Recently, a cyber threat actor has been observed deploying a previously unknown rootkit targeting Oracle Solaris systems with the goal of compromising Automatic Teller Machine (ATM) switching networks and carrying out unauthorized cash withdrawals at different banks using fraudulent cards. The result is that he/they are receiving “Free money” ATMS.
Threat intelligence researchers are tracking the cluster under the name of UNC2891, with some of the group's tactics, techniques, and procedures sharing overlaps with that of another cluster named UNC1945. The intrusions staged by the actor involve "a high degree of OPSEC and leverage both public and private malware, utilities, and scripts to remove evidence and hinder response efforts," researchers said in a new report.[1]
Additional concerns are that the attacks spanned several years in some cases, during the entirety of which the actor remained undetected by taking advantage of a rootkit called CAKETAP. The CAKETAP rootkit is a Unix kernel module. CAKETAP can operate in stealthy mode by hiding network connections, processes, and files. Upon its initialization, the malware removes itself from the loaded modules list and updates the last_module_id with the previously loaded module to delete any trace of its presence. Caketap was designed to intercept banking card and PIN verification data from compromised ATM switch servers and carry out unauthorized transactions.
Investigators were able to recover memory forensic data from one of the victimized ATM switch servers, noted that one variant of the kernel rootkit came with specialized features that enabled it to intercept card and PIN verification messages and use the stolen data to perform fraudulent cash withdrawals from ATM terminals.
The hack also uses two backdoors known as SLAPSTICK and TINYSHELL, both attributed to UNC1945 and are employed to gain persistent remote access to mission-critical systems as well as shell execution and file transfers via rlogin, telnet, or SSH. "In line with the group's familiarity with Unix and Linux based systems, UNC2891 often named and configured their TINYSHELL backdoors with values that masqueraded as legitimate services that might be overlooked by investigators, such as systemd (SYSTEMD), name service cache daemon (NCSD), and the Linux at daemon (ATD)," the researchers pointed out.
In addition, the attack chains were spotted utilizing a variety of malware and publicly-available utilities, including –
- STEELHOUND – A variant of the STEELCORGI in-memory dropper that's used to decrypt an embedded payload and encrypt new binaries
- WINGHOOK – A keylogger for Linux and Unix based operating systems that captures the data in an encoded format
- WINGCRACK – A utility that's used to parse the encoded content generated by WINGHOOK
- WIPERIGHT – An ELF utilitythat erases log entries pertaining to a specific user on Linux and Unix based systems
- MIGLOGCLEANER – An ELF utility that wipes logs or removes certain strings from logs on Linux and Unix based systems
"[UNC2891] uses their skill and experience to take full advantage of the decreased visibility and security measures that are often present in Unix and Linux environments," the researchers said. "While some of the overlaps between UNC2891 and UNC1945 are notable, it is not conclusive enough to attribute the intrusions to a single threat group,” reported the researcher.
Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. Our analysts agree with the CSP and tough cyber security regulations for better network and Internet protections. For questions, comments, or assistance, please contact the office directly at 1-844-492-7225, or feedback@wapacklabs.com
Weekly Cyber Intelligence Briefings:
- Reporting: https://www.redskyalliance.org/
- Website: https://www.wapacklabs.com/
- LinkedIn: https://www.linkedin.com/company/64265941
Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://attendee.gotowebinar.com/register/5504229295967742989
[1] https://thehackernews.com/2022/03/hackers-target-bank-networks-with-new.html
Comments