- Executive Summary
- Anatomy of the attack
- Sinkhole statistics
- KSN + sinkhole data
- С&C information
In October 2012, Kaspersky Lab’s Global Research & Analysis Team initiated a new threat research after a series of attacks against computer networks of various international diplomatic service agencies. A large scale cyber-espionage network was revealed and analyzed during the investigation, which we called “Red October” (after famous novel “The Hunt For The Red October”).
This report is based on detailed technical analysis of a series of targeted attacks against diplomatic, governmental and scientific research organizations in different countries, mostly related to the region of Eastern Europe, former USSR members and countries in Central Asia.
The main objective of the attackers was to gather intelligence from the compromised organizations, which included computer systems, personal mobile devices and network equipment.
The earliest evidence indicates that the cyber-espionage campaign was active since 2007 and is still active at the time of writing (January 2013).
Besides that, registration data used for the purchase of several Command & Control (C&C) servers and unique malware filenames related to the current attackers hints at even earlier time of activity dating back to May 2007.
Advanced Cyber-espionage Network: The attackers have been active for at least several years, focusing on diplomatic and governmental agencies of various countries across the world.
Information harvested from infected networks was reused in later attacks. For example, stolen credentials were compiled in a list and used when the attackers needed to guess secret phrase in other locations. To control the network of infected machines, the attackers created more than 60 domain names and several server hosting locations in different countries (mainly Germany and Russia). The C&C infrastructure is actually a chain of servers working as proxies and hiding the location of the ‘mothership’ control server.
Unique architecture: The attackers created a multi-functional kit which has a capability of quick extension of the features that gather intelligence. The system is resistant to C&C server takeover and allows the attack to recover access to infected machines using alternative communication channels.
Broad variety of targets: Beside traditional attack targets (workstations), the system is capable of stealing data from mobile devices, such as smartphones (iPhone, Nokia, Windows Mobile), enterprise network equipment (Cisco), removable disk drives (including already deleted files via a custom file recovery procedure).
Importation of exploits: The samples we managed to find were using exploit code for vulnerabilities in Microsoft Word and Microsoft Excel that were created by other attackers and employed during different cyber attacks. The attackers left the imported exploit code untouched, perhaps to harden the identification process.
Attacker identification: Basing on registration data of C&C servers and numerous artifacts left in executables of the malware, we strongly believe that the attackers have Russian-speaking origins. Current attackers and executables developed by them have been unknown until recently, they have never related to any other targeted cyberattacks.
These attacks comprised of the classical scenario of specific targeted attacks, consisting of two major stages:
- Initial infection
- Additional modules deployed for intelligence gathering
The malicious code was delivered via e-mail as attachments (Microsoft Excel, Word and, probably PDF documents) which were rigged with exploit code for known security vulnerabilities in the mentioned applications. In addition to Office documents (CVE-2009-3129, CVE-2010-3333, CVE-2012-0158), it appears that the attackers also infiltrated victim network(s) via Java exploitation (known as the ‘Rhino’ exploit (CVE-2011-3544).
Right after the victim opened the malicious document or visit malicious URL on a vulnerable system, the embedded malicious code initiated the setup of the main component which in turn handled further communication with the C&C servers.
Next, the system receives a number of additional spy modules from the C&C server, including modules to handle infection of smartphones.
The main purpose of the spying modules is to steal information. This includes files from different cryptographic systems, such as “Acid Cryptofiler”, (see https://fr.wikipedia.org/wiki/Acid_Cryptofiler) which is known to be used in organizations of European Union/European Parliament/European Commission since the summer of 2011. All gathered information is packed, encrypted and only then transferred to the C&C server.
During our investigation we couldn’t find any e-mails used in the attacks, only top level dropper documents. Nevertheless, based on indirect evidence, we know that the e-mails can be sent using one of the following methods:
- Using an anonymous mailbox from a free public email service provider
- Using mailboxes from already infected organizations
E-mail subject lines as well as the text in e-mail bodies varied depending on the target (recipient). The attached file contained the exploit code which activated a Trojan dropper in the system.
We have observed the use of at least three different exploits for previously known vulnerabilities: CVE-2009-3129 (MS Excel), CVE-2010-3333 (MS Word) and CVE-2012-0158 (MS Word). The first attacks that used the exploit for MS Excel started in 2010, while attacks targeting the MS Word vulnerabilities appeared in the summer of 2012.
As a notable fact, the attackers used exploit code that was made public and originally came from a previously known targeted attack campaign with Chinese origins. The only thing that was changed is the executable which was embedded in the document; the attackers replaced it with their own code.
The embedded executable is a file-dropper, which extracts and runs three additional files.
%ProgramFiles%WINDOWS NTLHAFD.GCP (<- This file name varies)
MSC.BAT file has the following contents:
attrib -a -s -h -r “%DROPPER_FILE%”
if exist “%DROPPER_FILE%” goto Repeat
Another noteworthy fact is in the first line of this file, which is a command to switch the codepage of an infected system to 1251. This is required to address files and directories that contain Cyrillic characters in their names.
