CONFERENCE On Demand: Cyber AI & Automation Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

New LuckyCat-Linked RAT Targets Users in Tibet

A malware attack using a newly discovered backdoor has been targeting the mailing list of the organization officially representing the Tibetan government-in-exile.

A malware attack using a newly discovered backdoor has been targeting the mailing list of the organization officially representing the Tibetan government-in-exile.

Dubbed ExileRAT, the malware was being delivered via a malicious Microsoft PowerPoint document, using a mailing list run by the Central Tibetan Administration (CTA). Given the nature of the threat and the targets, the campaign was likely designed for espionage purposes, Talos’ security researchers say. 

The malicious PPSX document (a copy of a legitimate PDF available on CTA’s website) was sent to all subscribers to the CTA mailing list, Talos reports. The standard Reply-To header used by the CTA mailings was modified to redirect responses to the attackers’ email address.

The document exploits CVE-2017-0199, an arbitrary code execution vulnerability in Office. The file also attempts to perform some geo-location lookups and contacts the command and control (C&C) server to receive a JavaScript script responsible for downloading the final payload. 

The malware is executed via WScript, while cmd.exe also is used to create a scheduled task aiming to avoid detection. Once up and running, the malware performs an IP location lookup and writes the data to a c:data.ini file.

ExileRAT is a simple remote access Trojan platform that can retrieve system information (computer name, username, listing drives, network adapter, and process names), receive and exfiltrate files, and execute or terminate processes.

According to Talos, the infrastructure used for C&C has been used in multiple campaigns, including recent attacks featuring a newer version of the LuckyCat Android RAT used in 2012 attacks against Tibetan activists. 

The new backdoor variant includes old capabilities such as file uploading, downloading, information stealing and remote shell, but also adds file removal, app execution, audio recording, and the stealing of personal contacts, SMS, calls, and location. 

Advertisement. Scroll to continue reading.

The newly observed campaign is another “evolution in a series of attacks targeting a constituency of political supporters, and further evidence that not all attacks require the use of zero-day vulnerabilities,” Talos says. 

Given that the PPSX document was using a two-year old vulnerability to download the final payload, the defensive best-practice of patching systems against known vulnerabilities should keep users secure, the security researchers point out. 

Related: Cyber-Espionage Campaigns Target Tibetan Community in India

Related: PowerPoint Slide Show Files Used to Install Malware

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.

Register

As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Cybercrime

The recent ransomware attack targeting Rackspace was conducted by a cybercrime group named Play using a new exploitation method, the cloud company revealed this...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.