Explorer

ShadowPad: How attackers hide backdoor in software used by large companies around the world

New Delhi [India], August 17 (ANI): Kaspersky Lab experts recently detected one the largest known supply-chain attacks, ShadowPad, before it could threaten the security of hundreds of organisations worldwide.

Kaspersky Lab experts have discovered a backdoor planted in a server management software product used by hundreds of large businesses around the world. When activated, the backdoor allows attackers to download further malicious modules or steal data. Kaspersky Lab has alerted NetSarang, the vendor of the affected software, and it has promptly removed the malicious code and released an update for customers.

ShadowPad is one of the largest known supply-chain attacks. Had it not been detected and patched so quickly, it could potentially have targeted hundreds of organizations worldwide.

In July, 2017 Kaspersky Lab's Global Research and Analysis (GReAT) team was approached by one of its partners - a financial institution. The organization's security specialists were worried about suspicious DNS (domain name server) requests originating on a system involved in the processing of financial transactions.

Further investigation showed that the source of these requests was server management software produced by a legitimate company and used by hundreds of customers in industries like financial services, education, telecoms, manufacturing, energy,and transportation. The most worrying finding was the fact that the vendor did not mean for the software to make these requests.

Further Kaspersky Lab analysis showed that the suspicious requests were actually the result of the activity of a malicious module hidden inside a recent version of the legitimate software. Followingthe installation of an infected software update, the malicious module would start sending DNS-queries to specific domains (its command and control server) at a frequency of once every eight hours.

The request would contain basic information about the victim system (user name, domain name, host name). If the attackers considered the system to be "interesting", the command server would reply and activate a fully-fledged backdoor platform that would silently deploy itself inside the attacked computer. After that, on command from the attackers, the backdoor platform would be able to download and execute further malicious code.

Following the discovery, Kaspersky Lab researchers immediately contacted NetSarang. The company reacted fast and released an updated version of the software without the malicious code.

So far, according to Kaspersky Lab research, the malicious module has been activated in Hong Kong, but it could be lying dormant on many other systems worldwide, especially if the users have not installed the updated version of the affected software.

While analysing the tools techniques and procedures used by the attackers, Kaspersky Lab researchers came to the conclusion that some similarities exist that point to PlugX malware variants used by the Winnti APT, a known Chinese-speaking cyberespionage group.

This information, however, is not enough to establish a precise connection to these actors.

"ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component. Luckily NetSarang was fast to react to our notification and released a clean software update, most likely preventing hundreds of data stealing attacks against its clients. However, this case shows that large companies should rely on advanced solutions capable of monitoring network activity and detecting anomalies. This is where you can spot malicious activity even if the attackers were sophisticated enough to hide their malware inside legitimate software," said Igor Soumenkov, security expert, Global Research and Analysis Team, Kaspersky Lab.

"To combat the ever-changing landscape of cyberattacks NetSarang has incorporated various methods and measures to prevent our line of products from being compromised, infected, or utilized by cyberespionage groups. Regretfully, the Build release of our full line of products on July 18th, 2017 was unknowingly shipped with a backdoor which had the potential to be exploited by its creator.

The security of our customers and userbase is our highest priority and ultimately, our responsibility. The fact that malicious groups and entities are utilizing commercial and legitimate software for illicit gain is an ever-growing concern and one that NetSarang, as well as others in the computer software industry, is taking very seriously," he added. (ANI)


This story has not been edited. It has been published as provided by ANI

View More
Advertisement
Advertisement
25°C
New Delhi
Rain: 100mm
Humidity: 97%
Wind: WNW 47km/h
See Today's Weather
powered by
Accu Weather
Advertisement

Top Headline

Stone Pelting Incident Reported From West Bengal's Cooch Behar Amid LS Phase 1 Voting
Stone Pelting Incident Reported From West Bengal's Cooch Behar Amid LS Phase 1 Voting
Israel Launches Strike Against Iran, Tehran Activates Air Defence Over Several Cities: Report
Israel Launches Strike Against Iran, Tehran Activates Air Defence Over Several Cities: Report
Lok Sabha Elections: PM Modi Urges Nation To Cast Ballots As Phase 1 Polling Begins Today
Lok Sabha Elections: PM Modi Urges Nation To Cast Ballots As Phase 1 Polling Begins Today
Flights Over Iranian Airspace Diverted After Blasts At Airport In Isfahan: Report
Flights Over Iranian Airspace Diverted After Blasts At Airport In Isfahan: Report
Advertisement
for smartphones
and tablets

Videos

LS Polls 2024: SP candidate Ruchi Veera inspects polling booth in the region, Moradabad | ABP NewsLok Sabha Polls 2024: Hanuman Beniwal Offers Prayers At Temple Before Casting Vote | ABP NewsLok Sabha Polls 2024: Bride Arrives At Polling Booth To Support Sanjeev Balyan By Casting Vote | ABP NewsLok Sabha Polls 2024: 'We Are Contesting To Save The Constitution' says Imran Masood | ABP News
Embed widget