Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label QakBot Botnet. Show all posts

Black Basta Unleashes Custom Malware Following Qakbot Takedown

 


Following last year's takedown of the Qakbot botnet, the Black Basta ransomware group has switched to relying on new custom tools and initial access techniques as part of a shift in strategy, as part of this year's efforts to reduce the threat. In response to the escalating threat from ransomware gangs, the Black Basta group has demonstrated a great deal of resilience and an ability to adapt due to the addition of new custom tools and tactics that have been developed to conceal their presence.

With a total of over 500 victims compromised, the group's evolution illustrates the resilience of cyber criminals who have had to change tactics based on law enforcement and other disruptions due to the group's evolution, experts say. Although cybercriminals have faced numerous disruptions due to law enforcement, they continue to flourish in their cybercriminal operations. Black Basta has been known to attack several companies around the world and has been known to do so from as early as the second week of April 2022. 

Currently, there is not much other information available about the new ransomware gang, since they have not yet advertised themselves to the hacking community or recruited affiliates through hacking forums. It seems, however, that by how they can rapidly accumulate new victims and how their negotiations have been conducted, they are not necessarily a new operation. They are likely to be rebranding an old top-tier ransomware gang that brought along their affiliates with them. There is a double-extortion strategy used by the ransomware group, combining data theft and encryption in addition to demanding large ransom payments that can easily reach millions of dollars. 

As part of its earlier campaign of gaining access to corporate networks, the ransomware gang previously formed a partnership with the QBot botnet. The ransomware gang, however, had to create new partnerships after law enforcement was able to disrupt the QBot botnet, according to Mandiant, for them to breach the corporate networks of companies. Further, as part of its monitoring of the UNC4393 threat actors, Mandiant has identified new malware and tools that are being used as part of the Black Basta intrusions, exhibiting the evolution and resilience of the attackers. 

Black Basta has had a busier year than most gangs, with its members compromising some of the largest companies and brands in the world, including Veolia North America, Hyundai Motor Europe, and Keytronic. One of the most telling signs of the sophistication of the threat group is that it has access to zero-day vulnerability exploits, such as the exploit for Windows privilege elevation (2024-26169) and the exploit for VMware ESXi authentication bypass flaw (CVE-2024-37085). 

The most defining characteristic of Black Basta is its prolific use of Qakbot, which was distributed through sophisticated, evolving phishing campaigns that gave rise to the company's reputation. As a Trojan initially deployed to gain access to a victim's computer, Qakbot can then deploy a wide array of open-source tools, like the gang's name-branded ransomware, which is publicly available. After a year or so, the Qakbot botnet went mostly out of commission (though it has re-surfaced since then) as part of a government law enforcement campaign called Operation Duck Hunt in which the group was forced to find new ways of accessing victim infrastructure to conduct their operations. 

The Mandiant research team revealed in a blog post published this week that Black Basta initially used phishing and even vishing as a means to spread other types of malware, such as Darkgate and Pikabot, but within a short period began looking for alternative methods to spread many more threats. According to Mandiant researchers in a post published last month, the group, known as UNC4393, has settled into a phase of transition in recent attacks in which the group is no longer using readily available tools but rather developing custom malware, as well as relying more heavily on access brokers and diversifying the initial access technique. 

As a result of the FBI and DOJ shutting down QBot's infrastructure in late 2023, Black Basta turned to other initial access distribution clusters, most notably those delivering DarkGate malware, as a means of gaining access to systems. In later stages, Black Basta switched to using SilentNight, a tool for the delivery of backdoor malware used for keylogging, to get initial access to their network, which marked a shift away from phishing as the primary method of accessing the network. 

For example, one of the process by which the group gains initial access involves deploying a backdoor called SilentNight, which the group used in 2019 and 2021 to gain access, but put on hold until last year when it was reactivated for the second time. Earlier this year, Black Basta initiated the utilization of a new tactic in their malicious operations by incorporating malvertising efforts, representing a significant deviation from their previously sole reliance on phishing as the initial access method. This shift was highlighted by cybersecurity researchers in a detailed post, emphasizing the strategic evolution of Black Basta's methods. 

