Special Features

Black Hat and DEF CON

Cloud storage lockers from Microsoft and Google used to store and spread state-sponsored malware

Why run your own evil infrastructure when Big Tech offers robust tools hosted at trusted URLs?


Black Hat State-sponsored cyber spies and criminals are increasingly using legitimate cloud services to attack their victims, according to Symantec's threat hunters who have spotted three such operations over recent months, plus new data theft and other malware tools in development by these goons.

The security firm's Marc Elias discussed the different groups, and their favorite cloud platforms, during a Wednesday talk at the Black Hat infosec conference. He told The Register criminals use clouds many of the same reasons as legitimate organizations, plus the fact that they make it easier to avoid being caught snooping around on victims' networks.

"One of the benefits is the infrastructure costs are zero for the nation-state groups," Elias, a threat hunter at Symantec, explained during an interview on the outskirts of the annual hacker conference in Las Vegas.

"They can create free accounts on Google Drive or Microsoft, and they don't have to pay anything to maintain that infrastructure," he added. "Also, it is difficult to detect these kinds of attacks because the traffic is encrypted, and it's to legitimate domains."

Some of the more recent campaigns include a backdoor that Symantec named “Grager” after spotting it being used against three organizations in Taiwan, Hong Kong and Vietnam in April. This piece of malware used Microsoft's Graph API to communicate with the attacker's command and control server, hosted on Microsoft OneDrive.

The crew behind the Grager backdoor "registered a malicious domain mimicking the real 7-Zip software, and redirected victims to that malicious domain via search engines. So that was a very interesting infection chain – the attackers tried to be very stealthy in that campaign," Elias said.

Symantec's threat intel group published research on Grager and several other nation-state campaigns abusing cloud tools today. With Grager, they noted tentative links to a group known as UNC5330 suspected to have ties to the Chinese government.

The domain hosting Grager – hxxp://7-zip.tw/a/7z2301-x64[.]msi – is a typosquatted URL used to nab folks searching for the real 7-Zip open-source file archiving tool. Once the malware is downloaded, it drops a trojanized version of 7-Zip onto the infected machine, which then installs the real 7-Zip software, a malicious file named epdevmgr[.]dll, Tonerjam malware, and the Grager backdoor.

Mandiant previously connected Tonerjam to UNC5330. "And in our telemetry as well, we found the same Tonerjam sample deployed by another benign executable associated by Mandiant to the same group," Elias observed.

According to Elias, in March his team found another backdoor believed to be under development and named "Moon_Tag" by its developer. This malware is based on code published in this Google Group and contains functionality for communicating with the Graph API. Symantec attributed MoonTag to a Chinese-speaking group, based on the Google Group and the infrastructure used.

Even more recently, Symantec spotted a backdoor called Onedrivetools that was deployed against IT services firms in the US and Europe. This software nasty first drops a downloader that authenticates to Graph AI and then downloads and executes a second payload stored in OneDrive. The main payload, however, is a publicly available file from GitHub.

The malware creates a new folder in OneDrive for each compromised computer and uploads a file to OneDrive that alerts the attackers to a new infection. This backdoor also gives the criminals access to victims' files, which they then exfiltrate by downloading from OneDrive. Microsoft’s cloud file sharing tool is also source of malware sent to infected machines.

Symantec notes that in these attacks, the crew used a tunneling tool – Whipweave – that they suspect is built upon the open source Chinese VPN Free Connect (FCN) project. This connects to the Orbweaver Operational Relay Box (ORB) network to further obfuscate the malicious traffic.

"In these past two years we have seen quite a lot of nation-state APT groups from diverse geographics leveraging cloud services for their campaigns to be stealthy," Elias warned – adding that he only expects this trend to grow, because of the benefits to attackers.

To help network defenders, Symantec has also published a list of indicators of compromise and MITRE tactics, techniques and procedures used by the attackers – so check these out, too. And happy hunting. ®

Send us news
2 Comments

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN

Roses are red, violets are blue, CVE-2024-53704 is sweet for a ransomware crew