Hackers are reviving a long-forgotten malware to help evade detection

Hackers are reviving a long-forgotten malware to help evade detection
Illustration of a laptop with a magnifying glass exposing a beetle on-screen

(Image credit: Shutterstock / Kanoktuch)

A known Chinese threat actor is recycling old malware (opens in new tab), in an attempt to evade detection, cut down on costs, and send researchers on a wild goose chase. 

A report from Symantec says the group, known as Webworm, has used at least three ancient malware variants (and by “ancient”, we mean from 2008 – 2017), modified them a little bit, and then tested them out against IT service providers in Asia to see how they work. 

Given the malware’s age, they sometimes manage to fly under antivirus (opens in new tab) solutions’ radars, they added. 

Stealthy RATs

The first one is called Trochilus RAT, in circulation since at least 2015, and freely available on GitHub. 

It was first discovered attacking people visiting a Myanmar website. Webworm tweaked it so that it can load its configuration from a file by checking in a set of hardcoded directories. It was also said to have the ability to move laterally across endpoints (opens in new tab) in the target network, for better access. The second one is 9002 RAT, a stealthy remote access trojan that’s now gotten better encryption for its communication protocol, which made it even more difficult to detect. 

Finally, the third is called Gh0st RAT, a 14-year-old trojan that now comes with “several layers of obfuscation, UAC bypassing, shellcode unpacking, and in-memory launch”. 

While it’s difficult to know exactly which threat actor is behind Webworm’s revival, Symantec seems to believe it’s the same group as Space Pirates – a Chinese threat actor discovered by Positive Technologies in May this year. Back then, Positive Technologies analyzed Gh0st RAT and named it Deed RAT. 

In any case, Webworm is a known cybercriminal group that’s been in operation since at least 2017. In the past, the group has been linked with various attacks on IT firms, aerospace organizations, as well as electrical energy providers in Russia, Georgia, and Mongolia. 

Via: BleepingComputer (opens in new tab)

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read More

Share:

Leave a Reply

Your email address will not be published. Required fields are marked *

Search this website