CYBER SECURITY
Infamous hacker-for-hire group DeathStalker hits the Americas and Europe with new PowerPepper malware
Monday, 07 December 2020; DeathStalker is an advanced persistent threat (APT) actor that is believed to offer hacking-for-hire services to steal sensitive business information from companies in the financial and legal sector.
F
irst reported by Kaspersky researchers in August of this year, the mercenaries’ activities have once again been spotted in the wild. This time they’re using a new malware implant and delivery tactic: a backdoor dubbed PowerPepper by Kaspersky, which leverages DNS over HTTPS as a communication channel (to hide communications with the control server in legitimate-looking ones). PowerPepper also uses several evasion techniques, including steganography (a method for disguising data). DeathStalker is a highly unusual APT actor. Active since at least 2012, the group conducts espionage campaigns against small and medium-sized businesses—law firms and those representing the financial sector. Unlike other APT groups, they don’t appear to be politically motivated or seek financial gain from the companies they target. Rather, they act as mercenaries, offering their hacking services for a price. Kaspersky researchers have recently
34
uncovered new malicious campaigns from the group, this time deploying a new backdoor (malware that allows attackers to take control of the victim’s device remotely) known as PowerPepper. Like other malware strains associated with the group, PowerPepper is typically spread via spearphishing emails with the malicious files delivered via the email body or within a malicious link. The group has exploited international events, carbon emission regulations, and even the pandemic to trick their victims into opening the malicious documents. The main malicious payload is disguised using steganography—a process that allows attackers to hide data amid legitimate content. In the case of PowerPepper, the malicious code is embedded in what appears to be regular pictures of ferns or peppers (hence the name) and is then extracted by a loader script. Once that happens, PowerPepper begins to execute remote shell commands sent by DeathStalker operators, which are aimed at stealing sensitive business
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
information. The malware can carry out any shell command on the targeted system, including those for standard data reconnaissance, such as gathering the computer’s user and file information, browsing network file shares, and downloading additional binaries or copy content to remote locations. The commands are obtained from the control server though DNS over HTTPS communications—an effective way to disguise malicious communications behind legitimate server name queries. The use of steganography is just one of several obfuscation and evasion techniques employed by the malware. The loader is disguised as a GlobalSign (a provider of identity services) verification tool, it uses custom obfuscation, and parts of the malicious delivery scripts are hidden in Word-embedded objects. Communications with the implant and servers are encrypted, and, thanks to the use of trusted, signed scripts, antivirus software won’t necessarily recognise the implant as malicious at startup.
securityfocusafrica.com