{"id":15126,"date":"2016-02-08T15:40:14","date_gmt":"2016-02-08T15:40:14","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5152"},"modified":"2020-02-27T04:01:18","modified_gmt":"2020-02-26T17:01:18","slug":"adwind-rat-2","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/adwind-rat-2\/15126\/","title":{"rendered":"The wind that smells like RAT: The story of Adwind MaaS"},"content":{"rendered":"<p>The idea of renting out malware is not new. Successful malware writers soon hit on the idea that offering their creations to \u2018people-with-a-purpose\u2019 could be much more profitable than scouring the Internet themselves in the hope of a big catch. Yet offering <em>a service <\/em>proved even more profitable. It delivers convenience and simplicity to a much broader clientele, who might otherwise be incapable of using malware themselves (and lack the funds to hire mercenaries ready to do their bidding). Such a wide customer base could be expected to ensure a strong and steady income stream.<\/p>\n<p>The creator of the Adwind Remote Administration Tool felt he could have it all, and more, if he could broaden, not just the customer base, but also the range of affected platforms. So how did that work in practice? Let\u2019s see.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The wind that smells like #RAT: The story of #Adwind #MaaS<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fp8bc&amp;text=The+wind+that+smells+like+%23RAT%3A+The+story+of+%23Adwind+%23MaaS\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<h2>A RAT with many names and faces<\/h2>\n<p>At the end of 2015, an attack on a particular bank in Singapore was attempted. When the attack was discovered, a peculiar specimen of malware came under the microscope of the Kaspersky Lab Global Research and Analysis Team.\u00a0 It was written entirely in Java, and so could be launched under Windows, MacOS, Linux and Android alike. It also possessed surprisingly rich functionality \u2013 and considerable resilience to existing security solutions\u2019 detection methods. Such a unique combination of features captured the full attention of Kaspersky Lab\u2019s experts \u2013 which in turn led to some interesting results. The malware turned out to be one with many names \u2013 including Adwind RAT, Frutas, AlienSpy, Unrecom, Sockrat, JSocket etc \u2013 and a short but spectacular history.<\/p>\n<p>It was conceived between 2011 and 2012 by a member of a certain Spanish-speaking hacking forum. The first public release of the Frutas (as it was called back then) malware was in January 2012. The author worked away steadily, and soon its resistance to detection and broad functionality earned the malware wide popularity in the cybercriminal world. \u00a0Since then, it has changed hands and names several times, gaining in popularity and being continuously improved. Little more than a year after its debut, a subscription model was offered, turning Adwind into a full-scale example of easy-to-use MaaS (Malware-as-a-Service). At the same time, the malware began appearing in targeted attacks across the globe.<br>\nThe most recent incarnation of this peculiar malware goes under the name of JSocket. It is hard to credit, but its proprietors <em>openly advertise<\/em> it, as though offering something quite legitimate; and their shadowy hosting provider has so far avoided being located.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-5154 aligncenter\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2017\/05\/06020434\/adwind1-1024x614.png\" alt=\"adwind1\" width=\"1024\" height=\"614\"><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-5155 aligncenter\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2016\/02\/06020434\/adwind2-1024x305.png\" alt=\"adwind2\" width=\"1024\" height=\"305\"><\/p>\n<p style=\"text-align: center\"><em>Hard to believe these slick, user-friendly webpages are offering highly criminal services<\/em><\/p>\n<p>Would-be customers register with a valid email address, choose a subscription plan \u2013 and are even \u2018upsold\u2019 a wide choice of optional additional modules.<\/p>\n<h2>A purposeful and talented RAT<\/h2>\n<p>A phishing email with an attachment is the most common starting point for an Adwind-based targeted attack \u2013 that or just \u2018sand washing\u2019 in search of something useful. The attachment usually looks like a .JAR file, obfuscated and packed several times to complicate detection by static mechanisms. Sometimes it is embedded within an .HTA or even a .DOC\/.RTF file. To further confuse existing Windows security systems, the authors purposely use case-sensitive filenames and some other artifacts of *NIX-based development.<\/p>\n<p>Once the attachment is clicked on, the main backdoor is executed. Aside from being able to download and run additional tools, it possesses very broad functionality in itself. For example, it enables the operator to obtain extensive system information, steal passwords, clipboard contents and cryptocurrency keys, record video and audio, grab the keyboard input or set up a proxy server. The attacker can even start a chat with the victim \u2013 though it\u2019s difficult to imagine quite how this would go.<\/p>\n<p>The number of known C&amp;Cs is quite extensive and encompasses many geographic regions. There is proof that some Adwind-based targeted attacks directed at Asian-Pacific companies, with major focus on financial institutions, can be linked to the criminal activities of Nigerian immigrants in Malaysia<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-5156 aligncenter\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2016\/02\/06020433\/adwind3-1024x338.png\" alt=\"adwind3\" width=\"1024\" height=\"338\"><\/p>\n<p>Meanwhile the most attacked regions, regardless of motive, are now Russia, the UAE, Germany, Turkey and the US.