{"id":16655,"date":"2019-10-22T08:10:04","date_gmt":"2019-10-22T16:10:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/10\/22\/news-10394\/"},"modified":"2019-10-22T08:10:04","modified_gmt":"2019-10-22T16:10:04","slug":"news-10394","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/22\/news-10394\/","title":{"rendered":"The forgotten domain: Exploring a link between Magecart Group 5 and the Carbanak APT"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Tue, 22 Oct 2019 15:00:00 +0000<\/strong><\/p>\n<p><em>This blog post was authored by J\u00e9r\u00f4me Segura, William Tsing, and Adam Thomas.<\/em><\/p>\n<p>In a previous <a rel=\"noreferrer noopener\" aria-label=\"post (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/10\/magecart-group-4-a-link-with-cobalt-group\/\" target=\"_blank\">post<\/a>, we described the possible overlap between certain domains registered by Magecart Group 4 and the Cobalt gang. While attribution is always a difficult endeavor, sharing TTPs can help others to connect the dots between campaigns observed in the wild and threat groups.<\/p>\n<p>This time, we looked at Magecart Group 5 by examining a number of domains and their ties with other malicious activity. The data predates changes on whois (before <a rel=\"noreferrer noopener\" aria-label=\"GDPR (opens in a new tab)\" href=\"https:\/\/eugdpr.org\/\" target=\"_blank\">GDPR<\/a> took effect) and allows us to identify registrant data that is connected to Dridex phishing campaigns and the Carbanak group.<\/p>\n<h3>Magecart Group 5 tactics<\/h3>\n<p>With some exceptions, such as the <a rel=\"noreferrer noopener\" aria-label=\"Ticketmaster breach (opens in a new tab)\" href=\"https:\/\/www.theregister.co.uk\/2018\/06\/27\/ticketmaster_support_bot_hack\/\" target=\"_blank\">Ticketmaster breach<\/a>, Group 5 has a different modus operandi; it targets the supply chain used by e-commerce merchants to load various libraries, analytics, or security seals. Attacks consist of compromising a third-party supplier and affecting hundreds or even thousands of websites downstream.<\/p>\n<p>In a September 2018 <a rel=\"noreferrer noopener\" aria-label=\"blog (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/how-to-protect-your-data-from-magecart-and-other-e-commerce-attacks\/\" target=\"_blank\">blog<\/a>, we wrote about a trust seal that was loaded (with its malicious code) by a large number of merchants. A trust seal is essentially a confidence indicator in the shape of a badge that gives shoppers reassurance that the online store is safe and malware-free.<\/p>\n<p>The skimmer script belonging to Magecart Group 5 was largely obfuscated and set to exfiltrate data, such as name, address, credit card number, expiry date, and CVV back to the criminals every time someone made a purchase on one of the compromised stores.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/magecart.png\" alt=\"\" \/><\/figure>\n<p>This kind of supply-chain attack, where thousands of stores are loading altered code, have a much higher return than individually targeting stores.<\/p>\n<h3>Bulletproof registrar and Magecart<\/h3>\n<p>We spent some time digging into a number of Magecart domains registered via the well-known Chinese registrar BIZCN\/CNOBIN. Similar to our research on the <a rel=\"noreferrer noopener\" aria-label=\"bulletproof host in Eastern Ukraine (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/07\/no-mans-land-how-a-magecart-group-is-running-a-web-skimming-operation-from-a-war-zone\/\" target=\"_blank\">bulletproof host in Eastern Ukraine<\/a>, we looked at how this provider was essentially a bulletproof registrar. Previous activity on BIZCN includes <a rel=\"noreferrer noopener\" aria-label=\"rogue Canadian pharmacy websites (opens in a new tab)\" href=\"https:\/\/www.legitscript.com\/blog\/2014\/11\/bizcn-hand-rogue-internet-pharmacy-cookie-jar\/\" target=\"_blank\">rogue Canadian pharmacy websites<\/a> in addition to <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/exploits\/2016\/09\/neutrino-eks-afraidgate-pushed-in-malvertising-attack\/\" target=\"_blank\">exploit kit activity<\/a> tagged as the &#8220;<a rel=\"noreferrer noopener\" aria-label=\"AfraidGate (opens in a new tab)\" href=\"https:\/\/otx.alienvault.com\/pulse\/579b957c91242f0134cb0488\/\" target=\"_blank\">AfraidGate<\/a>.