 2] known for using a wide range of malware strains and complex delivery chains, as well as regularly using tactics that help them evade detection.

The group’s targeting has involved organizations and businesses from all over the world from finance companies to law offices, with no specific motivation, which led to its classification as a group of cyber-mercenaries.

DeathStalker is one of four hacker-for-hire groups exposed in 2020, together with BellTrox (also tracked as Dark Basin), Bahamut, and CostaRicto.

DeathStalker fingerprints

The new PowerPepper implant was discovered by Kaspersky in May 2020 while researching other attacks using the group’s other PowerShell-based implant known as Powersing.

Since its discovery, PowerPepper has been under constant development with new versions being deployed and its delivery chains being adapted to new targets.

This new malware is an in-memory Windows PowerShell-based backdoor that allows its operators to execute shell commands delivered remotely via a command-and-control (C2) server.

Also Read: Computer Misuse Act Singapore: The Truth And Its Offenses

Its capabilities include several anti-detection tactics such as “mouse movements detection, client’s MAC addresses filtering, Excel application handling, and antivirus products inventory.”

PowerPepper implant
PowerPepper implant (Kaspersky Lab)

The malware is delivered onto targets’ computers in the form of spear-phishing email malicious attachments or links that point to documents containing malicious Visual Basic for Application (VBA) macros that execute PowerPepper and gain persistence on infected systems.

“This infection chain varied slightly between July and November 2020: some dropped file names, integrated code or remote links changed, but the logic stayed the same,” Kaspersky Lab researcher Pierre Delcher explained.

Its macro-based and LNK-based delivery chains also have DeathStalker’s fingerprints on them with multiple obfuscation, execution, and masquerading tricks being employed to evade detection.

PowerPepper’s delivery chain evasion tricks include:

  • hiding payloads in Word embedded shapes properties
  • using Windows Compiled HTML Help (CHM) files as archives for malicious files
  • masquerading and obfuscating persistent files
  • hiding payloads within images using steganography
  • getting lost in Windows shell commands translation
  • executing via a signed binary proxy execution

DNS over HTTPS for C2 comms

What stands out in its list of features is the way it communicates with its C2 server using Cloudflare responders via DNS over HTTPS (DoH) channels.

“PowerPepper first tries to leverage Microsoft’s Excel as a Web client to send DoH requests to a C2 server, but will fall back to PowerShell’s standard Web client, and ultimately to regular DNS communications, if messages cannot go through,” Delcher said.

The malware polls the C2 server for commands periodically using TXT-type DNS requests via DoH (or regular DNS when DoH fails) to the C2’s name servers.

The C2 server sends the encrypted commands to be executed embedded within a DNS response for targets validated via HTTPS after PowerPepper successfully starts on a compromised target.

PowerPepper DoH C2 comms
PowerPepper C2 communication via DoH (Kaspersky Lab)

“It only seems fair to write that DeathStalker tried hard to develop evasive, creative, and intricate tools with this PowerPepper implant and associated delivery chains,” Delcher concluded.

Also Read: Personal Data Websites: 3 Things That You Must Be Informed

“Nothing is specifically sophisticated in techniques and tricks that are leveraged, yet the whole toolset proven itself to be effective is pretty well put together, and shows determined efforts to compromise various targets around the world.”

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us