HomeCyber AttacksRussian APT Deploys New 'Kapeka' Backdoor in Jap European Attacks

Russian APT Deploys New ‘Kapeka’ Backdoor in Jap European Attacks

A beforehand undocumented “versatile” backdoor known as Kapeka has been “sporadically” noticed in cyber assaults focusing on Jap Europe, together with Estonia and Ukraine, since a minimum of mid-2022.

The findings come from Finnish cybersecurity agency WithSecure, which attributed the malware to the Russia-linked superior persistent menace (APT) group tracked as Sandworm (aka APT44 or Seashell Blizzard). Microsoft is monitoring the identical malware beneath the identify KnuckleTouch.

“The malware […] is a versatile backdoor with all the mandatory functionalities to function an early-stage toolkit for its operators, and likewise to supply long-term entry to the sufferer property,” security researcher Mohammad Kazem Hassan Nejad stated.

Kapeka comes fitted with a dropper that is designed to launch and execute a backdoor part on the contaminated host, after which it removes itself. The dropper can also be answerable for establishing persistence for the backdoor both as a scheduled job or autorun registry, relying on whether or not the method has SYSTEM privileges.

Cybersecurity

Microsoft, in its personal advisory launched in February 2024, described Kapeka as concerned in a number of campaigns distributing ransomware and that it may be used to hold out a wide range of capabilities, reminiscent of stealing credentials and different knowledge, conducting damaging assaults, and granting menace actors distant entry to the machine.

See also  North Korean Associates Suspected in $40M Cryptocurrency Heist, FBI Warns

The backdoor is a Home windows DLL written in C++ and options an embedded command-and-control (C2) configuration that is used to determine contact with an actor-controlled server and holds details about the frequency at which the server must be polled in an effort to retrieve instructions.

Apart from masquerading as a Microsoft Phrase add-in to make it seem real, the backdoor DLL gathers details about the compromised host and implements multi-threading to fetch incoming directions, course of them, and exfiltrate the outcomes of the execution to the C2 server.

Russian APT

“The backdoor makes use of WinHttp 5.1 COM interface (winhttpcom.dll) to implement its community communication part,” Nejad defined. “The backdoor communicates with its C2 to ballot for duties and to ship again fingerprinted info and job outcomes. The backdoor makes use of JSON to ship and obtain info from its C2.”

The implant can also be able to updating its C2 configuration on-the-fly by receiving a brand new model from the C2 server throughout polling. A few of the most important options of the backdoor enable it to learn and write recordsdata from and to disk, launch payloads, execute shell instructions, and even improve and uninstall itself.

See also  Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks

The precise technique via which the malware is propagated is presently unknown. Nevertheless, Microsoft famous that the dropper is retrieved from compromised web sites utilizing the certutil utility, underscoring the usage of a respectable living-off-the-land binary (LOLBin) to orchestrate the assault.

Cybersecurity

Kapeka’s connections to Sandworm come conceptual and configuration overlaps with beforehand disclosed households like GreyEnergy, a possible successor to the BlackEnergy toolkit, and Status.

“It’s probably that Kapeka was utilized in intrusions that led to the deployment of Status ransomware in late 2022,” WithSecure stated. “It’s possible that Kapeka is a successor to GreyEnergy, which itself was probably a substitute for BlackEnergy in Sandworm’s arsenal.”

“The backdoor’s victimology, rare sightings, and stage of stealth and class point out APT-level exercise, extremely probably of Russian origin.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular