Iran cyberspies LARPing as ransomware crims in espionage ops

Security

MOIS-linked cyber outfit puts on a ransomware show to disguise the wide-open backdoor behind the scenes

Researchers at Rapid7 say that they have spotted what they believe was an Iranian intelligence cyber unit masquerading as the Chaos ransomware gang to hide a state-sponsored espionage operation.

The intrusion was spotted earlier this year, and investigators say breadcrumbs left behind give them “medium confidence” in saying it was the work of MuddyWater, which has been linked to intrusions affecting Western government and banking networks in recent months.

Attackers began with a Microsoft Teams phishing campaign, which is not uncommon. They also encouraged targets to share their screens. Again, it was nothing too out of the ordinary.

However, what must have required some expert persuasion work was that they convinced these individuals to enter their credentials into local text files, and even modify MFA settings to allow attacker-controlled devices to complete authentication.

Rapid7 researchers Alexandra Blia and Ivan Feigl wrote: “While connected, the [threat actor (TA)] executed basic discovery commands, accessed files related to the victim’s VPN configuration, and instructed users to enter their credentials into locally-created text files. 

“In at least one instance, the TA also deployed a remote management tool (AnyDesk) to further facilitate access.”

From there, browser artifacts suggested that attackers lifted credentials through phishing pages. At least one mimicked a Microsoft Quick Assist page.

Armed with valid credentials, the attackers then executed various commands via RDP, which downloaded payloads using curl. These payloads included a backdoor malware dubbed Darkcomp, a malicious Microsoft WebView2 loader to disguise traffic, and an encrypted configuration file that sent instructions to Darkcomp.

Then it was a case of performing lateral movement by using additional compromised accounts and scooping up sensitive data along the way. 

The attackers used the same accounts to send emails internally notifying organization leaders about the intrusion and data theft, and included an onion link leading to Chaos ransomware’s data leak site (DLS), where a corresponding entry appeared with all data redacted and hidden behind a countdown timer.

Follow-up emails aimed to build the illusion of a genuine ransomware attack, although the illusion was short-lived. 

The attackers instructed recipients to look for a file containing “access credentials” they could use to begin ransom negotiations. Unlike the plaintext credential files the attackers had socially engineered the original targets into creating, this file did not actually exist. There was no way to contact the attackers, whereas in a typical scenario the intruders would be looking for a payout.

There was also no file encryption, which is inconsistent with Chaos affiliates’ typical way of working.

“Despite these inconsistencies in the initial proof-of-compromise, the TA later published the stolen data on its DLS in line with modern extortion tactics,” Blia and Feigl wrote. “The leaked data was assessed to be legitimate.”

If not for financial gain, then what?

MuddyWater – if that is indeed the group behind this – did not extort the organizations in question, nor did they deploy a ransomware payload, but they did pose as an established ransomware group.

Rapid7 believes the group did this as an extension of its false-flag operations to provide a plausible front for cyberespionage activity, or preposition work to underpin potential destructive cyberattacks.

It wouldn’t be the first time MuddyWater or Iranian intelligence (MOIS) was found LARPing as a ransomware crew. Both have previously been linked to an attack on an Israeli hospital, allegedly carried out by a Qilin affiliate.

“Following the subsequent public attribution of that incident to the MOIS, it is plausible that the group adopted alternative ransomware branding, in this case Chaos, in an effort to reduce attribution risk and maintain a degree of plausible deniability,” said the researchers.

The unique benefits of masquerading as ransomware crooks include muddying attribution for attacks by leaving behind ransomware breadcrumbs, as well as redirecting defensive efforts toward locating signs of ransomware deployment instead of the backdoors that underpin espionage activity. ®

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *