3

New APT targets telcos, ISPs and universities in the Middle East and Africa

 1 year ago
source link: https://siliconangle.com/2022/09/22/new-apt-targets-telcos-isps-universities-middle-east-africa/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

New APT targets telcos, ISPs and universities in the Middle East and Africa

metador.jpg
SECURITY

Security researchers today said they’ve discovered a never-before-seen advanced threat actor primarily targeting telecommunications, internet service providers and universities in several countries in the Middle East and Africa.

Dubbed “Metador” by researchers at SentinelOne Inc.’s SentinelLabs, the advanced persistent threat group is described as highly sophisticated and acutely aware of operations security, deploying intricate countermeasures to bypass security solutions and deploy malware platforms directly into memory. The group was found to be using variants of two longstanding Windows malware platforms, with indications of a Linux implant as well.

Metador was discovered by the researchers while delving through a “Magnet of Threats,” a term used to describe targets so desirable that multiple threat actors regularly cohabitate on the same victim machine. In responding to a series of tangled intrusions at a Magnet of Threats, the researchers found a layering of nearly 10 known threat actors of Chinese and Iranian origin but then noticed an unusual infection they had previously not seen: Metador.

Where the threat group comes from is unknown. There’s evidence that the developers and operators speak both English and Spanish, with cultural references to British pop punk lyrics and Argentinian political cartoons. The name Metador comes from a reference to the string “I am meta” in one of the malware samples and the expectation of Spanish-language responses from the command-and-control servers.

“The limited number of intrusions and long-term access to targets suggests that the threat actor’s primary motive is espionage,” the researchers noted. “Moreover, the technical complexity of the malware and its active development suggest a well-resourced group able to acquire, maintain and extend multiple frameworks.”

The only thing clear about the group is its sophistication. The obvious candidate is a state-sponsored actor, but Spanish speakers don’t typically come to mind with such hacking groups. To complicate matters, with the analysis of the Magnet of Threats sample, the researchers could not find the original infection vector employed.

Upon gaining access to a victim, Metador’s modular framework allows operators to choose between multiple execution flows. In the case of the Magnet of Threats, the execution flow combined a WMI persistence — a PowerShell script that can execute a payload from a remote location — with an unusual LOLbin, a Microsoft Console Debugger, dubbed “metaMain.”

MetaMain is described as a feature-rich backdoor implant to decrypt a subsequent modular framework called “Mafalda” into memory. Mafalda is described as flexible and interactive and supports more than 60 commands.

“Previous threat intelligence discoveries have broadened our understanding of the kind of threats that are out there but so far, our collective ability to track these actors remains inconsistent at best,” the researchers concluded. “Developers of security products, in particular, should take this as an opportunity to proactively engineer their solutions towards monitoring for the most cunning, well-resourced threat actors.”

Photo: Wikimedia Commons

A message from John Furrier, co-founder of SiliconANGLE:

Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.

Join Our Community 

Click here to join the free and open Startup Showcase event.

“TheCUBE is part of re:Invent, you know, you guys really are a part of the event and we really appreciate your coming here and I know people appreciate the content you create as well” – Andy Jassy

We really want to hear from you, and we’re looking forward to seeing you at the event and in theCUBE Club.

Click here to join the free and open Startup Showcase event.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK