CyberWire Daily - DUCKTAIL waddles back again. [Research Saturday]

Episode Date: January 14, 2023

Mohammad Kazem Hassan Nejad from WithSecure joins Dave to discuss the team’s research, “DUCKTAIL returns - Underneath the ruffled feathers.” DUCKTAIL is a financially motivated malware operation... that targets individuals and businesses operating on the Facebook Ads and Business platform. The research states “The malware is designed to steal browser cookies and take advantage of authenticated Facebook sessions to steal information from the victim's Facebook account.” WithSecure has found that after a short hiatus, DUCKTAIL has returned with slight changes in their mode of operation. The research can be found here: DUCKTAIL returns: Underneath the ruffled feathers Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. of you, I was concerned about my data being sold by data brokers. So I decided to try Delete.me. I have to say, Delete.me is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Delete.me's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life Thank you. Hello, everyone, and welcome to the CyberWire's Research Saturday. I'm Dave Bittner, and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems of protecting ourselves in a rapidly
Starting point is 00:01:45 evolving cyberspace. Thanks for joining us. So in the past year, I've been investigating and tracking this financially motivated cyber crime operation that's based in Vietnam. financially motivated cybercrime operation that's based in Vietnam. That's Mohamed Kazem Hassad Najad from WithSecure's intelligence unit. The research we're discussing today is titled Ducktail Returns Underneath the Ruffled Feathers. And we initially got notice of this operation through a sample that we received from our threat hunters that run our managed detection and response service.
Starting point is 00:02:39 Well, let's go through it together here from a high level. Who are these people targeting? So the operation targets individuals and businesses that operate on Meta or Facebook's business and ads platform. And that's basically a platform that a company would use to run and manage Facebook pages and ad campaigns across Meta's different platforms such as Facebook and Instagram. Well, let's go through it together here. How would someone find themselves falling victim to this? So the threat actor primarily targets those that are in the digital marketing and advertisement vertical, as those are folks that most likely make use of Facebook's business and ads platform. The threat actor first scouts for these victims and targets them through mediums such as
Starting point is 00:03:27 LinkedIn and WhatsApp by sending them attachments that supposedly contain things such as business and advertisement proposals for different brands, such as L'Oreal. And even recently, we've been seeing the threat actor using lures that contain the Christmas theme as Christmas is approaching. That's interesting. So someone gets one of these attachments, but what's in the attachment there? What kind of malware is contained within? Yeah, so the attachment actually contains an information stealer malware that is disguised, like I mentioned, as a project plan or a business proposal. And once the victim executes the information stealer malware, the malware then proceeds to exfiltrate information from the victim's machine and Facebook account if the victim has logged on to their Facebook account on their device. account if the victim has logged on to their Facebook account on their device, and also automatically attempt to add the attacker's email address as an administrator with finance editor
Starting point is 00:04:31 role into any business that the victim might have access to. Well, let's talk about the Facebook aspect of this. Can you give us a little bit of the background here? What are people typically doing on Facebook, the businesses, and what exactly are these bad guys targeting? What are people typically doing on Facebook, the businesses, and what exactly are these bad guys targeting? What are the capabilities they're after within Facebook itself? Sure. So basically one of the biggest revenues and profits for Meta and Facebook is the ads revenue. And that's where Meta makes most of their money from. And a lot of companies use Facebook and Meta's advertisement platform and business platform to reach the user base that Meta provides. And the advertisement agencies and digital marketing folk will use this platform to run
Starting point is 00:05:22 ad campaigns for, let's say, a specific product that they might be launching soon. And these assets are basically controlled through a business account that is linked to the company. And the business account will have basically personal Facebook accounts that will manage certain assets in that or for that business. And with the business account, there will be a payment method that will be linked to it that's used for running these ad campaigns. And what the threat actor is basically after by hijacking these Facebook business accounts, by adding themselves as an administrator with finance editor role is to get access to this business's payment methods to then leverage it in order to run
Starting point is 00:06:14 fraudulent ads. So what kind of ads would they be running? What sort of things are they after here? Are they selling ads to someone else? Are they running things for themselves? after here? Are they selling ads to someone else? Are they running things for themselves? Well, the evidence strongly suggests that the goal of the operation is to gain access to the business accounts and use the hijacked businesses advertising credits and payment methods to run fraudulent ads. But because this sort of information is not really visible to us. We've only been able to see some of the advertisements that have been run through hijacked or compromised business accounts through our incident response cases. And in those cases, they were mainly fraudulent ads
Starting point is 00:07:01 that seemed legitimate. But what we believe the business model basically behind this operation is to probably provide advertisements for a much lower rate than what Meta would offer. So are they trying to be stealthy at all here once they get access to someone's Facebook business account? Are they trying to fly stealthy at all here once they get access to someone's Facebook business account? Are they trying to fly under the radar or are they trying to burn through as much as they can as quickly as can until their access is cut off? Yeah, absolutely. I mean, the whole operation,
Starting point is 00:07:37 so the operation consists of the attack lifecycle basically consists of multiple stages that cross multiple platforms. So starting from how the victims are basically targeted. So usually with malware, you see malware being delivered through malicious spam campaigns. So a lot of victims might get a malicious attachment. But with this basically campaign, the threat actor directly targets those that they believe have access or make use of Meta's business and ads platform. So right off the bat, they're specifically targeting individuals that they believe might have access to fly under their radar. And then the malware or the information stealer malware actually makes use of different techniques in order to bypass different detection mechanisms.
