Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

VirusTotal Hacking Offers a Supercharged Version of Google Hacking

Chronicle’s VirusTotal (VT) is a boon to security researchers and a gift to potential criminals. Apart from virus samples it contains likely millions of user credentials readily available to anyone who knows where and how to look.

Chronicle’s VirusTotal (VT) is a boon to security researchers and a gift to potential criminals. Apart from virus samples it contains likely millions of user credentials readily available to anyone who knows where and how to look.

This is the finding of SafeBreach researchers who wanted to see if VT’s advanced search capabilities could provide a supercharged version of Google Hacking (dorking). They found it could.

The research started with an analysis of samples of well-known infostealers found on VT, such as RedLine Stealer, Azulrt, Raccoon Stealer and Hawkeye. The malware samples contain their exfiltration filenames. SafeBreach researchers then used VT’s own search capabilities to see if any infostealer exfiltration files could also be found on VT. Perhaps surprisingly, they found many such files.

Why malware exfiltration files should be found alongside the malware on VT is strange. SafeBreach director of security research Tomer Bar offered several possible reasons. Some are based on simple user error: users detect a file they do not recognize and simply upload it to VT to be checked ‒ not necessarily realizing it might contain their own sensitive data stolen by the infostealer. Once on VT, it stays there.

A more disturbing reason, he suggested, is that criminals do this themselves, using VT as a marketing tool to display their catalog while hiding in plain sight. “It’s simply been overlooked,” Bar suggested to SecurityWeek, “because it is not easy to see what you’re not looking for.”

In a research blog post on January 18, 2022, SafeBreach gives examples of what it found. Using VT to search for Azulrt related files “YandexBrowser_Default.txt“, it found more than 20 instances. Among those is a folder called ‘Новая папка’ from September 2021. It contains zip files with 1,000 victims comprising 405 MB of exfiltrated data. The content included 44,000 Gmail passwords, 7,000 Hotmail, 4,700 Facebook, 950 PayPal and 30 Visa.com. 

“These credentials,” says the report, “are for 1,300 government sites from 48 countries.” They include tax-related sites such as the IRS in the U.S., HMRC in the UK (including the universal credit website), and India’s passport office.

Overall, the report continues, “We were able to collect more than 1,000,000 credentials in a few days, exfiltrated by different types of malware, and unencrypted cryptocurrency wallets. We were also able to discover a market that publishes 1000 victims’ data for free as a teaser and publishes a site and a Telegram channel selling one hundred thousand victims’ exfiltrated data.”

Advertisement. Scroll to continue reading.

Similar results were found with each of the infostealers SafeBreach examined, demonstrating that VT Hacking is a serious issue. SafeBreach calls it ‘the perfect cybercrime’ since there is no risk to the criminal, little effort required, no need for any additional malware to be developed or acquired and installed, and no defense from it. All the criminal requires is a “VT license for the small fee of €600”.

VT Hacking works at scale. “A lazy criminal who uses this method can gather an almost unlimited number of credentials and other user-sensitive data in a short period using an infection-free approach,” says the report. 

It can even be automated. “You could use a Yara rule to alert you in real time about any new file,” Bar said. “The basic VT license allows you to set something like 15 rules. So, you could take the top ten infostealers and use ten of these rules to get a notification in real time that a new file has been uploaded and is available.”

More than a month ago, the company contacted Google with its findings and recommendations, including for example, the addition of an algorithm that disallows uploads of files with sensitive data that contain cleartext or encrypted files with the decryption password attached textually or by image. Google acknowledged receipt.

“But Google did not tell us what they plan to do,” Bar told SecurityWeek. “A week ago, we repeated our searches, and the results are almost all still available. I sent Google a second mail saying the data is still available, but I haven’t had a response.”

He continued, “We waited more than a month before publishing our findings, but without a response from Google we are now publishing the details of our research to bring the issue to the attention of companies so they will be more sensitive to how they upload their own files. We prefer to wait until vendors fix any problems we find, but this is a bit different since it is available to any criminal with no hacking skills, has no IOCs, and is undetectable by the ‘victims’. I do have confidence, however, that Google will fix the problem in time.”

Related: Breach and Attack Simulation Firm SafeBreach Doubles Funding With $53.5M 

Related: VirusTotal Introduces ‘Collections’ to Simplify IoC Sharing

Related: How Attackers Use Search Engines and How You Can Fight Back!

Related: Chronicle Unveils VirusTotal Enterprise

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...