Cyberattackers are abusing Amazon Web Services (AWS) and Azure Cloud services to deliver a trio of remote access trojans (RATs), researchers warned – all aimed at hoovering up sensitive information from target users.
According to an analysis from Cisco Talos, threat actors have been pushing out variants of the malware known as AsyncRAT, Netwire and Nanocore since October, mainly to targets in Italy, Singapore and the United States. A few of the targets have been in South Korea and Spain as well, according to the firm.
As in many campaigns, the attacks start with a phishing email containing a malicious .ZIP attachment, researchers said. But the attackers have a cloud-based trick up their sleeve.
Clouding the (Malicious) Issue
Using cloud services to host the payloads is a savvy effort to avoid detection while cutting the costs of the campaign, researchers noted, since they don’t have to set up their own infrastructure.
“These types of cloud services like Azure and AWS allow attackers to…connect to the internet with minimal time or monetary commitments,” according to the analysis. “It also makes it more difficult for defenders to track down the attackers’ operations.”
The actor behind this campaign maintains a distributed infrastructure consisting of download servers, command-and-control servers (C2s) and malicious subdomains, researchers noted. The downloading servers are the ones hosted on Microsoft Azure and AWS cloud services.
“Threat actors use well-known cloud services in their campaigns because the public passively trusts big companies to be secure,” Davis McCarthy, principal security researcher at Valtix, said via email. “Network defenders may think communications to an IP address owned by Amazon or Microsoft is benign because those communications occur so frequently across a myriad of services.”
The campaign uses a range of other dropper trojans as well, including a batch-file downloader and a VBScript downloader.
“The batch script contains an obfuscated command that runs PowerShell to download and run a payload from a download server…on Azure Cloud,” researchers said. “Obfuscated VB downloaders execute a PowerShell command which runs and connects to the download server…running on AWS EC2.”
And finally, to further cover their tracks, the attackers are using the DuckDNS dynamic DNS service to change the domain names of the C2 hosts. Talos found they have registered several malicious subdomains using the service.
“The fact that the hackers are constantly modifying their C2 centers with DuckDNS, a freeware DNS service – just shows how ‘by any means necessary’ the hackers are willing to operate,” Garret Grajek, CEO at YouAttest said via email. “The attacks like this one show a team effort in scanning, exploiting, obfuscation and then finally exfiltration.”
RATs Swarm Their Victims
The RATs used in the campaign come in three flavors, all sporting multiple features to steal the victims’ information, according to the analysis:
Detection Tips: Inspect Outgoing Cloud Connections
Threat actors are actively using cloud services in their malicious campaigns, Talos researchers warned, noting that to detect malicious activity, organizations should be inspecting outgoing connections to cloud-computing services.
“Organizations should deploy comprehensive multi-layered security controls to detect similar threats and safeguard their assets,” they concluded. “Defenders should monitor traffic to their organization and implement robust rules around the script execution policies on their endpoints. It is even more important for organizations to improve email security to detect and mitigate malicious email messages, and break the infection chain as early as possible.”
Valtix’ McCarthy added, “The use of dynamic DNS gives the threat actor a flexible infrastructure that doesn’t require a static IP address. This prevents campaign disruption and provides a layer of obfuscation when threat hunting for a specific dynamic DNS provider’s domain. Creating an inventory of known cloud services and their network communication behaviors may aid in detecting this type of campaign.”
And, YouAttest’s Grajek warned organizations to take a holistic approach to detection: “Privilege escalation is often part of these attacks to ensure the hacker can laterally move across the enterprise. Thus, it’s imperative to be monitoring both new malware installations and new traffic – but also modifications in access and privilege rights.”
Cloud Providers Have Responsibility
Miclain Keffeler, application security consultant at nVisium, noted that the rise in the adoption of cloud technologies has continued to shift security.
“What was once a wall with clear barriers and holes has now shifted into a labyrinth of complexity — where many of the entrances to the maze are being infiltrated by RATs and other obscure vermin (attacks),” he said via email.
As such, cloud providers are on the hook for defense too, he added.
“Enterprise organizations have a large role to play in this conundrum, but so do public cloud platforms,” he noted. It is equally their responsibility to ensure that when malicious usage of their services and cloud environment are found, they are immediately halted,” he said. “These kinds of attacks aren’t going anywhere, so it’s important that cloud providers like AWS and Microsoft Azure step in to develop more processes around the notification of malicious use cases — especially given the complex nature of the current threatscape.”
Password Reset: On-Demand Event: Fortify 2022 with a password-security strategy built for today’s threats. This Threatpost Security Roundtable, built for infosec professionals, centers on enterprise credential management, the new password basics and mitigating post-credential breaches. Join Darren James, with Specops Software and Roger Grimes, defense evangelist at KnowBe4 and Threatpost host Becky Bracken. Register & stream this FREE session today – sponsored by Specops Software.