Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.
  • Residence:
    Dublin
  • County:
    Dublin
  • Country:
    Ireland
Cyber Security Incident Response
Management & Architecture of Cyber Security Teams
Solutions & Coaching
  • Cyber Security Incident Response
  • Management & Architecture of Cyber Security Teams
  • Solutions
  • Training & Coaching

Cybercriminals Abusing Internet-Sharing Services to Monetize Malware Campaigns

September 1, 2021

Risk actors are capitalizing on the rising reputation of proxyware platforms like Honeygain and Nanowire to monetize their very own malware campaigns, as soon as once more illustrating how attackers are fast to repurpose and weaponize legitimate platforms to their benefit.

“Malware is presently leveraging these platforms to monetize the web bandwidth of victims, much like how malicious cryptocurrency mining makes an attempt to monetize the CPU cycles of contaminated programs,” researchers from Cisco Talos said in a Tuesday evaluation. “In lots of circumstances, these purposes are featured in multi-stage, multi-payload malware assaults that present adversaries with a number of monetization strategies.”

Proxyware, additionally known as internet-sharing purposes, are professional companies that enable customers to carve out a share of their web bandwidth for different gadgets, usually for a payment, by way of a consumer utility provided by the supplier, enabling different clients to entry the web utilizing the web connections provided by nodes on the community. For shoppers, such companies are “marketed as a method to bypass geolocation checks on streaming or gaming platforms whereas producing some earnings for the consumer providing up their bandwidth,” the researchers defined.

However the illicit use of proxyware additionally introduces a large number of dangers in that they may allow menace actors to obfuscate the supply of their assaults, thereby not solely giving them the power to carry out malicious actions by making it seem as if they’re originating from professional residential or company networks, but additionally render ineffective typical community defenses that depend on IP-based blocklists.

“The identical mechanisms presently used to observe and monitor Tor exit nodes, “nameless” proxies, and different widespread site visitors obfuscation methods don’t presently exist for monitoring nodes inside these proxyware networks,” the researchers famous.

That is not all. Researchers recognized a number of methods adopted by dangerous actors, together with trojanized proxyware installers that enable for stealthy distribution of knowledge stealers and distant entry trojans (RATs) with out the victims’ information. In a single occasion noticed by Cisco Talos, attackers have been discovered utilizing the proxyware purposes to monetize victims’ community bandwidth to generate income in addition to exploit the compromised machine’s CPU assets for mining cryptocurrency.

One other case concerned a multi-stage malware marketing campaign that culminated within the deployment of an info-stealer, a cryptocurrency mining payload, in addition to proxyware software program, underscoring the “diversified approaches out there to adversaries,” who can now transcend cryptojacking to additionally plunder helpful information and monetize profitable infections in different methods.

Much more concerningly, researchers detected malware that was used to silently set up Honeygain on contaminated programs, and register the consumer with the adversary’s Honeygain account to revenue off the sufferer’s web bandwidth. This additionally implies that an attacker can join a number of Honeygain accounts to scale their operation primarily based on the variety of contaminated programs below their management.

“For organizations, these platforms pose two important issues: The abuse of their assets, ultimately being blocklisted because of actions they do not even management and it will increase organizations’ assault floor, doubtlessly creating an preliminary assault vector straight on the endpoint,” the researchers concluded. “Because of the numerous dangers related to these platforms, it is suggested that organizations take into account prohibiting using these purposes on company belongings.”

Posted in SecurityTags:
Write a comment