The “LHAFD.GCP” file is encrypted with RC4 and compressed with the “Zlib” library. This file is essentially a backdoor, which is decoded by the loader module (svchost.exe). The decrypted file is injected into system memory and is responsible for communication with the C&C server.
On any infected system, every major task is performed by the main backdoor component. The main component is started only after its loader (“svchost.exe”) checks if the internet connection is available. It does so by connecting to three Microsoft hosts:
Figure – Hosts used to validate internet connection
After the Internet connection is validated, the loader executes the main backdoor component that connects to its C&C servers:
Capture of malware’s communication with the C2
The connections with the C&C are encrypted – different encryption algorithms are used to send and receive data.
Encrypted communication with the C2
During our investigation, we found more than 60 different command-and-control domains. Each malware sample contains three such domains, which are hardcoded inside the main backdoor component:
Hardcoded C2 domains inside backdoor
After a connection with the C&C server is established, the backdoor starts the communication process, which leads to the loading of additional modules. These modules can be split into two categories: “offline” and “online”.
The main difference between these categories is their behavior on the infected system:
- “Offline”: exists as files on local disk, capable of creating its own system registry keys, local disk log files, and may communicate with C&C servers on their own.
- “Online”: exists only in system memory and is never saved to local disk, do not create registry keys, all logs are also kept in memory instead of local disk and sends the result of work to the C&C server using own code.
There is a notable module among all others, which is essentially created to be embedded into Adobe Reader and Microsoft Office applications. The main purpose of its code is to create a foolproof way to regain access to the target system. The module expects a specially crafted document with attached executable code and special tags. The document may be sent to the victim via e-mail. It will not have an exploit code and will safely pass all security checks. However, like with exploit case, the document will be instantly processed by the module and the module will start a malicious application attached to the document.
This trick can be used to regain access to the infected machines in case of unexpected C&C servers shutdown/takeover.
We have identified over 1000 different malicious files related to over 30 modules of this Trojan kit. Most of them were created between May 2010 and October 2012.
There were 115 file-creation dates identified which are related to these campaigns via emails during the last two and a half years. Concentration of file creation dates around a particular day may indicate date of the massive attacks (which was also confirmed by some of our side observations):
Below is a list of sample attachment filenames that were sent to some of the victims:
|FIEO contacts update.xls|
|List of shahids.xls|
|BMAC Attache List – At 11 Oct_v1.XLS|
|Cópia de guia de telefonos (2).xls|
|Programme de fetes 2011.xls|
|12 05 2011 updated.xls|
We used two approaches to identify targets for these attacks. First, we used the Kaspersky Security Network (KSN) and then we set up our own sinkhole server. The data received using two independent ways was correlating and this confirmed objective findings.
The attackers used already detected exploit codes and because of this, in the beginning of the research we already had some statistics of detections with our anti-malware software. We searched for similar detections for the period of 2011-2012.
That is how we discovered more than 300 unique systems, which had detected at least one module of this Trojan kit.
|UNITED ARAB EMIRATES||5|
Countries with more than one infections
Once again, this is based on data from Kaspersky AV products. Apparently, real number and list of victim names is much larger than mentioned above.
During our analysis, we uncovered more than 60 different domains used by different variants of the malware.
Out of the list of domains, several were expired so we registered them to evaluate the number of victims connecting to them.
The following domains have been registered and sinkholed by Kaspersky Lab:
All the sinkholed domains currently point to “220.127.116.11”, which is Kasperskys’ sinkhole server.
During the monitoring period (2- Nov 2012 – 10 Jan 2013), we registered over 55,000 connections to the sinkhole. The most popular domain is “dll-host-update.com”, which is receiving most of the traffic.
From the point of view of country distribution of connections to the sinkhole, we have observed victims in 39 countries, with most of IPs being from Switzerland. Kazakhstan and Greece follow next.
Interestingly, when connecting to the sinkhole, the backdoors submit their unique victim ID, which allows us to separate the multiple IPs per victims.
Based on the traffic received to our sinkhole, we created the following list of unique victim IDs, countries and possible profiles:
|Victim ID||Country||Victim profile|
|0706010C1BC0B9E5B702||Kazakhstan||Gov research institute|
|5D4102CD1D87417FF93B||Russia||Gov research institute|
|5E65486EF8CC4EE4DB5B||Japan||Foreign Trade Commission|
|89BF96469244534DC092||Belarus||Gov research institute|
|947827A169348FB01E2F||Bosnia and Herzegovina||?|
|B6E4946A47FC3963ABC1||Kazakhstan||Energy research group|
|DD767EEEF83A62388241||Russia||Gov research institute|
In some cases, it is possible to create a profile of the victim based on the IP address; in most of the cases, however, the identity of the victim remains unknown.
Some of the victim organizations were identified using IP addresses and public WHOIS information or remote system names.
