{"id":19827,"date":"2022-08-11T04:26:24","date_gmt":"2022-08-11T12:26:24","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/08\/11\/news-13560\/"},"modified":"2022-08-11T04:26:24","modified_gmt":"2022-08-11T12:26:24","slug":"news-13560","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/08\/11\/news-13560\/","title":{"rendered":"Maui and DTrack malware in the service of Andariel | Kaspersky official blog"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/08\/10185117\/andariel-dtrack-maui-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Hugh Aver| Date: Thu, 11 Aug 2022 06:16:25 +0000<\/strong><\/p>\n<p>Our experts investigated the activity of Andariel, believed to be a subgroup of the Lazarus APT group. Cybercriminals use DTrack malware and Maui ransomware to attack businesses worldwide. As it&#8217;s typical for Lazarus, the group attacks for financial gain \u2014 this time through ransom demands.<\/p>\n<h2>Targets of Andariel attacks<\/h2>\n<p>Our experts concluded that, instead of focusing on any particular industry, the Andariel group is ready to attack any company. In June, the US Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-187a\" target=\"_blank\" rel=\"nofollow noopener\">reported<\/a> that Maui ransomware targets mainly companies and government organizations in the US healthcare sector. However, our team also detected at least one attack on a housing company in Japan, as well as several victims in India, Vietnam and Russia.<\/p>\n<h2>Andariel tools<\/h2>\n<p>The Andariel group&#8217;s primary tool is the long-established malware, DTrack. It collects information about a victim and sends it to a remote host. Among other things, DTrack collects browser history and saves it to a separate file. The variant used in Andariel attacks is able not only to send the harvested information to the cybercriminals&#8217; server via HTTP, but to store it on a remote host in the victim&#8217;s network.<\/p>\n<p>When the attackers find noteworthy data, Maui ransomware comes into play. It&#8217;s generally detected on attacked hosts 10 hours after DTrack malware activation. Our colleagues from Staiwell have <a href=\"https:\/\/stairwell.com\/wp-content\/uploads\/2022\/07\/Stairwell-Threat-Report-Maui-Ransomware.pdf\" target=\"_blank\" rel=\"nofollow noopener\">studied<\/a> its samples and concluded that the ransomware is controlled manually by the operators \u2014 that is, they specify which data to encrypt.<\/p>\n<p>Another tool the attackers appear to be using is 3Proxy. This legitimate, free, cross-platform proxy server is likely of interest to attackers due to its compact size (only a few hundred kilobytes). This type of tool can be used to maintain remote access to a compromised computer.<\/p>\n<h2>How Andariel spreads its malware<\/h2>\n<p>The cybercriminals exploit unpatched versions of public online services. In one such case, the malware was downloaded from an HFS (HTTP file server): the attackers used an unknown exploit that enabled them to run a Powershell script from a remote server. In another, they were able to compromise a WebLogic server through an exploit for the CVE-2017-10271 vulnerability, which ultimately allowed them to run a script.<\/p>\n<p>For a more detailed technical description of the attack and the tools involved, along with indicators of compromise, see our <a href=\"https:\/\/securelist.com\/andariel-deploys-dtrack-and-maui-ransomware\/107063\/\" target=\"_blank\" rel=\"noopener\">Securelist post<\/a>.<\/p>\n<h2>How to stay safe?<\/h2>\n<p>First of all, make sure that all corporate devices, including servers, are equipped with <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\">robust security solutions<\/a>. In addition, it would be wise to devise an <a href=\"https:\/\/www.kaspersky.ru\/blog\/anti-ransomware-strategy\/33057\/\" target=\"_blank\" rel=\"noopener\">anti-ransomware strategy<\/a> and measures in advance just in case you do get infected.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-ransomware\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/andariel-dtrack-maui\/45130\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/08\/10185117\/andariel-dtrack-maui-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Hugh Aver| Date: Thu, 11 Aug 2022 06:16:25 +0000<\/strong><\/p>\n<p>Andariel, a subgroup of Lazarus, uses Maui ransomware and DTrack spyware to carry out financially targeted attacks on companies.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[1001,12177,87,12223,3765],"class_list":["post-19827","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-business","tag-enterprise","tag-extortion","tag-lazarus","tag-ransomware"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19827"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19827\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}