Comfoo APT Cyberespionage Campaign Exposed

  /     /     /  
Publicated : 22/11/2024   Category : security


Comfoo APT Cyberespionage Campaign Exposed


Trojan used in the breach of RSA in 2010 remains active and prolific in targeted attacks



LAS VEGAS -- BLACK HAT USA -- A remote access Trojan (RAT) that was used in the big RSA data breach three years ago remains active and prolific in targeted attacks against government ministries, telecommunications providers, mineral exploration firms, technology firms, and media outlets, mainly in Asia and some in the U.S.
Malware experts Joe Stewart and Don Jackson of Dell Secureworks gained access to the command-and-control (C&C) infrastructure of the so-called Comfoo Trojan -- a rare feat in most advanced persistent threat (APT) attacks -- and also found proof of how widespread the lesser known malware really is: The researchers discovered 64 different targeted attack campaigns using the RAT, as well as some 200 variants of the Trojan.
Comfoo has been associated with one of Chinas largest cyberespionage organizations known as the Beijing Group, and the attacks discovered by Secureworks operate on the same infrastructure as the group. But it may or may not be the same persons at the other end of the computers. They may just be sharing the same infrastructure, Stewart says.
The RAT has been in development since at least 2006, but has managed to fly mostly under the radar, according to the researchers, who published a report on Comfoo this week.
Japan and India were the main targets, as well as Taiwan and South Korea. The researchers also found infected machines in the U.S. and Europe.
Despite the Comfoo Trojans longevity and regular revamping, its one of the lesser-publicized RATs, according to Stewart, mainly because it has kept a relatively low profile. Its still under the radar, it would seem. There have not been a lot of public reports about it, he says. But we saw all of this infrastructure, all of these tags and campaigns and all of this malware.
Theres a lot of it being used and a lot more targets than people suspect, says Stewart, who is director of malware research for Dell Secureworks Counter Threat Unit. The amount of work this team must be doing to maintain this Trojan and all this infrastructure is significant, he says.
Stewart was able to access Comfoos C&C servers because back-end servers didnt require authentication and because he was able to crack the infrastructures encryption. He figured out the protocol and static encryption key that was hard-coded into Comfoo binary code, and got a birds-eye view of victim machines dialing home to the Trojans C&C relay servers. Secureworks would not reveal the names of the victim organizations, but all have been alerted about the attacks, Stewart says.
While the researchers were unable to see the actual data being lifted from the victims, they witnessed Comfoo accessing system and network information, logging keystrokes, uploading files, downloading files, taking screenshots, and opening a command shell.
One major attack campaign waged by the Comfoo gang was in 2012, hitting more than 20 Japanese government ministries, universities, municipal governments, trade organizations, media outlets, think-tanks, and industrial machinery manufacturers.
In an interesting twist, Comfoo also targeted the networks of audioconferencing and videoconferencing companies. Stewart says its possible that they are trying to steal intellectual property here on this technology, but more likely that they are gathering intel on these companies for spying purposes on other targets via the providers audio- and videoconferencing systems.
The full Secureworks report is available
here
.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Comfoo APT Cyberespionage Campaign Exposed