&#8221;<\/p>\n<p>We narrowed down the domains to a smaller subset <a rel=\"noreferrer noopener\" aria-label=\"previously identified (opens in a new tab)\" href=\"https:\/\/community.riskiq.com\/projects\/33f9475f-c0c7-39f8-598a-11ec689b9d2b\" target=\"_blank\">previously identified<\/a> as used by Magecart Group 5. The threat actors registered the domain <em>informaer<\/em> under eight different top-level domains (<a rel=\"noreferrer noopener\" aria-label=\"TLDs (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Top-level_domain\" target=\"_blank\">TLDs<\/a>) using privacy protection services (see IOCs for full list). However, they may have forgotten to apply the same to informaer.info, which revealed the following:<\/p>\n<pre class=\"wp-block-preformatted\">Domain Name: INFORMAER.INFO<br \/>Registrar URL: http:\/\/www.bizcn.com<br \/>Updated Date: 2017-02-27T08:35:38Z<br \/>Creation Date: 2017-02-21T12:48:51Z<br \/>Registry Expiry Date: 2018-02-21T12:48:51Z<br \/>Registrar: Bizcn.com, Inc.<br \/>Registrant Name: Guo Tang<br \/>Registrant Organization: Xinxin Co.<br \/>Registrant Street: Dazhongsi 13<br \/>Registrant City: Beijing<br \/>Registrant State\/Province: Haidian<br \/>Registrant Postal Code: 101402<br \/>Registrant Country: CN<br \/>Registrant Phone: +86.1066569215<br \/>Registrant Fax: +86.1066549216<br \/>Registrant Email: guotang323@yahoo.com<\/pre>\n<h3 id=\"mce_22\">Connection with Dridex malware and Carbanak Group<\/h3>\n<p>If we pivot from this email address, we can identify other domains\u2014in particular, several that connect to Dridex phishing campaigns.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/diagram_.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40810\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/10\/the-forgotten-domain-exploring-a-link-between-magecart-group-5-and-the-carbanak-apt\/attachment\/diagram_-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/diagram_.png\" data-orig-size=\"861,875\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"diagram_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/diagram_-295x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/diagram_-590x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/diagram_.png\" alt=\"\" class=\"wp-image-40810\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/diagram_.png 861w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/diagram_-295x300.png 295w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/diagram_-590x600.png 590w\" sizes=\"(max-width: 861px) 100vw, 861px\" \/><\/a><\/figure>\n<p><a rel=\"noreferrer noopener\" aria-label=\"Dridex (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/trojan-dridex\/\" target=\"_blank\">Dridex<\/a> is a robust banking Trojan that has been around for many years. To this day, it continues to be distributed via malicious spam campaigns using fake invoices.<\/p>\n<p>Looking closer at the guotang323@yahoo.com email address, we can see that it was used to register domains used into the following Dridex phishing campaigns:<\/p>\n<ul>\n<li>corporatefaxsolutions.com (<a rel=\"noreferrer noopener\" aria-label=\"Corporate efax campaign targeting Germans (opens in a new tab)\" href=\"https:\/\/www.trojaner-info.de\/daten-sichern-verschluesseln\/aktuelles\/achtung-e-mail-betreffs-corporate-efax-hat-trojaner-im-gepaeck.html\" target=\"_blank\">Corporate efax campaign targeting Germans<\/a>)<\/li>\n<li>onenewpost.com (<a rel=\"noreferrer noopener\" aria-label=\"OnePosting phish pushing Dridex (opens in a new tab)\" href=\"https:\/\/myonlinesecurity.co.uk\/fake-oneposting-invoice-ready-to-view-malspam-delivers-dridex-banking-trojan\/\" target=\"_blank\">OnePosting phish pushing Dridex<\/a>)<\/li>\n<li>xeronet.org (<a rel=\"noreferrer noopener\" aria-label=\"Xero phish pushing Dridex (opens in a new tab)\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/malware-xeroing-in-on-cloud-accounting-customers\/\" target=\"_blank\">Xero phish pushing Dridex<\/a>)<\/li>\n<\/ul>\n<p><a rel=\"noreferrer noopener\" aria-label=\"Carbanak (opens in a new tab)\" href=\"https:\/\/attack.mitre.org\/groups\/G0008\/\" target=\"_blank\">Carbanak<\/a> is a sophisticated threat group targeting banks and using a backdoor of the same name for espionage and data exfiltration. In a 2017 <a rel=\"noreferrer noopener\" aria-label=\"blog post (opens in a new tab)\" href=\"https:\/\/www.govcert.ch\/blog\/28\/the-rise-of-dridex-and-the-role-of-esps\" target=\"_blank\">blog post<\/a>, the Swiss CERT posted about phishing campaigns where Dridex was used to deliver the Carbanak malware.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>During our incident response in 2016, we could identify Dridex to be the initial infection vector, which had arrived in the victim\u2019s mailbox by malicious Office Word documents, and uncovered the installation of a sophisticated malware called Carbanak, used by the attacker for lateral movement and conducting the actual fraud.<\/p>\n<\/blockquote>\n<p>A <a rel=\"noreferrer noopener\" aria-label=\"diagram (opens in a new tab)\" href=\"https:\/\/www.govcert.ch\/images\/blogpost\/infection_chain.jpg\" target=\"_blank\" data-rel=\"lightbox-1\" title=\"\">diagram<\/a> from Swiss CERT also shows how the Dridex loader does some victim triaging to either deliver Dridex proper (for consumers or low interest targets) or Carbanak for companies and high-value targets.