SilentNight, a sophisticated C/C++ backdoor, has been identified as a critical component of Black Basta's recent campaigns. This malware communicates via HTTP/HTTPS and potentially employs a domain generation algorithm for its command and control (C2) infrastructure. The backdoor boasts a modular framework, which supports an array of plug-ins providing extensive functionality. These capabilities include system control, screenshot capture, keylogging, file management, and cryptocurrency wallet access. 

Notably, SilentNight also targets credentials through browser manipulation, making it a versatile and potent tool in Black Basta's arsenal. Upon gaining access to targeted environments, Black Basta employs a combination of living-off-the-land (LotL) techniques and custom malware to maintain persistence and facilitate lateral movement. This preparation stage precedes the deployment of ransomware. Researchers have noted that the ultimate objective of UNC4393, the group behind Black Basta, is to rapidly gather and exfiltrate as much data as possible. 

The collected data is then used in multi-faceted extortion schemes, where the threat of data leakage is leveraged to coerce victims into meeting ransom demands. Mandiant's latest report indicates a notable transition within Black Basta from the use of publicly available tools to the deployment of internally developed custom malware. This shift underscores the group’s adaptability and the ongoing threat it poses to organizations of all sizes. 

A security expert emphasized this resilience, pointing out that despite moving away from phishing—a highly successful cybercrime technique—Black Basta continues to present a significant risk. Erich Kron, a security awareness advocate at KnowBe4, commented on the group's operational capabilities, noting, "Given the success of this gang, there's no doubt they have a considerable amount of funds stocked away in their war chest, allowing them to develop their tools and improve their ability to attack." 

This financial backing enables Black Basta to innovate continuously, enhancing its tools and techniques to outmanoeuvre defences. Mandiant researchers further stressed the importance for defenders to adopt a proactive stance, fortifying their security measures with cutting-edge technology and up-to-date threat intelligence. Black Basta's recent attacks have continued to exploit "living off the land" binaries and readily available tools, such as the Windows certutil command-line utility for downloading SilentNight and the Rclone tool for data exfiltration. 

In conclusion, Black Basta remains a formidable global threat and one of the leading entities in the ransomware landscape. Their ability to adapt and evolve necessitates vigilance and advanced defensive strategies from cybersecurity professionals worldwide.

Compromised Skype Accounts Facilitate DarkGate Malware Spread

 

Cyber attackers wielding the DarkGate malware have utilized compromised Skype accounts as a vector to infiltrate targets between July and September. They accomplished this by dispatching messages with VBA loader script attachments. 

Trend Micro's security researchers, who detected these attacks, noted that this script is responsible for fetching a second-stage AutoIT script. This script, in turn, is tailored to deploy the final DarkGate malware payload.

Trend Micro explained that gaining access to the victim's Skype account provided the attacker with the ability to take control of an ongoing messaging thread. This allowed them to manipulate the naming of files to align with the context of the conversation. 

Although the means by which the initial accounts of instant messaging applications were compromised remains unclear, it is theorized to have occurred either through leaked login credentials available on underground forums or as a consequence of a prior breach of the parent organization.

Furthermore, Trend Micro observed instances where DarkGate operators attempted to deliver their malware payload through Microsoft Teams. This occurred in organizations where the service was set up to accept messages from external users. 

Previously, Truesec and MalwareBytes had identified phishing campaigns targeting Microsoft Teams users. These campaigns utilized malicious VBScript to deploy the DarkGate malware. The attackers targeted users via compromised Office 365 accounts outside their respective organizations and leveraged a tool named TeamsPhisher. 

This tool enabled the bypassing of restrictions on incoming files from external sources, enabling the transmission of phishing attachments to Teams users. The ultimate objective remained infiltrating the entire environment. Depending on the specific threat group employing the DarkGate variant, the threats ranged from ransomware to cryptomining.

Trend Micro's telemetry data indicated that DarkGate frequently led to the detection of tools commonly associated with the Black Basta ransomware group.

