New CostaRicto Hack-for-Hire Group Targets Global Businesses

  /     /     /  
Publicated : 23/11/2024   Category : security


New CostaRicto Hack-for-Hire Group Targets Global Businesses


The group of APT mercenaries uses bespoke malware and strong operation security to target a range of organizations, located primarily in Southeast Asia.



A new hack-for-hire group has been employing custom malware in attacks that target disparate victims worldwide, with the largest concentration in South Asia, BlackBerry researchers report.
This group of advanced persistent threat (APT) mercenaries, dubbed CostaRicto by BlackBerrys Research and Intelligence Team, has targeted organizations in countries across Europe, the Americas, Africa, Australia, and Asia, particularly in India, Bangladesh, and Singapore. While CostaRicto has been on the teams radar since January 2020, it estimates it has been active since around late 2019.
The emergence of this group underscores a broader trend of mercenary APT groups appearing on the threat landscape. These attackers tactics, techniques, and procedures (TTPs) resemble those seen in advanced nation-state attacks, but their victims profiles and geographies are too diverse to be aligned with a single attackers goals.
Consider CostaRicto, which uses a combination of bespoke malware and off-the-shelf tools to infiltrate target organizations. Tom Bonner, distinguished threat researcher with BlackBerry, says the most interesting aspects of its operations are SombRAT, a new custom backdoor that emerged in October 2019, and CostaBricks, a custom virtual machine-based payload loader. 
Weve not seen [SombRAT] before; it doesnt relate to any other actors weve observed previously, says Bonner. Its a fairly interesting backdoor as well, he continues, noting its written in C++, a trait that makes it hideous to pull apart and go through. 
Once group members gain access to a target environment, they are careful about deploying this malware, he explains. The backdoor will never reside on the file system unencrypted. Attackers go to great lengths to ensure the binaries theyre using appear only in memory. Their creation of a virtual machine-based loader in CostaBricks is another sign of the attackers skill level.
Theyre really putting many layers of obfuscation over their malware … to try and evade detection from antivirus and EDR products, and other monitoring or behavioral analysis on the system, Bonner says. Operational security is also strong: Its command-and-control servers are managed via Tor and/or through a layer of proxies, and it creates a complex network of SSH tunnels in the victims environment. 
In a
writeup of their findings
on CostaRicto, researchers say their tools constant development, detail versioning system, and well-structured code that allow for expansion of functionality all indicate the groups tool set is part of a long-term project rather than a one-off campaign. Eric Milam, vice president of research operations at BlackBerry, anticipates they could be preparing for a large-scale attack. Right now, its unclear exactly what its motivations are.
They seem to be laying the groundwork for something bigger, he says, noting much of their activity was intended to hide lateral movement, conceal data exfiltration, and other tasks.
SombRAT indicates the group is well-funded and has a level of sophistication beyond simply grabbing things off the shelf, though it does also use PowerSploits reflective PE injection modules, nmap port scanner, and PsExec in its operations. As with other hack-for-hire groups, custom malware and other new techniques can throw investigators off the attackers scent. 
Its making our lives a lot harder to try and track down the original threat actors, once theyve engaged with the mercenaries to carry out their attacks, Bonner explains. All of a sudden were faced with new TTPs and indicators and things like that; they dont look like previous known campaigns weve monitored. These factors, combined with disparate targeting across several geographies, can make the already-difficult task of attribution even more challenging. 
The Growing Pattern of Hack-for-Hire Organizations
The growth of organized cybercrime has allowed attackers to specialize, and profit, in what theyre good at. Some are skilled at developing ransomware applications; others are handy in breaking into managed security service providers. This enables them to help each other conduct more effective attacks.
Hack-for-hire operations have emerged from this trend and are poised to continue growing. While they help advanced attackers hide their activity, that isnt the only reason, Milam says.
I always picture these folks as an organization much like outs, where theres different projects and different leaders, he explains. I think its just easier for attackers to outsource things to a trusted entity, and I think were going to see a lot more nation-states do that.
Researchers noted several similarities between CostaRicto and Bahamut, another mercenary group
involved in attacks
targeting government businesses and officials in the Middle East and South Asia. Similar to Bahamut, CostaRicto is clear in its targets, has strong operational security, and uses bespoke malware in its attacks. Those all smell a lot like Bahamut, he says, especially considering the region, but researchers couldnt definitively connect the two groups. 
The high-level strokes all appear to be the same, Milam says. They appear to be working out of the same region [and have] completely disparate targets that make no sense. Nation-states usually have a rhyme or reason to be attacking the way theyre attacking, most obviously geopolitically motivated. These folks seem to be willing to take on whatever target is paid for.

Last News

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
New CostaRicto Hack-for-Hire Group Targets Global Businesses