Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Supply Chain Attack Hits South Korean Firms

Security researchers have uncovered a supply chain attack aimed at infecting organizations in South Korea with a remote access Trojan (RAT) to steal valuable information.

Security researchers have uncovered a supply chain attack aimed at infecting organizations in South Korea with a remote access Trojan (RAT) to steal valuable information.

Called Operation Red Signature, the attack was first detected in July and was carried out through the compromised update server of a remote support solutions provider. The end goal was to infect targets of interest with the 9002 RAT backdoor.

The attackers managed to steal a valid digital certificate and use it to sign their malware. They also reconfigured the update server to only deliver the malicious files to organizations within a specified range of IP addresses.

Once on an infected machine, the 9002 RAT would also install additional malware, such as an exploit tool for Internet Information Services (IIS) 6 WebDav (exploiting CVE-2017-7269) and an SQL database password dumper.

“These tools hint at how the attackers are also after data stored in their target’s web server and database,” Trend Micro, the security firm that discovered the campaign, reveals.

The attackers likely stole the code signing certificate in April, then prepared the malicious update files, signed them, and uploaded them on their servers. Next, they hacked the update server and configured it to retrieve an update.zip file from the attackers’ server, but only if the client was connecting from a specific range of IP addresses.

This resulted in the malicious update file being delivered to the clients and the 9002 RAT malware being executed. The malware would download additional malicious tools onto the infected machines.

The backdoor was compiled on July 17, 2018, while the configuration files inside update.zip were created on July 18, the same day the remote support program’s update process started. The RAT used in this attack was set to be inactive in August, Trend Micro says.

Advertisement. Scroll to continue reading.

The 9002 RAT can deliver a broad range of additional malicious tools to view and search for active directory objects, collect active directory information, dump passwords from SQL database, exploit said IIS 6 flaw, recover passwords from browsers, and gather system information.

It would also fetch a publicly available hacking tool, a version of the PlugX remote access tool, and a custom version of Mimikatz (to verify computer password and active directory credentials).

“Supply chain attacks don’t just affect users and businesses — they exploit the trust between vendors and its clients or customers. By trojanizing software/applications or manipulating the infrastructures or platforms that run them, supply chain attacks affects the integrity and security of the goods and services that organizations provide,” Trend Micro notes.

Related: Microsoft Uncovers Multi-Tier Supply Chain Attack

Related: Software Supply Chain Increasingly Targeted in Attacks: Survey

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...