SecurNerd
    What's Hot

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Facebook Twitter Instagram
    Facebook Twitter Instagram
    SecurNerd
    • Home
    • AI
    • General News
    • Science
    • Tech
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    SecurNerd
    Home»Cyber Attacks»New Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks
    Cyber Attacks

    New Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks

    AtharvaBy AtharvaSeptember 24, 2023Updated:September 24, 202304 Mins Read2 Views
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Reddit Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Computer Hacker Working in Dark Room

    In a startling development, a highly advanced backdoor malware dubbed ‘Deadglyph’ has emerged, wreaking havoc in a cyberespionage campaign against a government agency located in the Middle East.

    Attributed to the notorious hacking group Stealth Falcon APT, also known as Project Raven or FruityArmor, this state-sponsored hacking collective hails from the United Arab Emirates (UAE) and has a long history of targeting activists, journalists, and dissidents over nearly a decade.

    At the recent LABScon cybersecurity conference, Filip Jurčacko, a researcher at ESET, unveiled an in-depth analysis of the newly discovered modular malware and elucidated its methods for infiltrating Windows devices.

    The Mechanics of Deadglyph

    ESET’s research has not yet uncovered the initial infection vector, although it is suspected that a malicious executable, possibly masquerading as a program installer, serves as the point of entry.

    Nevertheless, ESET has meticulously dissected the components of Deadglyph’s infection chain to provide a comprehensive understanding of its operation and its tactics to elude detection.

    The Deadglyph loading process commences with a registry shellcode loader (DLL) that extracts code from the Windows registry to introduce the Executor (x64) component, which subsequently initializes the Orchestrator (.NET) component.

    Remarkably, only the initial component is stored as a DLL file on the compromised system’s disk, thereby minimizing the chances of detection. The loader extracts the shellcode from the Windows Registry, encrypting it to increase the complexity of analysis.

    To further obfuscate its presence, the threat actors behind Deadglyph employed a homoglyph attack within the VERSIONINFO resource, utilizing distinct Greek and Cyrillic Unicode characters to mimic Microsoft’s information, creating the illusion of a legitimate Windows file.

    ESET’s report elucidates this tactic, stating, “We spotted a homoglyph attack mimicking Microsoft Corporation in the VERSIONINFO resource of this and other PE components. This method employs distinct Unicode characters that appear visually similar, but in this case not identical, to the original characters, specifically Greek Capital Letter San (U+03FA, Ϻ) and Cyrillic Small Letter O (U+043E, о) in Ϻicrоsоft Corpоratiоn.”

    The Executor component takes charge of loading AES-encrypted configurations for the backdoor, initializes the .NET runtime, loads the .NET portion of the backdoor, and functions as its library. Finally, the Orchestrator is responsible for communication with the command and control server (C2), employing two modules named ‘Timer’ and ‘Network.’

    In the event of a failure to establish communication with the C2 server within a specified timeframe, Deadglyph activates a self-removal mechanism, preventing analysis by cybersecurity researchers and experts.

    The Modular Nature of Deadglyph

    One distinctive feature of Deadglyph is its modularity, enabling it to download new modules from the C2 server that contain various shell codes executed by the Executor component. This modular approach allows threat actors to craft customized attacks, pushing them to victims to execute additional malicious functions.

    These modules are equipped with both Windows and custom Executor APIs. The latter includes 39 functions, enabling operations such as file manipulation, executable loading, Token Impersonation, and encryption and hashing.

    Although ESET has identified only a fraction of Deadglyph’s potential modules, it has identified three: a process creator, an information collector, and a file reader.

    The information collector employs WMI queries to provide the Orchestrator with a wide range of system information, including details about the operating system, network adapters, installed software, drives, services, drivers, processes, users, environment variables, and security software.

    The process creator is a command execution tool that executes specified commands as new processes and relays the results to the Orchestrator. Meanwhile, the file reader module reads and transmits file contents to the Orchestrator, with an option for operators to delete files after retrieval.

    Despite only scratching the surface of Deadglyph’s capabilities, ESET’s findings underscore the severity of the threat posed by Stealth Falcon’s creation. As the initial infection method remains unknown, crafting specific defense strategies against the malware remains a challenge. For the time being, defenders can rely on the indicators of compromise (IoCs) outlined in ESET’s report.

    Related Articles:

    1. Hackers Infiltrate Telecom Providers Using Novel HTTPSnoop Malware
    2. Iranian Hackers Employ ‘Sponsor’ Malware to Backdoor 34 Organizations
    3. FBI Successfully Eliminates Qakbot Malware from Infected Windows PCs
    4. New Malware Targets Business Routers for Data Theft and Surveillance
    5. CISA Raises Alarm Over New ‘Whirlpool’ Backdoor in Barracuda ESG Attacks
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Atharva

    Related Posts

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023

    APT Campaign Unveils New ‘HrServ.dll’ Web Shell Targeting Afghan Government Systems

    November 26, 2023

    Iranian Cyber Group Launches Sophisticated Attacks on Israeli Tech and Education Sectors

    November 6, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    Top Posts

    Apple Takes Stand Against U.K. Surveillance Proposals, Considers Withdrawal of iMessage and FaceTime Services

    July 22, 20232,637 Views

    Apple’s Market Value Skyrockets by $71 Billion Amid Speculation of In-house ‘Apple GPT’ to Challenge OpenAI

    July 23, 2023894 Views

    Android Malware Developers Utilize Stealthy APK Compression to Bypass Detection Measures

    August 20, 2023810 Views

    Apple Store Blocks Twitter’s iOS App Rebranding to ‘X’ Due to Minimum Character Regulations

    July 29, 2023760 Views
    Don't Miss
    2 Mins Read

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    By securnerdDecember 8, 2023

    Google recently unveiled Gemini, its latest suite of powerful AI models, but the tech giant…

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 2023
    Stay In Touch
    • Facebook
    • Twitter
    • Instagram
    • LinkedIn
    • Telegram
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Popular Post

    Microsoft’s Ongoing Struggles with Cybersecurity: A $2.4 Trillion Giant’s Failures

    September 23, 20231 Views

    Ukrainian Authorities Detect Russian Hacker Campaign Seeking Evidence of War Crimes

    September 25, 20231 Views

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 20231 Views

    Ethos Technologies Data Breach Settlement Offers Compensation of Up to $5,200 for Affected Individuals

    September 23, 20232 Views

    New Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks

    September 24, 20232 Views

    Nigerian Man Admits Guilt in $6 Million Business Email Compromise Scheme

    September 24, 20233 Views

    Microsoft Unveils Security Copilot Early Access Program, Revolutionizing Threat Response

    October 23, 20233 Views

    Meta Introduces Ad-Free Subscriptions in Europe, Adapting to Privacy Regulations

    October 31, 20234 Views

    Ukraine Enhances Wartime Efforts Through Advanced Cyber Intelligence Strategies

    August 10, 20235 Views

    Critical Security Flaws Exposed in Nagios XI Network Monitoring Software

    September 20, 20235 Views
    Facebook Twitter Instagram LinkedIn Telegram
    © 2023 SecurNerd. Powered by Codelivly.

    Type above and press Enter to search. Press Esc to cancel.