Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Present in Russia

Dec 27, 2024Ravie LakshmananCyber Assault / Knowledge Theft

The menace actor often called Cloud Atlas has been noticed utilizing a beforehand undocumented malware known as VBCloud as a part of its cyber assault campaigns concentrating on “several dozen users” in 2024.

“Victims get infected via phishing emails containing a malicious document that exploits a vulnerability in the formula editor (CVE-2018-0802) to download and execute malware code,” Kaspersky researcher Oleg Kupreev stated in an evaluation revealed this week.

Greater than 80% of the targets had been positioned in Russia. A lesser variety of victims have been reported from Belarus, Canada, Moldova, Israel, Kyrgyzstan, Turkey, and Vietnam.

Additionally known as Clear Ursa, Inception, Oxygen, and Crimson October, Cloud Atlas is an unattributed menace exercise cluster that has been energetic since 2014. In December 2022, the group was linked to cyber assaults geared toward Russia, Belarus, and Transnistria that deployed a PowerShell-based backdoor known as PowerShower.

Cybersecurity

Then precisely a 12 months later, Russian cybersecurity firm F.A.C.C.T. revealed that numerous entities within the nation had been focused by spear-phishing assaults that exploited an outdated Microsoft Workplace Equation Editor flaw (CVE-2017-11882) to drop a Visible Primary Script (VBS) payload answerable for downloading an unknown next-stage VBS malware.

Kaspersky’s newest report reveals that these parts are a part of what it calls VBShower, which is then used to obtain and set up PowerShower in addition to VBCloud.

The start line of the assault chain is a phishing e mail that accommodates a booby-trapped Microsoft Workplace doc that, when opened, downloads a malicious template formatted as an RTF file from a distant server. It then abuses CVE-2018-0802, one other flaw within the Equation Editor, to fetch and run an HTML Software (HTA) file hosted on the identical server.

“The exploit downloads the HTA file via the RTF template and runs it,” Kupreev stated. “It leverages the alternate data streams (NTFS ADS) feature to extract and create several files at %APPDATA%RoamingMicrosoftWindows. These files make up the VBShower backdoor.”

This features a launcher, which acts as a loader by extracting and operating the backdoor module in reminiscence. The opposite VB Script is a cleaner that cares about erasing the contents of all recordsdata contained in the “LocalMicrosoftWindowsTemporary Internet FilesContent.Word” folder, along with these inside itself and the launcher, thereby overlaying up proof of the malicious exercise.

chart

The VBShower backdoor is designed to retrieve extra VBS payloads from the command-and-control (C2) server that comes with capabilities to reboot the system; collect details about recordsdata in numerous folders, names of operating processes, and scheduler duties; and set up PowerShower and VBCloud.

PowerShower is analogous to VBShower in performance, the chief distinction being that it downloads and executes next-stage PowerShell scripts from the C2 server. It is also outfitted to function a downloader for ZIP archive recordsdata.

As many as seven PowerShell payloads have been noticed by Kaspersky. Every of them carries out a definite job as follows –

  • Get a listing of native teams and their members on distant computer systems through Lively Listing Service Interfaces (ADSI)
  • Conduct dictionary assaults on person accounts
  • Unpack ZIP archive downloaded by PowerShower and execute a PowerShell script contained inside it in an effort to perform a Kerberoasting assault, which is a post-exploitation approach for acquiring credentials for Lively Listing accounts
  • Get a listing of administrator teams
  • Get a listing of area controllers
  • Get details about recordsdata contained in the ProgramData folder
  • Get the account coverage and password coverage settings on the native laptop
Cybersecurity

VBCloud additionally capabilities loads like VBShower, however makes use of public cloud storage service for C2 communications. It will get triggered by a scheduled job each time a sufferer person logs into the system.

The malware is supplied to reap details about disks (drive letter, drive kind, media kind, measurement, and free house), system metadata, recordsdata and paperwork matching extensions DOC, DOCX, XLS, XLSX, PDF, TXT, RTF, and RAR, and recordsdata associated to the Telegram messaging app.

“PowerShower probes the local network and facilitates further infiltration, while VBCloud collects information about the system and steals files,” Kupreev stated. “The infection chain consists of several stages and ultimately aims to steal data from victims’ devices.”

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.

Recent articles