ARTICLE
13 February 2025

Ankura CTIX FLASH Update - February 11, 2025

AC
Ankura Consulting Group LLC

Contributor

Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit, ankura.com.
A recent campaign has been observed targeting Internet Information Services (IIS) servers in Asia, primarily in countries such as India, Thailand, Vietnam, Philippines...
Worldwide Technology

Malware Activity

Emerging Cyber Threats: Malware Campaigns and Vulnerability Exploits

A recent campaign has been observed targeting Internet Information Services (IIS) servers in Asia, primarily in countries such as India, Thailand, Vietnam, Philippines, Singapore, Taiwan, South Korea, Japan, and Brazil, with the goal of installing BadIIS malware as part of a search engine optimization (SEO) manipulation scheme. This campaign is believed to be financially motivated and involves compromising IIS servers associated with government, universities, technology companies, and telecommunications sectors, and using them to serve altered content, including redirects to illegal gambling websites, malware, or credential harvesting pages. Additionally, Microsoft has warned of a type of malware attack that involves injecting malicious code into ViewState using static ASP.NET machine keys that are readily available online, which can allow attackers to execute remote code execution (RCE) and deploy additional malicious payloads. Hackers are also actively exploiting vulnerabilities in SimpleHelp RMM clients to create administrator accounts, drop backdoors, and potentially lay the groundwork for ransomware attacks. Furthermore, cybersecurity researchers have discovered two malicious machine learning (ML) models on the Hugging Face platform that utilize a novel technique called "nullifAI" to evade detection, containing "broken" pickle files that execute malicious Python code, specifically a platform-aware reverse shell that connects to a hard-coded IP address. These incidents highlight the importance of securing applications, restricting access to trusted IP ranges, and monitoring for suspicious activity to prevent unauthorized access and potential ransomware attacks, as well as the need for developers to generate unique machine keys, encrypt sensitive data, and upgrade to ASP.NET 4.8 to enable Antimalware Scan Interface (AMSI) capabilities. CTIX analysts will continue to report on the latest malware strains and attack methodologies.

Threat Actor Activity

North Korean Kimsuky Hackers Using Custom RDP Wrapper in Recent Attacks

The North Korean hacking group Kimsuky has been observed using a custom-built RDP Wrapper and proxy tools in recent attacks, marking a shift in their tactics. This evolution sees Kimsuky adopting a diverse set of customized remote access tools rather than solely relying on traditional backdoors like PebbleDash. Kimsuky's latest attack strategy involves spear-phishing emails containing malicious shortcut (.LNK) file attachments, disguised as PDFs or Word documents. These emails are personalized, featuring the recipient's name and correct company names, indicating prior reconnaissance. Upon opening the .LNK file, PowerShell or Mshta is triggered to download additional payloads from an external server. The payloads include PebbleDash for initial system control, a modified version of the RDP Wrapper tool for persistent RDP access and security measures bypass, and proxy tools to navigate around private network restrictions. The RDP Wrapper, originally an open-source tool for enabling RDP on Windows versions that do not support it natively, has been altered by Kimsuky to evade antivirus detection and signature-based defenses. This tool allows the group to maintain a low profile by treating RDP connections as legitimate, providing a more user-friendly remote-control interface and bypassing firewalls or NAT restrictions through relays. Once Kimsuky establishes a foothold on a network, they deploy secondary payloads, including a keylogger that captures keystrokes, an infostealer (forceCopy) for extracting web browser credentials, and a PowerShell-based ReflectiveLoader for in-memory payload execution. These tools underscore Kimsuky's persistence and evolution as a significant cyber-espionage threat group from North Korea, dedicated to intelligence gathering. These findings highlight Kimsuky's shift towards stealthier remote access methods, enabling prolonged dwell times within compromised networks. This adaptation reflects the group's ongoing efforts to enhance their espionage capabilities while evading detection for extended periods.

Vulnerabilities

XE Group Hacker Exploit Zero-Day Vulnerabilities to Maintain Persistent Access to Targeted Infrastructure

Threat actors are exploiting multiple security vulnerabilities in software products such as Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore to deploy web shells and maintain persistent access to compromised systems. The XE Group, a Vietnamese cybercrime entity active since at least 2010, has been attributed to the zero-day exploitation of VeraCore vulnerabilities, shifting its focus from credit card skimming to targeted information theft in manufacturing and distribution supply chains. The attackers are leveraging vulnerabilities like CVE-2024-57968 and CVE-2025-25181 to deploy ASPXSpy web shells and Meterpreter payloads for reconnaissance and data exfiltration. This marks a significant escalation in XE Group's tactics, as they now exploit zero-day vulnerabilities alongside older flaws in Telerik UI. Concurrently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five (5) security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, mandating all Federal Civilian Executive Branch (FCEB) agencies to patch systems by February 27, 2025. Other cybercriminals, including Russian and Chinese threat actors, are also actively exploiting these weaknesses for malware distribution and espionage campaigns, emphasizing the ongoing need for timely security updates. CTIX analysts recommend that organizations leveraging these products follow the guidance in the CISA advisory linked below.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More