Trend Micro Fixes Bug Chinese Hackers Exploited for Espionage
Trend Micro says it patched a DLL hijacking flaw in Trend Micro Security used by a Chinese threat group to side-load malicious DLLs and deploy malware.
As Sentinel Labs revealed in an early-May report, the attackers exploited the fact that security products run with high privileges on Windows to plant and load their own maliciously crafted DLL into memory, allowing them to elevate privileges and execute code.
“Trend Micro is aware of some research that was published on May 2, 2022, regarding a purported Central-Asian-based threat actor dubbed ‘Moshen Dragon’ that had deployed malware clusters that attempted to hijack various popular security products, including one from Trend Micro,” the cybersecurity company said.
After analyzing the report and its product line, the company discovered that only the Trend Micro Security consumer-focused product was affected, with no other commercial or business products impacted.
Also Read: Browser in the browser attacks: Why you should watch out
“For Trend Micro Security (Consumer), a fix was deployed via Trend Micro’s ActiveUpdate (AU) on May 19, 2022, and any user with an active internet connection should receive the update shortly if they have not yet already received it,” the antivirus vendor added.
DLL hijacking bugs in multiple security products
The Moshen Dragon group also reportedly abused similar bugs in security products from Bitdefender, McAfee, Symantec, and Kaspersky to install Impacket, a Python kit designed for lateral movement and remote code execution via Windows Management Instrumentation (WMI).
Impacket also has credential-stealing capabilities powered by an open-source tool used to capture the details of password change events on a domain
According to Sentinel Labs, the final payloads dropped by the Moshen Dragon operators include variants of PlugX and ShadowPad, two backdoors used by multiple Chinese APTs in recent years.
The threat actors have used these tactics to target telecommunication service providers in Central Asia with the end goal of exfiltrating data from as many systems as possible.
While Trend Micro has published an advisory detailing the mitigation measures taken to stop Moshen Dragon from abusing its security products for malicious products, the other vendors are yet to confirm if their products have been affected and if the bugs have been patched.
BleepingComputer has reached out to spokespersons from Bitdefender, McAfee, Symantec, and Kaspersky for comment but has yet to receive a reply.
Also Read: Cybersecurity for SMEs: What employees should know
Update May 2, 15:06 EDT: Steve Fiore, Bitdefender’s Senior Director for Global Public Relations, told BleepingComputer after the article was published that the company’s customers are protected against DLL Search Order Hijacking attacks and there was no need to issue a security advisory.
Adversaries use DLL Search Order Hijacking to execute malicious payloads by taking control of the search order used to load dynamic-link libraries. The most serious result using this technique would be adversaries using antivirus to bypass file execution restrictions and gain privilege escalation.
This is not the case with Bitdefender, we have no information pertaining to our installed product being compromised by the threat actor, our customers and partners are protected from privilege escalation in this campaign. Bitdefender is not vulnerable to these types of attacks. We employ technology called Self-Protect as an added security layer to guard our product data (files, registries etc.). Even if an attacker discovers an unknown vulnerability, they are denied access to external non-Bitdefender processes preventing exploitation.
The second DLL Search Order Hijacking attack vector adversaries commonly use involves using antivirus as a masking technique for inserting malicious code using digitally signed binaries to gain trust from the target system. Customers and partners running the latest version of Bitdefender products are protected. We did not issue a security advisory because it was not needed – we answered questions directly if asked by a customer.