Starting point is 00:08:35 For instance, since mid-2021, the time that we believe the campaign had started, the threat actor has been making use of certificates to sign their malware with extended validation. And in order to do this, they actually need to set up or have a business that they can register a certificate for through a certificate authority. And that's a very rigorous process in order to get an extended validation cert. So there's a lot of resource development that goes in there. And what having a signed malware basically does with extended validation, we believe this will bypass Microsoft SmartScreen. So these attachments, as they look like business proposals, the icon will look like a PDF or a spreadsheet.
Starting point is 00:09:28 And obviously, if you double click on it, as it's an executable, if it's an unknown or unverified sample, then the smart screen would prompt and that would tell the victim that would raise suspicion that this is probably not a PDF file because it's saying that it wants to execute something. Then in order to bypass this, they're making use of the extended validation certificate. And in the latest variants, we've seen them also launch dummy files to make it look like a legitimate. also launch dummy files to make it look like a legitimate. For example, if it looks like a spreadsheet, it will actually launch a dummy spreadsheet file just to make it look like
Starting point is 00:10:12 it's actually legitimate. And then once they manage to get access to the Facebook business account, that point onwards, there's two ways actually. They can do it through a hands-on attack because not all victims might have a high-level access to the business account to add the threat actor's email address as an administrator. So they will rely on a hands-on approach where they will impersonate the victim to achieve their post-compromise activities. And now, a message from our sponsor, Zscaler, the leader in cloud security. Enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware attacks Thank you. more easily than ever with AI tools. It's time to rethink your security. Zscaler Zero Trust Plus AI stops attackers by hiding your attack surface,
Starting point is 00:11:31 making apps and IPs invisible, eliminating lateral movement, connecting users only to specific apps, not the entire network, continuously verifying every request based on identity and context, simplifying security management with AI-powered automation. And detecting threats using AI to analyze over 500 billion daily transactions.
Starting point is 00:11:54 Hackers can't attack what they can't see. Protect your organization with Zscaler Zero Trust and AI. Learn more at zscaler.com slash security. Well, let's go through some of the actual capabilities of the malware. In your research, you list what it's capable of here. Can we go through that together? what it's capable of here. Can we go through that together? Sure, absolutely. So basically once the malware is launched, it will start looking through the device for all the cookies that someone has in their browser. And if it finds an authenticated Facebook session, so once you log into Facebook and you press the Remember Me, it actually has an authenticated session as a cookie that's stored on the device.
Starting point is 00:12:51 And it will use that in order to basically steal information from the victim's personal account, Facebook personal account, and also look whether the personal account has any businesses linked to it. And if it does, then it will use the victim's access to that business to add themselves into the business account. And whether or not it's successful, it exfiltrates all the information that it steals from the victim's machine, including all the browser cookies and the personal account information and business account information, and exfiltrates all of this to the threat actress command and control channel, which since late 2021 has been Telegram. Yeah, that's an interesting aspect on its own there, right? That they're using Telegram for CNC? Yeah, absolutely.
