Malware News Cyber-Espionage Malware Is So Advanced It Has Its Own API

Solarquest

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
Russian cyberspies have developed a new breed of backdoor trojan that features several novel techniques, including an API that allows attackers to reverse the C&C communications flow when needed.

This new threat came to light on Wednesday via two reports from Fox-IT and Palo Alto Networks, respectively.

In the malware's source code, its author referenced this tool as Kazuar, a word that means "cassowary" in several Slavic languages.

Researchers say Kazuar is coded in the .NET Framework and appears to have versions for all three major operating systems. The Palo Alto report analyzes Kazuar, the name given to the Windows version, while the Fox-IT report analyzes Snake, the name given to the Mac version. A Linux version has not been seen yet, but Palo Alto says there are clues in the Kazuar source code that hint at its existence.

Kazuar linked to the Turla APT
Both Fox-IT and Palo Alto have linked this backdoor to a cyber-espionage group called Turla, believed to be operating out of Russia, and who Kaspersky believes is linked to one of the first cyber-espionage groups ever spotted, the Moonlight Maze APT that was active as early as 1995, well over two decades ago.

According to both security firms, Kazuar appears to be a replacement for the Uroburos backdoor trojan, already ousted in 2014 by G Data researchers. It's very common for cyber-espionage groups to replace malware that has been detected by security researchers.

.....
In other words, Kazuar has the ability to reverse the flow of normal C&C server communications. Instead of infected hosts pinging the C&C server for new commands, an attacker can ping the victim whenever he wants and send new instructions.

This approach has two main benefits. First, it allows the attacker to migrate C&C servers at will, while secondly, it allows the malware to bypass some security solutions which keep a closer eye on outbound connections to suspicious domains, and not for incoming connections.
....
 

Winter Soldier

Level 25
Verified
Top Poster
Well-known
Feb 13, 2017
1,486
Very interesting, it would be useful a dynamic analysis by running the malware on a VM, this would make a good debugging and above all, it would be possible to analyze the code behavior in terms of open sockets towards the internet looking for the IP address of the C&C server.
 

Solarquest

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
Very interesting, it would be useful a dynamic analysis by running the malware on a VM, this would make a good debugging and above all, it would be possible to analyze the code behavior in terms of open sockets towards the internet looking for the IP address of the C&C server.

Can you or someone else do it? This indeed would be very interesting!

If you want in the Palo Alto analysis you can find the needed information (Sha).
Kazuar: Multiplatform Espionage Backdoor with API Access - Palo Alto Networks Blog
 

HeiDef

From HeiDef
Verified
Developer
Mar 27, 2017
94
Very interesting, it would be useful a dynamic analysis by running the malware on a VM, this would make a good debugging and above all, it would be possible to analyze the code behavior in terms of open sockets towards the internet looking for the IP address of the C&C server.

Uroburos had a kernel component and if this really is a replacement for it, this likely does too. Sockets are a high level concept and if the communications are running strictly from kernel mode, it's not something that can be detected by socket analysis.
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Nice an API which can be useful to create a possible counter measures on that espionage attack.

A point where with the available reference, it can take little time to provide solution as may prevent some related variants.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top