Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Supply Chain Likely Target in Attacks by Tortoiseshell Group on Saudi IT Firms

A previously undocumented attack group, given the name the Tortoiseshell Group, is targeting middle eastern IT firms in an apparent supply chain move against their customers. Researchers at Symantec have discovered 11 IT firms, mostly in Saudi Arabia, that have been hit by the group.

A previously undocumented attack group, given the name the Tortoiseshell Group, is targeting middle eastern IT firms in an apparent supply chain move against their customers. Researchers at Symantec have discovered 11 IT firms, mostly in Saudi Arabia, that have been hit by the group.

The group is using both custom and off-the-shelf malware, and has been active since at least July 2018. The unique component of their weaponry is Backdoor Syskit, which was developed in both Delphi and .NET.

Syskit has been found with a number of minor variations, but the basic functionality remains the same. It is run with the “-install” parameter. It reads the config file: %Windir%temprconfig.xml, and writes C&C information to the registry before deleting the config file.

The researchers explain that the malware collects and sends the machine’s IP address, operating system name and version, and Mac address to the C&C server using the URL stored in the registry. Data sent to the C&C server is Base64 encoded.

Incoming, the malware accepts a number of commands: ‘kill_me’ (stops the dllhost service and deletes %Windir%tempbak.exe); ‘upload’ (downloads from an URL provided by the C&C server); and ‘unzip’ (uses PowerShell to unzip a specified file to a specified destination, or to run cmd.exe /c <received command>).

Other tools used by the group include Infostealer and get-logon-history.ps1 (downloaded by Infostealer). The latter gathers information from the machine and the Firefox data of all users, compresses it, and transfers it to a remote directory. Infostealer does the same with further machine data.

The initial infection vector has not been confirmed. However, the researchers note that in one case a web shell was discovered, indicating “that the attackers likely compromised a web server, and then used this to deploy malware onto the network.”

On at least two victim networks, the information gathering tools were deployed to the Netlogon folder on a domain controller. “This activity indicates the attackers had achieved domain admin level access on these networks,” say the researchers, “meaning they had access to all machines on the network.” They also note that on two of the compromised networks (they don’t say if it is the same two), “several hundred computers were infected with malware… It is possible that the attackers were forced to infect many machines before finding those that were of most interest to them.”

Advertisement. Scroll to continue reading.

On one of the victim networks, they also found that Poison Fog had been deployed one month prior to the Tortoiseshell tools. Poison Fog is a variant of BondUpdater, which has previously been used on attacks in the Middle East and has been associated with APT34 (aka OilRig). Symantec doesn’t believe that the two incidents are related, but takes it as an indication that multiple attack groups are operating in the area.

APT34 has been active since at least 2014, and has been linked to Iran. In July 2019, FireEye reported an APT34 campaign targeting primarily energy and utilities, government, and oil and gas industries in the Middle East.

Since the Tortoiseshell group activity is focused on IT companies, Symantec believes it is a wide-ranging supply chain attack seeking to gain access to the firms’ customers. Supply chain attacks have been increasing in recent years, with a 78% increase reported during 2018. NotPetya was a supply chain attack, where the M.E.Doc accounting software was infected and subsequently pushed out to M.E.Doc’s customers.

“IT providers are an ideal target for attackers given their high level of access to their clients’ computers,” note the researchers. “This access may give them the ability to send malicious software updates to target machines, and may even provide them with remote access to customer machines.” One successful attack against the supply chain could provide easy and stealthy access to multiple targets that are likely to be well defended.

However, Symantec doesn’t have access to the IT companies’ client list, so cannot tell whether these attacks are designed to compromise as many customers as possible, or aimed at one or more specific targets. At the same time, it says, “we currently have no evidence that would allow us to attribute Tortoiseshell’s activity to any existing known group or nation state.”

Related: Supply-Chain Attack Used to Install Backdoors on ASUS Computers 

Related: Kaspersky Links ShadowHammer Supply-Chain Attack to ShadowPad Hackers 

Related: Mitigating Risk of Supply Chain Attacks 

Related: Microsoft Uncovers Multi-Tier Supply Chain Attack 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.