Most “interesting” out of those are:
|Algeria – Embassy|
|Afghanistan – Gov, Military, Embassy,|
|Armenia – Gov, Embassy|
|Austria – Embassy|
|Azerbaijan – Oil/Energy, Embassy, Research,|
|Belarus – Research, Oil/Energy, Gov, Embassy|
|Belgium – Embassy|
|Bosnia and Herzegovina – Embassy|
|Botswana – Embassy|
|Brunei Darussalam – Gov|
|Congo – Embassy|
|Cyprus – Embassy, Gov|
|France – Embassy, Military|
|Georgia – Embassy|
|Germany – Embassy|
|Greece – Embassy|
|India – Embassy|
|Indonesia – Embassy|
|Iran – Embassy|
|Iraq – Gov|
|Ireland – Embassy|
|Israel – Embassy|
|Japan – Trade, Embassy|
|Jordan – Embassy|
|Kazakhstan – Gov, Research, Aerospace, Nuclear/Energy, Military|
|Kenya – Embassy|
|Kuwait – Embassy|
|Latvia – Embassy|
|Lebanon – Embassy|
|Lithuania – Embassy|
|Luxembourg – Gov|
|Mauritania – Embassy|
|Moldova – Gov, Military, Embassy|
|Morocco – Embassy|
|Mozambique – Embassy|
|Oman – Embassy|
|Pakistan – Embassy|
|Portugal – Embassy|
|Qatar – Embassy|
|Russia – Embassy, Research, Military, Nuclear/Energy|
|Saudi Arabia – Embassy|
|South Africa – Embassy|
|Spain – Gov, Embassy|
|Switzerland – Embassy|
|Tanzania – Embassy|
|Turkey – Embassy|
|Turkmenistan – Gov, Oil/Energy|
|Uganda – Embassy|
|Ukraine – Military|
|United Arab Emirates – Oil/Energy, Embassy, Gov|
|United States – Embassy|
|Uzbekistan – Embassy|
A list of the most popular domains used for command and control can be found below:
Interestingly, although the domain “dll-host-update.com” appears in one of the malware configurations, it had not been registered by the attackers. The domain has since been registered by Kaspersky Lab on Nov 2nd, 2012 to monitor the attacker’s activities.
Another interesting example is “dll-host-udate.com” – the “udate” part appears to be a typo.
All the domains used by attackers appear to have been registered between 2007-2012. The oldest known domain was registered in Nov 2007; the newest on May 2012.
Most of the domains have been registered using the service “reg.ru”, but other services such as “webdrive.ru”, “webnames.ru” or “timeweb.ru” have been used as well.
During our monitoring, we observed the domains pointing to several malicious webservers. A list of servers with confirmed malicious behavior can be found below.
In total, we have identified 10 different servers which exhibited confirmed malicious behavior. Most of these severs are located in Germany, at Hetzner Online Ag.
During our analysis, we were able to obtain an image of one of the command-and-control servers. The server itself proved to be a proxy, which was forwarding the request to another server on port 40080. The script responsible for redirections was found in /root/scp.pl and relies on the “socat” tool for stream redirection.
By scanning the Internet for computers with port 40080 open, we were able to identify three such servers in total, which we call “mini-motherships”:
Connecting to these hosts on port 40080 and fetching the index page, we get the following standard content which is identical in all C&Cs:
Fetching the index info (via HTTP “HEAD”) for these servers, reveals the following:
curl -I –referer “http://www.google.com/” –user-agent “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)” http://18.104.22.168:40080
HTTP/1.1 200 OK
curl -I –referer “http://www.google.com/” –user-agent “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)” http://22.214.171.124:40080
HTTP/1.1 200 OK
It should be noted that the “last modified” field of the pages points to the same date: Tue, 21 Feb 2012 09:00:41 GMT. This is important and probably indicates that the three known mini-motherships are probably just proxies themselves, pointing to the same top level “mothership” server.
This allows us to draw the following diagram of the C&C infrastructure as of November 2012:
For the Command and Control servers, the various generations of the backdoor connect to different scripts:
|nt-windows-update.com, nt-windows-check.com, nt-windows-online.com||
For instance, the script “/cgi-bin/nt/th” is being used to receive commands from the command-and-control server, usually in the form of new plugins to run on the victim’s computer. The “/cgi-bin/nt/sk” script is called by the running plugins to upload stolen data and information about the victim.
When connecting to the C&C, the backdoor identifies itself with a specific string which includes a hexadecimal value that appears to be the victim’s unique ID. Different variants of the backdoor contain different victim IDs. Presumably, this allows the attackers to distinguish between the multitudes of connections and perform specific operations for each victim individually.
For instance, a top level XLS dropper presumably used against a Polish target, named “Katyn_-_opinia_Rosjan.xls” contains the hardcoded victim ID “F50D0B17F870EB38026F”. A similar XLS named “tactlist_05-05-2011_.8634.xls / EEAS New contact list (05-05-2011).xls” possibly used in Moldova contains a victim ID “FCF5E48A0AE558F4B859″.
Part 2 of this paper will cover malware modules and provide more technical details about their operation.