{"id":10294,"date":"2022-06-22T18:58:58","date_gmt":"2022-06-22T21:58:58","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10294"},"modified":"2022-06-22T18:58:58","modified_gmt":"2022-06-22T21:58:58","slug":"los-piratas-informaticos-iranies-apuntan-al-sector-energetico-con-una-nueva-puerta-trasera-de-dns","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10294","title":{"rendered":"Los piratas inform\u00e1ticos iran\u00edes apuntan al sector energ\u00e9tico con una nueva puerta trasera de DNS"},"content":{"rendered":"<p>Un an\u00e1lisis reciente de Zscaler presenta una nueva puerta trasera de DNS basada en la herramienta de c\u00f3digo abierto DIG.net para llevar a cabo ataques de &#8220;secuestro de DNS&#8221;, ejecutar comandos, soltar m\u00e1s cargas \u00fatiles y filtrar datos. El secuestro de DNS es un ataque de redirecci\u00f3n que se basa en la manipulaci\u00f3n de consultas de DNS para llevar a un usuario que intenta visitar un sitio leg\u00edtimo a un clon malicioso alojado en un servidor bajo el control del actor de amenazas.<\/p>\n<hr \/>\n<p>The Iranian Lycaeum APT hacking group uses a new .NET-based DNS backdoor to conduct attacks on companies in the energy and telecommunication sectors.<\/p>\n<p>Lyceum is a state-supported APT, also known as Hexane or Spilrin, that has\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/iranian-state-hackers-use-upgraded-malware-in-attacks-on-isps-telcos\/\" target=\"_blank\" rel=\"noopener\">previously targeted<\/a>\u00a0communication service providers in the Middle East using DNS-tunneling backdoors.<\/p>\n<p>A recent analysis by Zscaler presents a new DNS backdoor based on the DIG.net open-source tool to carry out &#8220;DNS hijacking&#8221; attacks, execute commands, drop more payloads, and exfiltrate data.<\/p>\n<p>DNS hijacking is a redirection attack that relies on DNS query manipulation to take a user who attempts to visit a legitimate site to a malicious clone hosted on a server under the threat actor&#8217;s control.<\/p>\n<p>Any information entered on the malicious website, such as account credentials, will be shared directly with the threat actor.<\/p>\n<p><strong>Starts with a Word doc<\/strong><\/p>\n<p>The attack begins with a Word Document containing a malicious macro downloaded from a website pretending to be a news site. The file is masked as a news report with an Iran Military affairs topic.<\/p>\n<figure id=\"attachment_10296\" aria-describedby=\"caption-attachment-10296\" style=\"width: 1133px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"size-full wp-image-10296\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/iran-drone.webp\" alt=\"\" width=\"1133\" height=\"565\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/iran-drone.webp 1133w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/iran-drone-300x150.webp 300w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/iran-drone-1024x511.webp 1024w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/iran-drone-768x383.webp 768w\" sizes=\"(max-width: 1133px) 100vw, 1133px\" \/><figcaption id=\"caption-attachment-10296\" class=\"wp-caption-text\">One of the fake news reports used by Lyceum (Zscaler)<\/figcaption><\/figure>\n<p>If the target enables macros on their Microsoft Office to view the content, the DNS backdoor will be dropped directly onto the Startup folder for establishing persistence between reboots.<\/p>\n<figure id=\"attachment_10297\" aria-describedby=\"caption-attachment-10297\" style=\"width: 1113px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"size-full wp-image-10297\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/drop-on-startup.webp\" alt=\"\" width=\"1113\" height=\"458\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/drop-on-startup.webp 1113w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/drop-on-startup-300x123.webp 300w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/drop-on-startup-1024x421.webp 1024w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/drop-on-startup-768x316.webp 768w\" sizes=\"(max-width: 1113px) 100vw, 1113px\" \/><figcaption id=\"caption-attachment-10297\" class=\"wp-caption-text\">Dropping the payload on the Startup folder (Zscaler)<\/figcaption><\/figure>\n<p><strong>New DNS backdoor<\/strong><\/p>\n<p>The backdoor uses the filename &#8220;DnsSystem.exe,&#8221; and it&#8217;s a customized version of\u00a0<a href=\"https:\/\/www.codeproject.com\/Articles\/23673\/DNS-NET-Resolver-C\" target=\"_blank\" rel=\"nofollow noopener\">DIG.net<\/a>, which the adversaries adjusted according to their needs.