Connect with us

Hi, what are you looking for?

HEADLINES

Tomiris backdoor potentially hints at new activity of a threat actor behind the Sunburst attack

The Sunburst security incident hit the headlines in December 2020: The DarkHalo threat actor compromised a widely used enterprise software provider and for a long time used its infrastructure to distribute spyware under the guise of legitimate software updates. 

While investigating a yet unknown advanced persistence threat (APT), Kaspersky researchers came across new malware that contained several important attributes that potentially connect it to DarkHalo – the threat actor behind the Sunburst attack. It is considered one of the most impactful supply chain security incidents of recent years.

The Sunburst security incident hit the headlines in December 2020: The DarkHalo threat actor compromised a widely used enterprise software provider and for a long time used its infrastructure to distribute spyware under the guise of legitimate software updates. 

After the media hype and an extensive hunt by the security community, the actor seemed to go under the radar. After Sunburst, there were no major discoveries of incidents attributable to this actor – it appeared that the DarkHalo APT went offline. However, the results of recent research conducted by the Kaspersky Global Research and Analysis Team shows that this may not be the case. 

In June 2021, more than six months after DarkHalo went dark, Kaspersky researchers found traces of a successful DNS hijacking attack against several government organizations in the same country.

Advertisement. Scroll to continue reading.

DNS hijacking is a type of malicious attack in which a domain name (used to connect the URL address of a website with the IP address of the server where the website is hosted) is modified in a way that reroutes network traffic to an attacker-controlled server. 

In the case that Kaspersky discovered, the targets of the attack were trying to access the web-interface of a corporate email service but were redirected to a fake copy of that web-interface and then tricked into downloading a malicious software update. Following the attackers’ path, Kaspersky researchers retrieved the “update” and discovered it deployed a previously unknown backdoor: Tomiris.   

Further analysis showed that the main purpose of the backdoor was to establish a foothold in the attacked system and to download other malicious components. The latter, unfortunately, were not identified during the investigation; however, one other important observation was made: the Tomiris backdoor turned out to be suspiciously similar to Sunshuttle – malware deployed as a consequence of the infamous Sunburst attack. 

The list of similarities consists of, but is not limited to, the following:

  • Just like Sunshuttle, Tomiris was developed in Go programming language 
  • Each backdoor uses a single encryption/obfuscation scheme to encode both configurations and network traffic
  • Both rely on scheduled tasks for persistence, use randomness and sleep delays to hide their activities
  • The general workflow of the two programs, in particular the way features are distributed into functions, look similar enough that Kaspersky analysts suggest they could be indicative of shared development practices
  • English mistakes were found in both Tomiris (’isRunned’) and Sunshuttle (’EXECED’ instead of ’executed’) strings, which points to both malicious programs being created by people that do not speak English natively – it is widely acknowledged that the DarkHalo actor is Russian-speaking
  • Finally, the Tomiris backdoor was discovered in networks where other machines were infected with Kazuar – the backdoor which is known for its code overlaps with the Sunburst backdoor 

“None of these items, taken individually, is enough to link Tomiris and Sunshuttle with sufficient confidence. We freely admit that a number of these data points could be accidental, but still feel that taken together they at least suggest the possibility of common authorship or shared development practices,” says Pierre Delcher, security researcher at Kaspersky.

“If our guess that Tomiris and Sunshuttle are connected is correct, it would shed new light on the way threat actors rebuild capacities after being caught. We would like to encourage the threat intelligence community to reproduce this research and provide second opinions about the similarities we discovered between Sunshuttle and Tomiris,” adds Ivan Kwiatkowski, security researcher at Kaspersky. 

Advertisement. Scroll to continue reading.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

HEADLINES

The Philippines’ global ranking for local threats rose from 76th to 66th, highlighting the need for stronger cybersecurity measures.

HEADLINES

Despite 65% having adopted generative artificial intelligence (GenAI capabilities), 89% of IT leaders are concerned that flaws in GenAI cybersecurity tools could put their...

APPS

PSBank is reinforcing its commitment to security through key enhancements to its PSBank Mobile app.

Advertisement