Hacking Team zero-day used in new Darkhotel attacks

shutterstock_215451400According to recent reports, files and tools owned by the Hacking Team that has been leaked previously has now been repurposed by a cyber-espionage group targeting luxury hotels.

Darkhotel an elite spying group is back with new targets, new defensive capabilities, and a new zero-day exploit from of the Hacking Team leak.

In a report released by Kaspersky Lab on August 9th, Darkhotel is not known to have been a client of the Italian Hacking Team spyware company, but took advantage of the zero-day exploit after it was leaked last month.

That’s not the group’s only use of zero-day exploits. According to Kaspersky, Darkhotel has been investing “significant money” in several zero-days.

Kurt Baumgartner, Principal Security Researcher, Kaspersky Lab mentioned that over the past year, the group has also extended its geographical reach around the world, and is targeting new victims from North and South Korea, Russia, Japan, Bangladesh, Thailand, India, Mozambique and Germany.

“Some of the targets are diplomatic or have strategic commercial interests,” said Baumgartner.

This is in addition to the group’s existing focus on top executives from the US and Asia in the electronics, finance, pharmaceutical, automotive, chemical, and defense industries.

The group continues to make use of stolen certificates and extremely targeted and long-term phishing techniques. For example, some targets can be hit by attacks several months apart.

“Its defensive techniques have also been improved. Darkhotel now tends to hide its code behind layers of encryption and appear to be using SSH on victim hosts,” Baumgartner said. “It is likely that it has slowly adapted to attacking better-defended environments. And not only are its obfuscation techniques becoming stronger, but its anti-detection technology list is growing.”

The latest version of its downloader can now identify and bypass antivirus software from 27 vendors.

Baumgartner declined to comment on Darkhotel’s national origins, or name individual companies that have been targeted.

He recommended that companies train employees to be aware of spear phishing techniques.

He also suggested that employees should be familiar with the right-to-left-override method of faking file names. This is a technique in which hackers use Unicode characters to change the direction in which text is written, normally used for Arabic and Hebrew text. But the bad guys can also use this technique to change file names so that, say, an executable can have a more innocent-seeming extension like PDF or JPG.

When the user clicks on what they think is a JPG image file, the executable code runs, instead, and one of the things it does is save an actual image file and open it with MSPaint. Then, while the user is distracted by the picture, it installs malware downloader code.

“Organisations should pay careful attention to unusual netflow and of course deploying anti-malware capabilities that can identify and prevent zero-day exploit activity is very helpful,” he added.


Originally published on CSO (US). Click here to read the original story. Reprinted with permission from Story copyright 2024 International Data Group. All rights reserved.
Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.


The free newsletter covering the top industry headlines