<\/p>\n<p>Another interesting data point from the informaer.info registrant details is the phone number. (+86.1066569215) is mentioned by Brian Krebs in a <a rel=\"noreferrer noopener\" href=\"https:\/\/krebsonsecurity.com\/2016\/07\/carbanak-gang-tied-to-russian-security-firm\/\" target=\"_blank\">blog post<\/a> examining connections between a Russian security firm and the Carbanak group.<\/p>\n<h3>Looking beyond<\/h3>\n<p>As Magecart activity increases and new groups emerge, it can sometimes be helpful to go back in time to examine bread crumbs that may have been left behind.<\/p>\n<p>Victimology also helps us to get a better idea of the threat actor behind attacks. For instance, we see many compromises that affect a small subset of merchants that are probably tied to less sophisticated criminals, often using a simple skimmer or a kit. <\/p>\n<p>In contrast, we believe that the bigger breaches that reel in a much larger prize are conducted by advanced threat groups with previous experience in the field and with well-established ties within the criminal underground.<\/p>\n<h3>Indicators of Compromise<\/h3>\n<p><strong>Magecart Group 5 domains<\/strong><\/p>\n<p>informaer[.]biz<br \/>informaer[.]cc<br \/>informaer[.]com<br \/>informaer[.]net<br \/>informaer[.]org<br \/>informaer[.]pw<br \/>informaer[.]ws<br \/>informaer[.]xyz<br \/>informaer[.]info<\/p>\n<p><strong>Registrant information<\/strong><\/p>\n<p>guotang323@yahoo.com<br \/>+86.1066569215<\/p>\n<p><strong>Domains used in Dridex phishing campaign<\/strong><\/p>\n<p>corporatefaxsolutions[.]com<br \/>onenewpost[.]com<br \/>xeronet[.]org<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/10\/the-forgotten-domain-exploring-a-link-between-magecart-group-5-and-the-carbanak-apt\/\">The forgotten domain: Exploring a link between Magecart Group 5 and the Carbanak APT<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/10\/the-forgotten-domain-exploring-a-link-between-magecart-group-5-and-the-carbanak-apt\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Tue, 22 Oct 2019 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/10\/the-forgotten-domain-exploring-a-link-between-magecart-group-5-and-the-carbanak-apt\/' title='The forgotten domain: Exploring a link between Magecart Group 5 and the Carbanak APT'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/shutterstock_381864487.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Bread crumbs left behind open up a possible connection between Magecart Group 5 and Carbanak.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/advanced-persistent-threats\/\" rel=\"tag\">advanced persistent threats<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/apts\/\" rel=\"tag\">APTs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/attribution\/\" rel=\"tag\">attribution<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/carbanak\/\" rel=\"tag\">carbanak<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybercriminal-groups\/\" rel=\"tag\">cybercriminal groups<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dridex\/\" rel=\"tag\">dridex<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/group5\/\" rel=\"tag\">Group5<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magecart\/\" rel=\"tag\">Magecart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malicious-domains\/\" rel=\"tag\">malicious domains<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malicious-websites\/\" rel=\"tag\">malicious websites<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmer\/\" rel=\"tag\">skimmer<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/10\/the-forgotten-domain-exploring-a-link-between-magecart-group-5-and-the-carbanak-apt\/' title='The forgotten domain: Exploring a link between Magecart Group 5 and the Carbanak APT'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/10\/the-forgotten-domain-exploring-a-link-between-magecart-group-5-and-the-carbanak-apt\/\">The forgotten domain: Exploring a link between Magecart Group 5 and the Carbanak APT<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10864,11571,12861,11544,23244,11970,23245,19622,22521,22518,19623,10494],"class_list":["post-16655","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-advanced-persistent-threats","tag-apts","tag-attribution","tag-carbanak","tag-cybercriminal-groups","tag-dridex","tag-group5","tag-magecart","tag-malicious-domains","tag-malicious-websites","tag-skimmer","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16655"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16655\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16655"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}