Story image

UBoat Remote Access Trojan targeting Korean businesses

05 Dec 17

A new custom Remote Access Trojan (RAT) is making its way around various countries in Southeast Asia and may be going after Korean targets.

The UBoatRAT popped up in May 2017 was just a simple backdoor hosted by a compromised Hong Kong public blog service and Japan-hosted web server.

However, the developer has been busy adding new features to the RAT, according to Unit 42 researcher Kaoru Hayashi.

The improved version spotted in September features malware distribution through Google Drive, command and control address fetching from GitHub and it uses Microsoft Windows Background Intelligent Transfer Service (BITS) to keep running in the background.

While Hayashi suspects that the RAT is targeting people or organisations related to South Korea, and those in the video game industry, Unit 42 has not been able to pin down the exact targets.

“One of the reasons for the hypothesis is the file names used by the attacker when delivering the malware. We see Korean-language game titles, Korea-based game company names and some words used in the video games business on the list,” Hayashi explains in a Unit 42 blog.

Hayashi also says that the UBoatRAT can only conduct its activities on a compromised machine on an Active Directory domain – common amongst organisations but not home computers.

Hayashi further suspects targeting against the video games industry as one of the four malicious filenames includes an ‘unreleased game title’ and a Korean-based videogame company’s name.

All three malicious files appear to be delivered from Google Drive. The other three malicious files include documents that appear to be an annual salary rise inquiry and annual salary raise feedback; and a resume for a job application.

When a victim opens the file, the UBoatRAT is able to detect any software virtualization platform such as VMware, and it grabs a domain name from network parameters.

Hayashi elaborates on Microsoft Windows BITS and explains that BITS is a file transfer service for machines.

“Though the most famous application using the service is Windows Update, other applications or users can take advantage of the component. Bitsadmin.exe is a command-line tool user can create and monitor BITS jobs. The tool provides the option, /SetNotifyCmdLine which executes a program when the job finishes transferring data or is in error. UBoatRAT takes advantage of the option to ensure it stays running on a system, even after a reboot.”

Hayashi says that there are at least 14 samples of the UBoatRAT and one downloader associated with it at time of writing (late November 2017).

Though the latest version of UBoatRAT was released in September, we have seen multiple updates in elsa999 accounts on GitHub in October. The author seems to be vigorously developing or testing the threat.

Palo Alto Networks and Unit 42 will continue to monitor the UBoatRAT for updates.

ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Don’t let your network outgrow your IT team
"IT professionals spend less than half of their time at work optimising their networks and beefing it up against future security threats."
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.