Special Features

Black Hat and DEF CON

Cloud storage lockers from Microsoft and Google used to store and spread state-sponsored malware

Why run your own evil infrastructure when Big Tech offers robust tools hosted at trusted URLs?


Black Hat State-sponsored cyber spies and criminals are increasingly using legitimate cloud services to attack their victims, according to Symantec's threat hunters who have spotted three such operations over recent months, plus new data theft and other malware tools in development by these goons.

The security firm's Marc Elias discussed the different groups, and their favorite cloud platforms, during a Wednesday talk at the Black Hat infosec conference. He told The Register criminals use clouds many of the same reasons as legitimate organizations, plus the fact that they make it easier to avoid being caught snooping around on victims' networks.

"One of the benefits is the infrastructure costs are zero for the nation-state groups," Elias, a threat hunter at Symantec, explained during an interview on the outskirts of the annual hacker conference in Las Vegas.

"They can create free accounts on Google Drive or Microsoft, and they don't have to pay anything to maintain that infrastructure," he added. "Also, it is difficult to detect these kinds of attacks because the traffic is encrypted, and it's to legitimate domains."

Some of the more recent campaigns include a backdoor that Symantec named “Grager” after spotting it being used against three organizations in Taiwan, Hong Kong and Vietnam in April. This piece of malware used Microsoft's Graph API to communicate with the attacker's command and control server, hosted on Microsoft OneDrive.

The crew behind the Grager backdoor "registered a malicious domain mimicking the real 7-Zip software, and redirected victims to that malicious domain via search engines. So that was a very interesting infection chain – the attackers tried to be very stealthy in that campaign," Elias said.

Symantec's threat intel group published research on Grager and several other nation-state campaigns abusing cloud tools today. With Grager, they noted tentative links to a group known as UNC5330 suspected to have ties to the Chinese government.

The domain hosting Grager – hxxp://7-zip.tw/a/7z2301-x64[.]msi – is a typosquatted URL used to nab folks searching for the real 7-Zip open-source file archiving tool. Once the malware is downloaded, it drops a trojanized version of 7-Zip onto the infected machine, which then installs the real 7-Zip software, a malicious file named epdevmgr[.]dll, Tonerjam malware, and the Grager backdoor.

Mandiant previously connected Tonerjam to UNC5330. "And in our telemetry as well, we found the same Tonerjam sample deployed by another benign executable associated by Mandiant to the same group," Elias observed.

According to Elias, in March his team found another backdoor believed to be under development and named "Moon_Tag" by its developer. This malware is based on code published in this Google Group and contains functionality for communicating with the Graph API. Symantec attributed MoonTag to a Chinese-speaking group, based on the Google Group and the infrastructure used.

Even more recently, Symantec spotted a backdoor called Onedrivetools that was deployed against IT services firms in the US and Europe. This software nasty first drops a downloader that authenticates to Graph AI and then downloads and executes a second payload stored in OneDrive. The main payload, however, is a publicly available file from GitHub.

The malware creates a new folder in OneDrive for each compromised computer and uploads a file to OneDrive that alerts the attackers to a new infection. This backdoor also gives the criminals access to victims' files, which they then exfiltrate by downloading from OneDrive. Microsoft’s cloud file sharing tool is also source of malware sent to infected machines.

Symantec notes that in these attacks, the crew used a tunneling tool – Whipweave – that they suspect is built upon the open source Chinese VPN Free Connect (FCN) project. This connects to the Orbweaver Operational Relay Box (ORB) network to further obfuscate the malicious traffic.

"In these past two years we have seen quite a lot of nation-state APT groups from diverse geographics leveraging cloud services for their campaigns to be stealthy," Elias warned – adding that he only expects this trend to grow, because of the benefits to attackers.

To help network defenders, Symantec has also published a list of indicators of compromise and MITRE tactics, techniques and procedures used by the attackers – so check these out, too. And happy hunting. ®

Send us news
2 Comments

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

What a glimpse inside the Black Hat NOC reveals about infosec pros' security habits

Basic Auth among web traffic? Possible flaw in a well-known commercial VPN product? 'Security has to watch its own things'

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

Security biz Verkada to pay $3M penalty under deal that also enforces infosec upgrade

Allowed access to 150K cameras, some in sensitive spots, but has been done for spamming

North Korean scammers plan wave of stealth attacks on crypto companies, FBI warns

Feds warn of 'highly tailored, difficult-to-detect social engineering campaigns'

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign