{"id":20407,"date":"2022-10-19T07:20:58","date_gmt":"2022-10-19T15:20:58","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/10\/19\/news-14140\/"},"modified":"2022-10-19T07:20:58","modified_gmt":"2022-10-19T15:20:58","slug":"news-14140","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/10\/19\/news-14140\/","title":{"rendered":"Sophos X-Ops finds Attackers Using Covert Channels in Backdoor Against Devices"},"content":{"rendered":"<p><strong>Credit to Author: gallagherseanm| Date: Wed, 19 Oct 2022 14:00:46 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p><span data-contrast=\"auto\">Recently Sophos X-Ops investigated a new series of limited attacks with malware that had unique characteristics that indicate its creators and operators spent considerable time and effort to create covert methods of communicating with, and issuing commands to, the impacted devices.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">While performing our investigation, we found that the threat actor(s) had installed at least eight different types of malicious files inside of impacted devices.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As we saw in a previous <\/span><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/06\/15\/sophos-uncovers-how-apt-groups-carried-out-highly-targeted-attack\/\"><span data-contrast=\"none\">incident,<\/span><\/a><span data-contrast=\"auto\"> these attackers created some of these malicious files by modifying a few of the files that are used in the SFOS operating system, while others appeared to be close copies of &#8220;commodity&#8221; Linux malware, such as Gh0st RAT.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What follows is a defender\u2019s analysis of the malware and its covert communications methods.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Hands in the cookies JAR<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">These attacks began with exploitation of CVE-2022-3236 which is detailed in <\/span><a href=\"https:\/\/www.sophos.com\/en-us\/security-advisories\/sophos-sa-20220923-sfos-rce\"><span data-contrast=\"none\">Sophos Security Advisory sophos-sa-20220923-sfos-rce<\/span><\/a><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Parts of SFOS employ Java applications that run under the Jetty web server on the device, itself. The threat actors modified a small number of Java files that make up parts of the device&#8217;s internal functionality, adding additional code into the files. This method preserves the device&#8217;s own functions, so it remained operational despite the modifications after they overwrote the original files with their modified versions.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Java JAR files typically contain one or more of what are known as .class files; these .class files contain the functional programming of the Java application.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">One of the files we discovered the attackers modified is a Java application named <\/span><b><span data-contrast=\"auto\">servlet-api-3.1.jar<\/span><\/b><span data-contrast=\"auto\">. The threat actors changed <\/span><b><span data-contrast=\"auto\">HttpServlet.class<\/span><\/b><span data-contrast=\"auto\"> stored in this JAR to add some of their own code, recompiled the JAR with the modified .class file, and uploaded the JAR into the affected devices.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This JAR checks the validity of HTTP methods that the server might encounter in a web request header (such as a POST or a GET request). As such, it sits in a critical position where it can inspect characteristics of inbound web traffic.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_87471\" aria-describedby=\"caption-attachment-87471\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig-1-yukon.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-87471\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig-1-yukon.png\" alt=\"\" width=\"640\" height=\"245\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig-1-yukon.png 704w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig-1-yukon.png?resize=300,115 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-87471\" class=\"wp-caption-text\">Figure 1: The encryption algorithm used by the modified httpservlet to encrypt stolen credentials<\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">The added code gave the JAR file the ability to serve as a backdoor for the threat actors. It also lay in wait for a user or administrator to attempt to log in to the device, captured the logins and passwords in real time, then encrypted the stolen credential data using a custom algorithm and wrote it out to a file in the \/tmp\/ directory on the device.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The backdoor functionality was quite sophisticated. The threat actor(s) responsible for this code built a few safeguards into the process to ensure that nobody but the threat actor(s) could use the backdoor code. For instance, the code added to this file parses the header contents of the inbound requests and checks for the presence of a &#8220;JSESSIONID&#8221; key in the Cookies header.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Content under this header value gets processed by the new code, which decrypts the contents of this JSESSIONID value using a method that uses the numeric values for the month and the day of the month to calculate the key, which means that the key used to decrypt the data changes every day, but is predictable by the algorithm.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The decrypted first byte of the web requests data stream contains a short value that points to one of seven different types of commands they can execute. In brief, the Trojanized code can list directories; read, write to, copy, delete, or rename individual files; or execute commands in the native shell on the device.