{"id":17818,"date":"2020-02-25T10:45:02","date_gmt":"2020-02-25T18:45:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/25\/news-11551\/"},"modified":"2020-02-25T10:45:02","modified_gmt":"2020-02-25T18:45:02","slug":"news-11551","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/25\/news-11551\/","title":{"rendered":"North Korea Is Recycling Mac Malware. That&#8217;s Not the Worst Part"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5e547e50011ffb0008ff5a51\/master\/pass\/security-feature_art-reusing_malware-484363562.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 25 Feb 2020 12:00:00 +0000<\/strong><\/p>\n<p class=\"byline bylines__byline byline--author\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\"><span class=\"byline__name byline--with-bg\"><a class=\"byline__name-link\" href=\"\/contributor\/lily-hay-newman\">Lily Hay Newma<span class=\"link__last-letter-spacing\">n<\/span><\/a><\/span> <\/span><\/p>\n<p class=\"content-header__row content-header__dek\">Lazarus Group hackers have long plagued the internet&#8212;using at least one tool they picked up just by looking around online.<\/p>\n<p>For years, North Korea&#x27;s <a href=\"https:\/\/www.wired.com\/story\/north-korea-cyberattacks\/\">Lazarus Group hackers<\/a> have plundered and pillaged the global internet, scamming and infecting digital devices around the world for espionage, profit, and sabotage. One of their weapons of choice: a so-called loader that allows them to clandestinely run a diverse array of malware on targeted Macs with hardly a trace. But Lazarus didn&#x27;t create the loader on its own. The group seems to have found it laying around online, and repurposed it to elevate their attacks.<\/p>\n<p>The reality of malware reuse is well established. The NSA <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/theintercept.com\/2015\/06\/22\/nsa-gchq-targeted-kaspersky\/&quot;}\" href=\"https:\/\/theintercept.com\/2015\/06\/22\/nsa-gchq-targeted-kaspersky\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">reportedly<\/a> reuses malware, as do state sponsored hackers from <a href=\"https:\/\/www.wired.com\/story\/nsa-zero-day-symantec-buckeye-china\/\">China<\/a>, Russia, North Korea, and elsewhere. But at the RSA security conference in San Francisco on Tuesday, former National Security Agency analyst and Jamf researcher Patrick Wardle <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/objective-see.com\/blog\/blog_0x54.html&quot;}\" href=\"https:\/\/objective-see.com\/blog\/blog_0x54.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">will show<\/a> a particularly impactful example of how ubiquitous and extensive malware reuse really is, even on Macs\u2014and how vital it is to take the threat seriously.<\/p>\n<p>\u201cYou take malware that someone else has created, analyze it, and then reconfigure it so you can redeploy it,\u201d Wardle says. \u201cWhy would you develop something new when three-letter agencies and other groups are creating just incredible malware that\u2019s fully featured, fully tested, and a lot of times has even already been tested in the wild.\u201d<\/p>\n<p>&quot;The Lazarus Group programmers either googled this or saw the presentation about it.&quot;<\/p>\n<p>Patrick Wardle, Jamf<\/p>\n<p>Researchers saw Lazarus Group using early iterations of the loader in 2016 <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/securelist.com\/operation-applejeus\/87553\/&quot;}\" href=\"https:\/\/securelist.com\/operation-applejeus\/87553\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">and 2018<\/a>, and the tool has continued to <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/objective-see.com\/blog\/blog_0x49.html&quot;}\" href=\"https:\/\/objective-see.com\/blog\/blog_0x49.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">evolve<\/a> and <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/objective-see.com\/blog\/blog_0x51.html&quot;}\" href=\"https:\/\/objective-see.com\/blog\/blog_0x51.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">mature<\/a>. Once Lazarus tricks a victim into installing the loader\u2014typically through phishing or another scam\u2014it beacons out to the attacker&#x27;s server. The server responds by sending encrypted software for the loader to decrypt and run.<\/p>\n<p>The loader Wardle examined is especially appealing, because it is designed to run whatever \u201cpayload,\u201d or malware, it receives directly in a computer\u2019s random access memory, rather than installing it on the hard drive. Known as a <a href=\"https:\/\/www.wired.com\/2017\/02\/say-hello-super-stealthy-malware-thats-going-mainstream\/\">fileless malware attack<\/a>, this makes it much harder to detect an intrusion or investigate an incident later, because the malware doesn\u2019t leave records of having ever been installed on the system. And Wardle points out that the loader, a \u201cfirst stage\u201d attack tool, is payload-agnostic, meaning you can use it to run whatever type of \u201csecond stage\u201d attack you want on a target\u2019s system. But Lazarus didn&#x27;t come up with all these impressive tricks itself.<\/p>\n<p>&quot;All the code that implements the in-memory loader was actually grabbed from a <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/threatvector.cylance.com\/en_us\/home\/running-executables-on-macos-from-memory.html&quot;}\" href=\"https:\/\/threatvector.cylance.com\/en_us\/home\/running-executables-on-macos-from-memory.