{"id":28272,"date":"2020-10-08T06:22:11","date_gmt":"2020-10-08T10:22:11","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/montysthree-industrial-cyberspy\/28272\/"},"modified":"2020-10-09T02:15:50","modified_gmt":"2020-10-08T15:15:50","slug":"montysthree-industrial-cyberspy","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/montysthree-industrial-cyberspy\/28272\/","title":{"rendered":"MontysThree: Industrial cyberspy"},"content":{"rendered":"<p>Our experts have found traces of activity of a new cybercriminal group that spies on industrial enterprises. The crooks are carrying out targeted attacks, using a tool that our researchers call MontysThree, looking for documents on victims\u2019 computers. The group appears to have been active since at least as far back as 2018.<\/p>\n<h2>How MontysThree infects computers<\/h2>\n<p>The cybercriminals use classic spear-phishing techniques to penetrate victims\u2019 computers, sending e-mails containing executable files that look like documents in .pdf or .doc format to employees of industrial enterprises. Such files are typically named \u201cCorporate data update,\u201d \u201cTechnical specification,\u201d \u201cList of employee phone numbers 2019,\u201d and the like. In some cases, the attackers try to make the files look like medical documents, with names like \u201cMedical analysis results\u201d or \u201cInvitro-106650152-1.pdf\u201d (Invitro is one of the largest Russian medical labs).<\/p>\n<h2>What the attackers want<\/h2>\n<p>MontysThree preys on specific documents in Microsoft Office and Adobe Acrobat formats located in various directories and on connected media. After infection, the malware profiles the victim\u2019s computer, sending the system version, a list of processes, and desktop snapshots to its <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/command-and-control-server-cc\/\" target=\"_blank\" rel=\"noopener\">C&amp;C server<\/a>, as well as lists of recently opened documents with the extensions .doc, .docx, .xls, .xlsx, .rtf , .pdf, .odt, .psw, and .pwd in the USERPROFILE and APPDATA directories.<\/p>\n<h2>What else MontysThree can do<\/h2>\n<p>The authors implemented several rather unusual mechanisms in their malware. For example, after infection, the downloader module extracts and decodes the main module, which is encrypted in a picture using <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/steganofraphy\/\" target=\"_blank\" rel=\"noopener\">steganography<\/a>. Our experts believe that the attackers wrote the steganography algorithm from scratch, that they didn\u2019t simply copy it from open-source samples, as is most commonly the case.<\/p>\n<p>The malware communicates with the C&amp;C server using public cloud services such as Google, Microsoft, and Dropbox, as well as WebDAV. In addition, the communications module can make requests through RDP and Citrix. What\u2019s more, the malware creators did not embed any communication protocols in their code; instead, MontyThree uses legitimate programs (RDP, Citrix clients, Internet Explorer).<\/p>\n<p>So as to keep the malware in the victim\u2019s system as long as possible, an auxiliary module modifies the shortcuts on the Windows Quick Launch panel, so when the user launches a shortcut (for example, to a browser), the MontyThree loader module is executed at the same time.<\/p>\n<h2>Who are the attackers?<\/h2>\n<p>Our experts see no signs linking MontysThree\u2019s creators to past attacks. By all appearances, it is a completely new cybercriminal group, and judging by pieces of text in the code, the authors\u2019 native language is Russian. Likewise, their main targets are most likely Russian-speaking companies; some of the directories the malware rummages through exist only in the Cyrillic version of the system. Although our experts also found account details for communications services that hint at a Chinese origin, they believe those are false flags meant to obfuscate the attackers\u2019 tracks.<\/p>\n<p>A <a href=\"https:\/\/securelist.com\/montysthree-industrial-espionage\/98972\/\" target=\"_blank\" rel=\"noopener\">detailed technical description of MontysThree, together with indicators of compromise<\/a>, is available in our post on the Securelist website.<\/p>\n<h2>What to do<\/h2>\n<p>For a start, convey to all employees once again that targeted attacks most often begin with an e-mail, so they need to be extremely careful when opening files, especially ones they were not expecting. To make doubly sure they understand why they need to stay alert, we recommend not only explaining the dangers of such behavior, but also fostering skills in countering modern cyberthreats using the <a href=\"https:\/\/k-asap.com\/en\/?icid=au_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n<p>Moreover, to protect against sophisticated targeted attacks, use <a href=\"https:\/\/www.kaspersky.com.au\/enterprise-security\/threat-management-defense-solution?icid=au_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____tmd___\" target=\"_blank\" rel=\"noopener\">integrated security solutions<\/a> that combine workstation protection, EDR capabilities, and additional tools for analyzing and defeating attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are using steganography to hide their code and seek industrial data.<\/p>\n","protected":false},"author":2581,"featured_media":28273,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2993],"tags":[499,729,2432,337,3287,3360,333],"class_list":{"0":"post-28272","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-apt","10":"tag-espionage","11":"tag-industrial-security","12":"tag-sas","13":"tag-sas-2020","14":"tag-sashome","15":"tag-security-analyst-summit"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/montysthree-industrial-cyberspy\/28272\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/montysthree-industrial-cyberspy\/21976\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/montysthree-industrial-cyberspy\/17454\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/montysthree-industrial-cyberspy\/23423\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/montysthree-industrial-cyberspy\/21611\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/montysthree-industrial-cyberspy\/20265\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/montysthree-industrial-cyberspy\/24049\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/montysthree-industrial-cyberspy\/23048\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/montysthree-industrial-cyberspy\/8903\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/montysthree-industrial-cyberspy\/37263\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/montysthree-industrial-cyberspy\/15785\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/montysthree-industrial-cyberspy\/16173\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/montysthree-industrial-cyberspy\/25442\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/montysthree-industrial-cyberspy\/12046\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/montysthree-industrial-cyberspy\/29387\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/montysthree-industrial-cyberspy\/26198\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/montysthree-industrial-cyberspy\/28096\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/sas\/","name":"SAS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=28272"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28272\/revisions"}],"predecessor-version":[{"id":28275,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28272\/revisions\/28275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/28273"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=28272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=28272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=28272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}