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_87472\" aria-describedby=\"caption-attachment-87472\" style=\"width: 637px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig2-yukon.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-87472 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig2-yukon.png\" alt=\"Figure 2 The command &quot;cases&quot; used by the modified httpservlet\u00a0\" width=\"637\" height=\"243\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig2-yukon.png 637w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig2-yukon.png?resize=300,114 300w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/a><figcaption id=\"caption-attachment-87472\" class=\"wp-caption-text\">Figure 2: The command &#8220;cases&#8221; used by the modified httpservlet<\/figcaption><\/figure>\n<p><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">2<\/span><\/i><i><span data-contrast=\"none\"> The command &#8220;cases&#8221; used by the modified httpservlet<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">There&#8217;s nothing unusual about this type of data; JSESSIONID is a normal, legitimate type of information that can be passed via a cookie to a Java servlet. The use of this method to instruct the malware to do this is incredibly subtle and very covert, and highly unusual in more conventional malware.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The attackers receive feedback telemetry from the trojanized file about both successful and unsuccessful attempts to use the trojan code functions.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_87473\" aria-describedby=\"caption-attachment-87473\" style=\"width: 697px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig3-yukon.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-87473 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig3-yukon-e1666139746247.png\" alt=\"Figure 3 The Trojanized HttpServlet uses a specific format to log stolen data\u00a0\" width=\"697\" height=\"142\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig3-yukon-e1666139746247.png 697w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/fig3-yukon-e1666139746247.png?resize=300,61 300w\" sizes=\"auto, (max-width: 697px) 100vw, 697px\" \/><\/a><figcaption id=\"caption-attachment-87473\" class=\"wp-caption-text\">Figure 3: The Trojanized HttpServlet uses a specific format to log stolen data<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h3><span data-contrast=\"none\">Attackers drop a bad ELF shell stager<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">During the exploit process, the attackers Trojanized legitimate files normally present on the device (named <\/span><b><span data-contrast=\"auto\">screenmgr.pl <\/span><\/b><span data-contrast=\"auto\">and <\/span><b><span data-contrast=\"auto\">WebsocketServer.pm<\/span><\/b><span data-contrast=\"auto\">). The attackers modified the <\/span><i><span data-contrast=\"auto\">screenmgr<\/span><\/i><span data-contrast=\"auto\"> file such that, when the attackers killed and restarted the process, it had (and could keep) &#8216;root&#8217; level permissions. This file then sets up <\/span><i><span data-contrast=\"auto\">WebsocketListener<\/span><\/i><span data-contrast=\"auto\">, which then works with the trojanized version of <\/span><i><span data-contrast=\"auto\">WebsocketServer<\/span><\/i><span data-contrast=\"auto\"> to provide Perl-based <\/span><i><span data-contrast=\"auto\">eval<\/span><\/i><span data-contrast=\"auto\"> as a root user. Along with these modifications, we also saw it deliver a small ELF executable, in the form of a small blob of base64-encoded data.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The general purpose of this ELF binary (Linux\/Loit-X) is to set the mount namespace of the process to the same as \/proc\/1\/ns\/mnt and call a shell. This binary provides a mount namespace breakout as long as the native procfs is not isolated from the context of the exploited process and as long as the process hasn\u2019t been hardened by seccomp to restrict system calls to \u201csetns\u201d. Given services are leveraging seccomp to prevent calls to \u201csetns\u201d, amongst other hardening measures, and the exploit code does not appear to call this file it would seem this is a remnant from when the attackers were developing and testing their exploit and they may have been unsuccessfully targeting services directly at an early stage before pivoting their target to another process structure.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Custom Metasploit module<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">During the attacks on some devices, the threat actor(s) delivered a customized JAR Metasploit module based on an existing payload named <\/span><a href=\"https:\/\/github.com\/rapid7\/metasploit-javapayload\/blob\/dee9809f78a7e86981a8f39e0622f05458c85940\/javapayload\/src\/main\/java\/metasploit\/Payload.java\"><b><span data-contrast=\"none\">Payload.java<\/span><\/b><\/a><span data-contrast=\"auto\">. On affected systems, we found that this file was written to the device&#8217;s file storage as a file named <\/span><b><span data-contrast=\"auto\">syslog-ng.cfg<\/span><\/b><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Metasploit module was as close to &#8220;stock&#8221; from the company&#8217;s Github as possible, with the only changes being the configuration data used by the Metasploit module to define its command-and-control server address, and the port number it will connect to.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We were able to determine that, when this file was running, it would create a copy of itself named <\/span><b><span data-contrast=\"auto\">\/tmp\/~spawn[randomChars].tmp.dir. <\/span><\/b><span data-contrast=\"auto\">After each execution, the file tries to delete itself.