Security experts at Proofpoint firm have identified a Russian-speaking cybercrime gang, dubbed Northern Gold, that has compromised more than 500,000 machines worldwide to steal users’ online credentials for major banks in the Europe and US. The experts not reveal the names of impacted organizations because law enforcement and security form are still investigating on the case.
The Northern Gold group has been active since 2008 and according Wayne Huang, VP Engineering at Proofpoint, it is a group of cyber criminals financially-motivated.
The Northern Gold is using Qbot malware to infect victim’s systems, according to the analysis published by Proofpoint the large botnet syphoned conversations, including account credentials, for roughly 800,000 online banking transactions. The variant used by the group is able to sniff online banking traffic and steal online banking credentials, as well as includes a dropper component that enable the malware to download any other malicious payload and execute it.
“Qbot (aka Qakbot) botnet of 500,000 infected systems sniffed ‘conversations’ – including account credentials – for 800,000 online banking transactions, with 59% of the sniffed sessions representing accounts at five of the largest US banks” states the report published by Proofpoint.
The Northern Gold campaigns started with the purchase of a large archive of passwords for the most popular CMSs used by the targeted websites, in the majority of cases WordPress. CMS administration credentials are precious commodities on the underground marketplaces.
“These scripts they built will take the password list and try to log in,” Huang said. “If successful, then they’ll mark the password as useful. This generates a big list of passwords. Then they would go into these websites by logging in, and hide within these websites somewhere what we call a webshell, which [acts as] a backdoor into the website.” explained Huang, which also said they will use automated tools to verify the credentials.
The infection scheme is consolidated, it is enough that victims visit a compromise website which is able to serve the proper exploit from the analysis of user’s IP address, browser type, operating system and other criteria.
“This is to ensure the user that gets infected is someone [the attackers] want to infect, as opposed to a crawler [such as] Google,” Huang said. “If all criteria is matched, then they’ll serve an exploit. This will exploit some vulnerability inside the browser or browser plugin, and once that happens, the browser or plugin will be commanded to download the [Qbot] malware.”
Internet Explorer is the most targeted browser in the campaign run by the Northern Gold, it accounts for 82 percent of Qbot infections, the majority of infected machine runs on Windows XP (52 percent) meanwhile Windows 7 PCs account for 39 percent of infected clients.
“Qbot includes another module called “SocksFabric,” which builds up a large tunneling network based on SOCKS5,” according to the analysis. “The cybercrime group offers this network as a paid tunneling service that lets attackers a) build their own ‘private cloud’ to run encrypted communications and transfer stolen data, or b) use the compromised end points as infiltration points into targeted organizations. This service can be rented to other attackers, generating additional revenue for this cybercrime group.”
According to the experts the The Northern Gold has a very efficient traffic distribution system, which allowed the team to fly under the radar for many years.
(Security Affairs – botnet, Northern Gold group)