<\/p>\n<div>\n<blockquote><p>&#8220;The threat actors have customized and appended code that allows them to perform DNS queries for various records onto the custom DNS Server, parse the response of the query to execute system commands remotely, and upload\/download files from the Command &amp; Control server by leveraging the DNS protocol.&#8221; &#8211;\u00a0<a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/lyceum-net-dns-backdoor\" target=\"_blank\" rel=\"nofollow noopener\">Zscaler<\/a><\/p><\/blockquote>\n<\/div>\n<p>The malware sets up the DNS hijacking server by acquiring the IP address of the &#8220;cyberclub[.]one&#8221; domain\u00a0and generates an MD5 based on the victim&#8217;s username to serve as a unique victim ID.<\/p>\n<figure id=\"attachment_10299\" aria-describedby=\"caption-attachment-10299\" style=\"width: 950px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"size-full wp-image-10299\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/unique-id.webp\" alt=\"\" width=\"950\" height=\"313\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/unique-id.webp 950w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/unique-id-300x99.webp 300w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/unique-id-768x253.webp 768w\" sizes=\"(max-width: 950px) 100vw, 950px\" \/><figcaption id=\"caption-attachment-10299\" class=\"wp-caption-text\">Generating a unique victim ID on each machine (Zscaler)<\/figcaption><\/figure>\n<p>Apart from performing DNS hijacking attacks, the backdoor can also receive commands from the C2 to execute on the compromised machine. The responses have the form of TXT records.<\/p>\n<p>These commands are run through the cmd.exe tool (Windows command prompt), and the output is sent back to the C2 as a DNS A Record.<\/p>\n<figure id=\"attachment_10298\" aria-describedby=\"caption-attachment-10298\" style=\"width: 896px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"size-full wp-image-10298\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/command-execution.webp\" alt=\"\" width=\"896\" height=\"547\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/command-execution.webp 896w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/command-execution-300x183.webp 300w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/06\/command-execution-768x469.webp 768w\" sizes=\"(max-width: 896px) 100vw, 896px\" \/><figcaption id=\"caption-attachment-10298\" class=\"wp-caption-text\">Malware&#8217;s command execution routine (Zscaler)<\/figcaption><\/figure>\n<p>Additionally, the backdoor can exfiltrate local files to the C2 or download files from a remote resource and drop additional payloads.<\/p>\n<p><strong>Lyceum evolution<\/strong><\/p>\n<p>Lyceum is a group of hackers focusing on cyber espionage, and this new stealthy and potent backdoor is the mark of their evolution in the field.<\/p>\n<p>The Iranian hackers are expected to continue participating in these information-collection campaigns that often involve multiple threat groups from the country.<\/p>\n<p>As powerful as its new DNS manipulation tricks are, however, the initial infection still requires enabling macros on the Office suite, a request that should always be treated with ultimate suspicion.<\/p>\n<p><strong>Fuente: <\/strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/iranian-hackers-target-energy-sector-with-new-dns-backdoor\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.bleepingcomputer.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un an\u00e1lisis reciente de Zscaler presenta una nueva puerta trasera de DNS basada en la herramienta de c\u00f3digo abierto DIG.net para llevar a cabo ataques&hellip; <\/p>\n","protected":false},"author":1,"featured_media":10295,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10294"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10294"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10294\/revisions"}],"predecessor-version":[{"id":10300,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10294\/revisions\/10300"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/10295"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}