Tag Archive for: mystery

Mystery hackers are “hyperjacking” targets for insidious spying


Mystery hackers are “hyperjacking” targets for insidious spying

Marco Rosario Venturini Autieri/Getty Images

For decades, virtualization software has offered a way to vastly multiply computers’ efficiency, hosting entire collections of computers as “virtual machines” on just one physical machine. And for almost as long, security researchers have warned about the potential dark side of that technology: theoretical “hyperjacking” and “Blue Pill” attacks, where hackers hijack virtualization to spy on and manipulate virtual machines, with potentially no way for a targeted computer to detect the intrusion. That insidious spying has finally jumped from research papers to reality with warnings that one mysterious team of hackers has carried out a spree of “hyperjacking” attacks in the wild.

Today, Google-owned security firm Mandiant and virtualization firm VMware jointly published warnings that a sophisticated hacker group has been installing backdoors in VMware’s virtualization software on multiple targets’ networks as part of an apparent espionage campaign. By planting their own code in victims’ so-called hypervisors—VMware software that runs on a physical computer to manage all the virtual machines it hosts—the hackers were able to invisibly watch and run commands on the computers those hypervisors oversee. And because the malicious code targets the hypervisor on the physical machine rather than the victim’s virtual machines, the hackers’ trick multiplies their access and evades nearly all traditional security measures designed to monitor those target machines for signs of foul play.

“The idea that you can compromise one machine and from there have the ability to control virtual machines en masse is huge,” says Mandiant consultant Alex Marvi. And even closely watching the processes of a target virtual machine, he says, an observer would in many cases see only “side effects” of the intrusion, given that the malware carrying out that spying had infected a part of the system entirely outside its operating system.

Mandiant discovered the hackers earlier this year and brought their techniques…

Source…

The mystery of China’s sudden warnings about US hackers


Chinese flag with digital matrix -Innovation Concept - Digital Tech Wallpaper - 3D illustration
Enlarge / Chinese flag with digital matrix -Innovation Concept – Digital Tech Wallpaper – 3D illustration

peterschreiber.media | Getty Images

For the best part of a decade, US officials and cybersecurity companies have been naming and shaming hackers they believe work for the Chinese government. These hackers have stolen terabytes of data from companies like pharmaceutical and video game firms, compromised servers, stripped security protections, and highjacked hacking tools, according to security experts. And as China’s alleged hacking has grown more brazen, individual Chinese hackers face indictments. However, things may be changing.

Since the start of 2022, China’s Foreign Ministry and the country’s cybersecurity firms have increasingly been calling out alleged US cyberespionage. Until now, these allegations have been a rarity. But the disclosures come with a catch: They appear to rely on years-old technical details, which are already publicly known and don’t contain fresh information. The move may be a strategic change for China as the nation tussles to cement its position as a tech superpower.

“These are useful materials for China’s tit-for-tat propaganda campaigns when they faced US accusation and indictment of China’s cyberespionage activities,” says Che Chang, a cyber threat analyst at the Taiwan-based cybersecurity firm TeamT5.

China’s accusations, which were noted by security journalist Catalin Cimpanu, all follow a very similar pattern. On February 23, Chinese security company Pangu Lab published allegations that the US National Security Agency’s elite Equation Group hackers used a backdoor, dubbed Bvp47, to monitor 45 countries. The Global Times, a tabloid newspaper that’s part of China’s state-controlled media, ran an exclusive report on the research. Weeks later, on March 14, the newspaper had a second exclusive story about another NSA tool, NOPEN, based on details from China’s National Computer Virus Emergency Response Center. A week later, Chinese cybersecurity firm Qihoo 360 alleged that US hackers had been attacking Chinese companies and organizations. And on April 19, the Global Times

Source…

Fake Binance NFT Mystery Box bots steal victim’s crypto wallets


GB Master Kung Mystery Box
Source: ITAMGamesInc

A new RedLine malware distribution campaign promotes fake Binance NFT mystery box bots on YouTube to lure people into infecting themselves with the information-stealing malware from GitHub repositories.

Binance mystery boxes are sets of random non-fungible token (NFT) items that people buy, hoping they’ll receive a unique or rare item at a bargain price. Some of the NFTs found in these boxes can be used to add rare cosmetics or personas within online blockchain games.

Mystery boxes are trendy in the NFT market because they give people the joy of the unknown and the potential for a big payday if they land a rare NFT. However, marketplaces like Binance offer them in limited numbers, making some boxes hard to get before they run out of stock.

This is why interested buyers often deploy “bots” to acquire them, and it’s precisely this hot trend that the threat actors are trying to take advantage of.

YouTube and GitHub abuse

According to a new report by Netskope, threat actors are creating YouTube videos to entice potential victims into downloading and installing the malware on their computer, thinking they’re getting a free mystery box scalper bot.

Malicious YouTube videos
Malicious YouTube videos (Netskope)

BleepingComputer confirmed that the videos listed in the indicators of compromise are still available on YouTube, albeit having a low number of views. 

There likely are many more than those spotted by Netskope, and it’s also possible that previous scam videos with a higher number of views were reported and taken down by YouTube moderators.

The threat actors uploaded the videos between March and April 2022, and they all feature a link to a GitHub repository that supposedly hosts the bot but, in reality, distributes RedLine.

Video description leading to a GitHub download
Video description leading to a GitHub download (Netskope)

The name of the dropped file is “BinanceNFT.bot_v1.3.zip”, containing a similarly-named executable, which is the payload, a Visual C++ installer, and a README.txt file.

Files contained in the dropped ZIP archive
Files contained in the dropped ZIP 
(Netskope)

RedLine requires the VC redistributable installer to run since the program is developed in .NET, while the text file contains the installation instructions for the victim.

Readme file instructions
Readme file…

Source…

Mystery remains on why US released prominent Russian hacker


The Justice Department has declined to provide a clear explanation as to why a well-known Russian hacker was released home last year amid warnings from President Joe Biden that the Kremlin may soon carry out cyberattacks against the United States.

Aleksei Burkov is a cybercriminal who ran two noted underground hacking operations. After he was arrested by Israeli law enforcement in 2015, the Kremlin put a lot of effort into stopping him from being extradited to the U.S. Burkov eventually arrived in the U.S. in 2019, where he pleaded guilty to a host of crimes and received a nine-year sentence, though given credit for the time spent in Israeli prison.

But he was mysteriously deported back to Russia in late September, years before the sentence was completed.

Bryan Vorndran, the assistant director of the FBI’s Cyber Division, was unable to explain why during a House Judiciary Committee hearing Tuesday when pressed by Rep. Jim Jordan, an Ohio Republican.

“Mr. Burkov was investigated by the U.S. Secret Service, not by the FBI,” Vorndran said. “I don’t know specifics. What I do know is that there was no swap or concession.”

He said it was “a Department of Justice question” when asked why Burkov was let go.

Jordan asked if letting Burkov go was a good idea, and he replied he wasn’t in a position to comment, leading the Ohio Republican to say, “The head of cyber is not in a position to comment.” Vorndran said only that “it was a Department of Justice decision through the U.S. courts process.”

Jordan asked, “Do you think it helps to release the most notorious Russian hacker we’ve ever apprehended?”

“I’m not going to answer any questions about Mr. Burkov,” Vorndran replied. “It’s a Secret Service case.”

RUSSIA AND CHINA DOUBLE DOWN ON PARTNERSHIP AMID UKRAINE INVASION

President Joe Biden spoke at a business roundtable last week in which he warned about the likelihood Putin would deploy cyberattacks.

“As I’ve said, the magnitude of Russia’s cyber capacity is fairly consequential,…

Source…