Malware News APT28 Hackers Caught Hijacking Legitimate LoJack Software

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
Security researchers have found tainted versions of the legitimate LoJack software that appeared to have been sneakily modified to allow hackers inside companies that use it.

Researchers say domains found inside the tainted LoJack instances have been previously tied to other hacking operations carried out by APT28, a codename used to describe a nation-state-backed cyber-espionage group located in Russia, with ties to the company's military intelligence.

APT28 has been spreading tainted LoJack instances
The software used in this operation is LoJack, an app that companies or lone users install on their devices (laptops, tablets, smartphones) that works as a beacon and allows owners to track and locate devices in case of theft.

Researchers at Arbor Networks said they've found modified LoJack apps that contained a small modification in the app's binary pointing the LoJack agent to a rogue command-and-control (C&C) server.

This means that instead of reporting to the central LoJack server, the LoJack agents reported to, and received instructions from, domains under APT28's control.

Arbor experts said they weren't able to find any evidence that APT28 used LoJack to enter into victims' systems and steal data, albeit it doesn't completely rule out this scenario from having happened by now.

LoJack agents are the perfect backdoor trojans
Because of the way the LoJack agent is built, attackers have access to a powerful piece of software that comes with a potent built-in persistence system that allows LoJack to survive hard drive replacements and operating system (OS) re-imaging, but also with the ability to execute any code on the target's system, with the highest privileges possible.
.... .... ....
 

TairikuOkami

Level 35
Verified
Top Poster
Content Creator
Well-known
May 13, 2017
2,479
  • May 3, 2018 – After the disclosure of the malicious Lojack binaries, many Anti-Virus vendors have been quick to respond in properly marking samples as “malware” and “DoubleAgent”, rather than “Riskware” or “unsafe”.
I guess some AV vendors are on a vacation. Not pointing a finger, umm, who am I kidding, yes I am, a quick response is essential in preventing infections and this shows, which AVs lack that. Then again, maybe their cloud engine detects it.

VirusTotal (37/67)
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top