Security researchers from TrendMicro have uncovered a cyber espionage campaign carried out by an APT group tracked as DRBControl that employed a new family of malware. The attackers aimed at stealing databases and source code from gambling and betting companies in Southeast Asia, and likely in Europe and the Middle East.
“The threat actor is currently targeting users in Southeast Asia, particularly gambling and betting companies. Europe and the Middle East were also reported to us as being targeted, but we could not confirm this at the time of writing.” reads the analysis published by Trend Micro. “Exfiltrated data was mostly comprised of databases and source codes, which led us to be
Threat actors used two previously unidentified
The group was also observed using modified versions of common malware such as PlugX RAT, Trochilus RAT,
The arsenal of the attackers includes post-exploitation tools such as password dumpers (Quarks PwDump, modified Mimikatz, NetPwdDump), tools for bypassing UAC, and code loaders.
In the DRBControl’s arsenal experts recognized two main
Another backdoor accompanies Type 1 and has the role of executing malware that has been downloaded from Dropbox and loaded in memory.
Type 1 backdoor is executed by employing DLL side-loading, it executes a malware that has been downloaded from Dropbox and loaded in memory.
The malware was used to steal Office and PDF documents, key logs, SQL dumps, browser cookies, a KeePass manager database.
Researchers observed that a first variant of the Type 1 backdoor was released in late May, 2019, while version 9.0 is dated October, 2019.
The Type 2 backdoor was first released in July 2017, it was employed in a spear-phishing attack distributing a
This circumstance suggests that DRBControl has been active at least since 2017, but Trend Micro speculates it had a longer run.
Trend Micro experts believe that this is the first time that the DRBControl group is tracked by the security experts. The researchers linked the DRBControl to other China-linked APT groups, including Winnti and Emissary Panda (a.k.a. BRONZE UNION, APT27, Iron Tiger,
Evidence of the links to the
Researchers noticed that the attackers used two commands issued on a compromised machine to download malicious
Experts pointed out that the HyperBro backdoor is exclusive to Emissary Panda.
At the time it is not possible to associate with high confidence the DRBControl group with a specific threat actor, it is not completely clear if the attackers belong to a new APT group or it is a subgroup of a known APT group linked to China.
“Attribution is a complicated aspect of
“The threat actor described here shows solid and quick development capabilities regarding the custom malware used, which appears to be exclusive to them. The campaign exhibits that once an attacker gains a foothold in the targeted entity, the use of public tools can be enough to elevate privileges, perform lateral movements in the network, and exfiltrate data.”
Additional technical details, such as
|[adrotate banner=”9″]||[adrotate banner=”12″]|