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5157 aligncenter\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2016\/02\/06020433\/adwind4.png\" alt=\"adwind4\" width=\"842\" height=\"554\"><\/p>\n<h2>How to trap the RAT<\/h2>\n<p>Due to the specifics of pure-JAVA malware, as well as massive packing and obfuscation, many anti-malware engines have problems with Adwind detection. But with extensive Security Intelligence at their disposal, combined with leading-edge detection algorithms powered by continuously running in-Lab Machine Learning processes, Kaspersky Lab\u2019s products are able to detect Adwind samples. Given that (spear)phishing is the main attack vector, setting up a reliable mail security system is extremely important. <a href=\"https:\/\/www.kaspersky.com\/business-security\/mail-server\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Mail Servers<\/a> (which includes a version for Linux) comprises multiple mechanisms to detect and block these dangerous emails. Together with both signature and non-signature malware detection, the solution includes Anti-Phishing supported both by heuristics and by a cloud-assisted reputation system. These technologies allow the detection not just of mail attachments, but also of emails themselves (especially important given that Adwind operators are often careless about their phishing , and casually re-use them ).<\/p>\n<p>A JAVA machine can be a very vulnerable system component nowadays, and, especially in businesses like the banking, workstations performing only a limited number of tasks should ideally be stripped of it completely if mandatory software does not require it. If there is need for it, we recommend restricting some of the double-edged functionality, which could cause considerable harm if abused.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-advanced\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Protection for Business<\/a> comprises a Host-Based Intrusion Prevention System (HIPS, also called Application Privilege Control) providing the administrator with four restriction categories depending on trust level; these groups are also shared with an Application Firewall. To reduce risk, the JAVA interpreter can be put into the Highly Restricted group, severely limiting its (potentially dangerous) capabilities.<a href=\"#_ftn1\" name=\"_ftnref1\" target=\"_blank\" rel=\"noopener\">[1]<\/a> And if you need to disable JAVA selectively with considerable ease, you can do it by setting up a custom software category and restrict its use on selected endpoints.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Adwind MaaS: time to use a RAT-catcher #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fp8bc&amp;text=Adwind+MaaS%3A+time+to+use+a+RAT-catcher+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>It also worth noting that Adwind\u2019s mass phishing emails are often rather unsophisticated, relying on employees\u2019 carelessness and inattentiveness; how many employees would normally receive .JAR files anyway? Such phishing mails being acted on may suggest a lack of understanding of basic cybersecurity principles. This can readily be improved with the help of <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/intelligence-services\" target=\"_blank\" rel=\"noopener nofollow\">Cybersecurity Awareness Training<\/a> available from Kaspersky Lab.<\/p>\n<p>All in all, using multi-layered security is crucial today \u2013 as many reports including the widely known <a href=\"https:\/\/securelist.com\/threats\/strategies-for-mitigating-advanced-persistent-threats-apts-4\/\" target=\"_blank\" rel=\"noopener\">ASD Mitigation Strategies<\/a> keep emphasizing. And it is obviously simpler and more convenient when the majority of these layers are provided by a single vendor and managed through one unified administration console.<\/p>\n<p>Don\u2019t underestimate the risk:\u00a0 any schoolboy today with a bad attitude and $25 in his pocket could potentially arm himself with an extremely powerful and dangerous toolset offered by Adwind, and do a great deal of harm \u2013 even to an Enterprise of considerable size. Highly motivated cybercriminals can do much, much more. Clearly, it is time to arm yourself with a proper RAT-catcher \u2013 from the leader in the IT Security Industry.<\/p>\n<p>Kaspersky Lab\u2019s products detect different variations of Adwind with the following verdict:<\/p>\n<p><em>HEUR:Backdoor.Java.Generic<\/em><\/p>\n<p>To know more about Adwind, <a href=\"https:\/\/securelist.com\/blog\/research\/73660\/adwind-faq\" target=\"_blank\" rel=\"noopener\">read this blogpost on Securelist<\/a>!<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\" target=\"_blank\" rel=\"noopener\">[1]<\/a> The administrator should test the policy carefully before implementation, to ensure any necessary JAVA-based apps functionality is retained.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Successful malware writers quickly figured that offering their creations to &#8216;people-with-a-purpose&#8217; could be very profitable. Yet offering a service proved even more lucrative. <\/p>\n","protected":false},"author":610,"featured_media":15469,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[1415,1424],"class_list":{"0":"post-15126","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-adwind","10":"tag-thesas2016"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/adwind-rat-2\/15126\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/adwind-rat-2\/15126\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/adwind-rat-2\/15126\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/adwind\/","name":"Adwind"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/610"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=15126"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15126\/revisions"}],"predecessor-version":[{"id":26818,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15126\/revisions\/26818"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15469"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=15126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=15126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=15126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}