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Malicious backdoor functionality in <\/span><i><span data-contrast=\"none\">SessionAgent<\/span><\/i><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">We found at least six different variants of an ELF binary malware we refer to as <\/span><b><span data-contrast=\"auto\">Linux\/Backdr-NQ<\/span><\/b><span data-contrast=\"auto\">. The malware named its main class <\/span><b><span data-contrast=\"auto\">CResoule<\/span><\/b><span data-contrast=\"auto\"> and contained a configuration file encrypted using the RC4 algorithm.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It establishes persistence by appending its execution path to a file named <\/span><b><span data-contrast=\"none\">\/etc\/rc.d\/S00null<\/span><\/b> <span data-contrast=\"auto\">that executes at bootup.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The malware contained several command-and-control addresses. The bot appears to use a time-based seed that randomizes a new AES key for each active connection session. The malware first sends this key to the C2 server then uses the key to encrypt outbound communication with the C2 while the connection is active. Its embedded config includes a path for an external AES-encrypted config file to be loaded as an override of its embedded config, such as<\/span><b><span data-contrast=\"auto\"> \/var\/cache\/update.log<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The malware has a feature that checks inbound traffic for a specific byte and executes various types of backdoor functions based on that value. The bot can be instructed to upload files to the C2 (or download file from there), modify its own configuration, execute a command on the device, or close the connection to the C2.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Termite malware delivered via Clientless VPN<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Digging further into the impacted devices, we found data on some devices that pointed to yet another remote access trojan in use. The malware (which we now detect as Linux\/Gognt-O) is a UPX-packed ELF binary, roughly 2.3MB in size. During its connection, the malware writes out a log line that includes the string &#8220;Termite (v [number]) starting&#8230;&#8221; with a very, <\/span><i><span data-contrast=\"auto\">very<\/span><\/i><span data-contrast=\"auto\"> specific version number of 2.0200204206304400404<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The malware is a typical backdoor with the added functionality of being able to serve as a SOCKS proxy, which would allow it to intercept the contents of some kinds of web traffic.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Another Gh0st RAT strikes<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Some machines were the recipients of one of at least three variations on the Gh0st RAT ELF binary (detected as Linux\/Rekoobe-A). As in the CVE-2022-1040 attack, the attackers built a malware that inspects all ping packets, waiting for a specially crafted ping packet that would not, otherwise, occur &#8220;in nature.&#8221;\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The ping packet, if validated correctly, can be used to trigger the device into either opening a reverse shell back to the address provided by the attacker (that address being delivered within the ping packet&#8217;s &#8220;data&#8221; section), or it will bind and listen on port <\/span><b><span data-contrast=\"auto\">31234<\/span><\/b><span data-contrast=\"auto\"> to accept a connection from a C2. The bot makes an additional validation check once a connection is established. This technique is known as Traffic Signalling, and is detailed as technique T1205 in the MITRE ATT&amp;CK framework.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>Conclusion<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">As we see, these targeted attacks mixed both custom and commodity malware seeking to create cover channels to control the devices. In addition, the attackers took steps to hide their tracks. Combined, these actions created a hard-to-detect attack the demonstrates a sophisticated threat actor seeking to maximize their control of the device while minimizing the risks of detection.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>Indicators of Compromise (IoCs)<\/h3>\n<p><span data-contrast=\"auto\">We are making IoCs available <a href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/CVE-2022-3236_IOCs.csv\">on our GitHub here<\/a>.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4><span data-contrast=\"none\">Acknowledgments<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<h4><span data-contrast=\"auto\">Sophos wishes to thank Trend Micro for working with us on their <\/span><a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2022\/10\/19\/cve-2022-3236-sophos-firewall-user-portal-and-web-admin-code-injection\"><span data-contrast=\"none\">advisory<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<h4><span data-contrast=\"auto\">Timothy Easton, Craig Jones, Brijesh Rajput, Tom Sage, and Emily Taylor all contributed to this report.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/10\/19\/sophos-x-ops-finds-attackers-using-covert-channels-in-backdoor-against-devices\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/shutterstock_351363953.jpg\"\/><\/p>\n<p><strong>Credit to Author: gallagherseanm| Date: Wed, 19 Oct 2022 14:00:46 +0000<\/strong><\/p>\n<p>Newly discovered attack combines custom and commodity malware <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[24552,16771],"class_list":["post-20407","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-security-operations","tag-threat-research"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20407"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20407\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}