Instead of developing their own hacking tools or buying them from third parties, threat groups have increasingly turned their attention to open source security tools, Kaspersky Lab reported on Wednesday.
One such tool is the Browser Exploitation Framework (BeEF), a penetration testing suite that focuses on the web browser. It allows pentesters to determine if the targeted environment is vulnerable by hooking the browser and using it to launch attacks.
BeEF enables attackers to monitor and profile the visitors of a website as it can deploy evercookies for persistent tracking, it can enumerate browsers and plugins, and obtain a list of domains visited by the victim. In addition to tracking, it can also be used to find and exploit vulnerabilities.
BeEF was recently spotted on the website of a university in Iran, where it had been used to track the site’s visitors. Kaspersky researchers also discovered that the tool has been leveraged by an APT actor they call NewsBeef.
NewsBeef, aka Newscaster and Charming Kitten, is an Iranian threat actor known for creating fake personas on social networking websites in an effort to harvest information from targeted individuals in the US, Israel, the UK, Saudi Arabia and Iraq.
According to Kaspersky, the group has been leveraging BeEF to track the visitors of websites they compromised via flaws in content management systems.
“They continue to be highly active, but this time, they are using a slightly more technical toolset. On one hand, they have developed skills or discovered tools to compromise select web applications and sites, supporting their watering hole campaigns,” Kaspersky researchers said in a blog post. “On the other hand, they have repackaged leaked bot source code and repackaged open source Metasploit and PowerSploit components to produce and administer backdoors and downloaders.”
While there have been some reports of BeEF being used for exploiting vulnerabilities and delivering backdoors via Metasploit integration, in most cases Kaspersky says the tool has helped attackers track users or steal their browser history.
The security firm has spotted BeEF on various websites around the world, including a Middle Eastern embassy in Russia, an Indian military technology school, a Ukrainian ICS scanner, an EU education agency, news organizations in Turkey and Kazakhstan, music-related websites in Brazil and Germany, a British lifestyle blog, a Japanese textile manufacturer, and gaming-related sites in Romania, Russia and China.
In addition to NewsBeef, APT actors such as Crouching Yeti and TeamSpy have also been observed using open source tools in their operations.
“Previously we’ve seen cyberespionage groups using different open-sourced, legitimate pentesting tools, either in combination with their own malware or without it,” said Kurt Baumgartner, principal security researcher at Kaspersky Lab. “What is different now is that we’re seeing more and more groups using BeEF as an attractive and effective alternative. This fact should be taken into account by corporate security departments in order to protect the organization from this new threat vector.”

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
Latest News
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