Starting point is 00:13:52 Actually, the threat actor had initially set up their own infrastructure and had their own domains linked to the operation. But then in late 2021, we actually saw the shift to using Telegram. And this, first of all, leaves a lot less fingerprints because they no longer have an infrastructure that they need to manage and that gets linked to the operation. And obviously, Telegram makes it easy through their API to set up a command and control server
Starting point is 00:14:25 where you can directly communicate. You can send commands and then receive information as an archive file. So it makes it quite easy to manage basically for the threat actor. But the downside of that is that we can actually observe and monitor and track the activity that we see in the command and control channel because they have to provide an API key that the malware will use in order to communicate with the command and control channel in the first place. Yeah, that's interesting. So what are your recommendations then for people to best protect themselves against this? It's quite lucrative and difficult to actually protect against these sort of attacks. There's no single solution because the attack lifecycle spans across multiple platforms.
Starting point is 00:15:16 So first off, in order to avoid these spear phishing attempts, it's vital to raise awareness on this form of spear phishing attacks among users that have access to Facebook or meta-business accounts. And as the malware utilizes an information stealer malware that's designed for Windows machines, it's vital for victims to run either EDR or EPP solutions to prevent and detect the malware in the earlier stages of the attack life cycle. And obviously, it's also vital for a victim or for a user to have basic hygiene and protection in place on their personal and managed devices. And that's something that makes this quite difficult
Starting point is 00:16:09 to protect against because for Facebook business accounts, basically a victim actually has their personal account associated to it. So they're going to have logged on to their personal accounts from both personal devices and managed devices. have logged on to their personal accounts from both personal devices and managed devices. And that means that they need to basically have basic hygiene in place and protection in place across all different devices that they might log into their Facebook account through. And lastly, on the Facebook's platform itself, it's important to follow Meta's recommended security practices.
Starting point is 00:16:50 I would imagine too that a lot of Facebook business users, you'll have multiple people who have access to that business account. And because there may be multiple people, that may make it harder to know if there's someone there who doesn't belong. Yeah, absolutely. And this is one of the difficulties with these sort of attacks. But I believe that there are notifications, for example, that are sent out and there are some security features in place on Meta's platform. And that's why it's recommended to follow what Meta recommends on their platform to avoid this sort of compromises
Starting point is 00:17:31 from taking place on the platform itself. But like I mentioned, there are also basically things that someone can do before that to prevent this sort of attacks. And that comes from protecting their devices and following basic hygiene, as well as ensuring that they're aware of these forms of attacks so they don't click or download a suspicious or malicious attachment in the first place.
Starting point is 00:18:01 You pointed out that the evidence indicates that this is a Vietnamese threat actor. Are they going after anyone in particular? Is there a geographic area that they're targeting or are they just general opportunists? Not really. They're basically general opportunists as we see them primarily target companies that work in the advertisement and digital marketing vertical, but we don't see a specific geographical region that they're targeting. But some of their attachments are quite targeted. For example, they will have the country name appended to it. So that means that the threat actor is well aware of their victims before targeting them
Starting point is 00:18:49 where they are located and what their role is. And they use these in order to craft the malware name and whatnot to make it look more innocent, basically, to the victim. Our thanks to Mohamed Kazem Hassad Nejad from WithSecure for joining us. The research is titled Ducktail Returns Underneath the Ruffled Feathers. We'll have a link in the show notes. And now a message from Black Cloak. Did you know the easiest way for cyber criminals to bypass your company's defenses is by targeting your executives and their families at home?
Starting point is 00:19:46 Black Cloak's award-winning digital executive protection platform secures their personal devices, home networks, and connected lives. Because when executives are compromised at home, your company is at risk. In fact, over one third of new members discover they've already been breached. Protect your executives and their families 24-7, 365 with Black Cloak. Learn more at blackcloak.io. The CyberWires Research Saturday podcast is a production of N2K Networks, proudly produced in Maryland out of the startup studios of DataTribe, where they're co-building the next generation of cybersecurity teams and technologies. Our amazing CyberWire team is Elliot Peltzman, Trey Hester, Brandon Karp, Eliana White, Puru Prakash, Liz Ervin, Rachel Gelfand, Tim Nodar, Joe Kerrigan,
Starting point is 00:21:01 Thanks for listening. We'll see you back here next week.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.