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Cylance blog post<\/a> and GitHub project where they released some open source code as part of research,&quot; Wardle says. Cylance is an antivirus firm that also conducts threat research. &quot;When I was analyzing the Lazarus Group loader I found basically an exact match. It&#x27;s interesting that the Lazarus Group programmers either googled this or saw the <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.youtube.com\/watch?v=a8gqzbLoU0Y&quot;}\" href=\"https:\/\/www.youtube.com\/watch?v=a8gqzbLoU0Y\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">presentation about it<\/a> at the Infiltrate conference in 2017 or something.&quot;<\/p>\n<p>This reuse illustrates the benefits to attackers of recycling sophisticated malware tools\u2014whether they come from intelligence agencies or <a href=\"https:\/\/www.wired.com\/story\/how-mimikatz-became-go-to-hacker-tool\/\">open source research<\/a>. The stolen Windows hacking tool EternalBlue developed by the NSA and then stolen and leaked in 2017 has infamously been used by virtually <a href=\"https:\/\/www.wired.com\/story\/eternalblue-leaked-nsa-spy-tool-hacked-world\/\">every hacking group<\/a> out there, from <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nytimes.com\/2019\/05\/06\/us\/politics\/china-hacking-cyber.html&quot;}\" href=\"https:\/\/www.nytimes.com\/2019\/05\/06\/us\/politics\/china-hacking-cyber.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">China<\/a> and <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\">Russia<\/a> to criminal syndicates. But while recycling is a widely known hacker practice, Wardle points out that just knowing about it abstractly isn\u2019t enough. He argues that security professionals need to meaningfully focus on the mechanics of the process so they can overcome the shortcomings of existing protections and malware detection methods.<\/p>\n<p>Take signature-based defenses, which work by essentially fingerprinting malicious programs and adding that identifier to a blacklist. Regular antivirus and malware scanning tools that rely on signatures generally fail to flag reused malware, because even the minor tweaks a new attacker makes change the program&#x27;s \u201csignature.\u201d<\/p>\n<p>Malware is typically set up to check in over the internet with a remote server\u2014a so-called \u201ccommand and control server\u201d\u2014to find out what to do next. In some cases, attackers have to extensively overhaul found malware to reuse it, but often, as is the case with the Lazarus loader, they can simply make small tweaks like changing the command and control address to point to their own server rather than the original developer\u2019s. Recyclers still need to do enough analysis to ensure that the malware\u2019s authors haven\u2019t designed a way for the malware to fall back to the original control server, but once they\u2019re sure they\u2019ve scrubbed the previous owners, they can assume full control.<\/p>\n<p>\u201cThis is why I think behavior-based detection is so important,\u201d says Wardle, who presented novel techniques for <a href=\"https:\/\/www.wired.com\/story\/gameplan-macos-security-tool-video-game-logic-engine\/\">behavior-based detection on macOS<\/a> at RSA last year. \u201cFrom a behavior point of view, repurposed malware looks and acts exactly the same as its predecessor. So we need to motivate the security tools community to step further and further away from signature-based detection, because it\u2019s unacceptable that if you redeploy malware it can go undetected. Repurposed malware should not pose any additional threats.\u201d<\/p>\n<p>Recycled malware also has the potential to <a href=\"https:\/\/www.wired.com\/story\/untold-story-2018-olympics-destroyer-cyberattack\/\">muddy attribution<\/a>, as Russia&#x27;s elite hackers know all to well. If a certain actor develops a trademark malware it can be easy to assume that all activity employing that tool comes from the same group.<\/p>\n<p>That anonymity is obviously a benefit for attackers, though, and one of many that come with malware reuse. That\u2019s why Wardle emphasizes the need to keep a close eye on such recycling over time.<\/p>\n<p>\u201cThe Lazarus Group first-stage loader to me seems like the perfect case study,\u201d Wardle says. \u201cIt drives home the point that with the ability to repurpose samples, the average hacker can weaponize advanced malware for their own goals\u2014and signature-based detection is not going to catch it.\u201d<\/p>\n<p><em>Updated February 25, 2020 at 9:35am ET to remove a reference to \u201cliving off the land.\u201d<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/malware-reuse-north-korea-lazarus-group\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5e547e50011ffb0008ff5a51\/master\/pass\/security-feature_art-reusing_malware-484363562.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 25 Feb 2020 12:00:00 +0000<\/strong><\/p>\n<p>Lazarus Group hackers have long plagued the internet\u2014using at least one tool they picked up just by looking around online.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-17818","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17818"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17818\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17818"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}