The proliferation of the DarkGate malware loader for initial access into corporate networks has been on the rise, especially following the dismantling of the Qakbot botnet in August. This was due to international collaborative efforts. 

Prior to the disruption of Qakbot, an individual claiming to be the developer of DarkGate sought to sell subscriptions on a hacking forum, pricing them at up to $100,000 annually. The malware was marketed with an array of features, including a concealed VNC, capabilities to evade Windows Defender, a tool for pilfering browser history, an integrated reverse proxy, a file manager, and a Discord token snatcher.

Subsequent to this announcement, there has been a noticeable surge in reported DarkGate infections via various delivery methods like phishing and malvertising.

This recent upswing in DarkGate activity highlights the escalating influence of this malware-as-a-service (MaaS) operation within the realm of cybercrime. It underscores the unwavering determination of threat actors to persist in their attacks, demonstrating adaptability in tactics and methods despite disruptions and obstacles.

FBI Operation: Quakbot Botnet Dismantled, Preventing Severe Ransomware Attacks


A global law enforcement operation executed by US investigators reportedly took down and dismantled the Qakbot botnet, preventing the severe blow of a ransomware scourge. 

On August 29, the Justice Department and FBI confirmed to had taken down Qakbot by issuing a search warrant to essentially take over the servers that ran the botnet. The critical malware Qakbot was then forcibly removed from hundreds of computers by the botnet after being distributed to them by federal agents.

In the investigations, the agencies found that Quakbot had access to over 700,000 infected computers, 200,000 of which were based in the US. 

Qakbot Botnet

Qakbot, aka Qbot, initially commenced its operations in the year 2008, as a Windows-based Trojan designed to acquire access to targeted users’ bank account credentials. It was conventionally spread as malware attachments in phishing emails. 

The malware was also designed to develop a botnet, that would follow the commands of a hacker-controlled server. As a result, the Qakbot developers were able to charge other cybercriminal organizations for access to their hacked systems.

The cybercrime organizations might then unleash ransomware on the affected systems or steal data from them. Qakbot has been connected to a number of ransomware gangs, including Conti, Black Basta, Royal, Revil, and Lockbit, among others, by US authorities and security researchers. The unidentified Qakbot operators received fees related to victim ransom payments totalling around $58 million in return. The botnet's operations are anticipated to have caused hundreds of millions of dollars in total victim losses. 

The Operation 

The application for the operation’s seizure warrant describes that the FBI gained access to the servers operating the Qakbot botnet infrastructure, which was hosted by an anonymous web hosting company, which also included systems used by the Qakbot operators. 

The application further noted that, “Through its investigation, the FBI has gained a comprehensive understanding of the structure and function of the Qakbot botnet[…]Based on that knowledge, the FBI has developed a means to identify infected computers, collect information from them about the infection, disconnect them from the Qakbot botnet and prevent the Qakbot administrators from further communicating with those infected computers.”

Reportedly, Qakbots uses a network in three Tiers in order to control the malware installed on the infected computers.

According to the FBI, Tier 1 systems are regular home or business computers that are infected with Qakbot and also include an additional "supernode" module, making them a part of the botnet's global command and control network. Many of these machines are situated in the United States. In order to hide the primary Tier 3 command and control server, which the administrators use to send encrypted commands to its hundreds of thousands of infected workstations, Tier 1 computers communicate with Tier 2 systems, which act as a proxy for network traffic.

By gaining access to these systems and Qackbot’s encryption keys, the FBI could decode and get a better understanding of the encrypted commands. Moreover, with access to the encryption keys, the FBI can command the Tier 1 “supermode” computers to swap and replace the supernode module with those developed by the FBI, which contains new encryption keys, snatching access to Qakbot from their own administrators. 

“Qakbot was the botnet of choice for some of the most infamous ransomware gangs, but we have now taken it out,” US Attorney Martin Estrada said in the announcement. 

The US is yet to provide further details on the issue. However, the Justice Department noted that “The FBI was able to redirect Qakbot botnet traffic to and through servers controlled by the FBI, which in turn instructed infected computers in the United States and elsewhere to download a file created by law enforcement that would uninstall the Qakbot malware.”