8

iTWire - Windows backdoor SystemBC being used by RaaS affiliates: Sophos

 3 years ago
source link: https://www.itwire.com/security/windows-backdoor-systembc-being-used-by-raas-affiliates-sophos.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Thursday, 17 December 2020 09:49

Windows backdoor SystemBC being used by RaaS affiliates: Sophos

By Sam Varghese
Windows backdoor SystemBC being used by RaaS affiliates: Sophos

Image by Arek Socha from Pixabay

One of the many tools used by multiple ransomware groups in a similar way — suggesting that they are being used by ransomware-as-a-service affiliates — is the Windows backdoor SystemBC, global cyber security vendor Sophos claims.

In a blog post, researchers Sivagnanam Ganesan Nagarethinam and Sean Gallagher said SystemBC, first seen last year, gave attackers a persistent connection to victims' systems, acting both as a network proxy for hidden communications and also as a remote administration tool.

It was able to run Windows commands, deliver and execute scripts and also malicious executables and DLLs after it was dropped by other malware.

"While SystemBC has been around for over a year, we’ve seen both its use and its features continue to evolve," the two researchers wrote.

"The most recent samples of SystemBC carry code that, instead of acting essentially as a virtual private network via a SOCKS5 proxy, uses the Tor anonymising network to encrypt and conceal the destination of command and control traffic."

The Sophos team found that SystemBC had been used in recent Egregor and Ryuk (Conti) attacks that they had investigated, often in combination with Cobalt Strike, a took used after exploitation had occurred.

When SystemBC was run on a system, it checked to see if it had been started from a command-line which meant it was started as a scheduled service. If this was not the case, then the backdoor copied itself to a randomly-named directory, within the Program Data directory, using a random filename. Then it scheduled that copy to run as a task.

"However, if SystemBC finds a running process called a2guard.exe — a component of [security firm] Emsisoft’s anti-malware software — it skips the creation of a service," Nagarethinam and Gallagher said. "This behaviour dates back to the first samples of SystemBC found in 2019."

As far as the command and control aspect was concerned, the researchers said there was a beacon connection to a server at one of two domains, both of which were hardcoded, and a Tor client with a small footprint, with most connections being through the latter.

Nagarethinam and Gallagher said the attacks they had studied appeared to have been launched by affiliates of the ransomware operators, or else by the actors themselves who used a number of malware-as-a-service providers.

"They involved days or weeks of time on the targets’ networks and data exfiltration," the duo said. "SystemBC is an attractive tool in these types of operations because it allows for multiple targets to be worked at the same time with automated tasks, allowing for hands-off deployment of ransomware using Windows built-in tools if the attackers gain the proper credentials."

Others who contributed to this research were Anand Aijan, Syraj Mundalik, Peter Mackenzie, Elida Leite, Syed Shahram and Bill Kearney.

Subscribe to ITWIRE UPDATE Newsletter here

Now’s the Time for 400G Migration

The optical fibre community is anxiously awaiting the benefits that 400G capacity per wavelength will bring to existing and future fibre optic networks.

Nearly every business wants to leverage the latest in digital offerings to remain competitive in their respective markets and to provide support for fast and ever-increasing demands for data capacity. 400G is the answer.

Initial challenges are associated with supporting such project and upgrades to fulfil the promise of higher-capacity transport.

The foundation of optical networking infrastructure includes coherent optical transceivers and digital signal processing (DSP), mux/demux, ROADM, and optical amplifiers, all of which must be able to support 400G capacity.

With today’s proprietary power-hungry and high cost transceivers and DSP, how is migration to 400G networks going to be a viable option?

PacketLight's next-generation standardised solutions may be the answer. Click below to read the full article.

CLICK HERE!

WEBINAR PROMOTION ON ITWIRE: It's all about webinars

These days our customers Advertising & Marketing campaigns are mainly focussed on webinars.

If you wish to promote a Webinar we recommend at least a 2 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://www.itwire.com/itwire-update.html and Promotional News & Editorial.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

We have a Webinar Business Booster Pack and other supportive programs.

We look forward to discussing your campaign goals with you.

MORE INFO HERE!


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK