Up Close with Evilnum, the APT Group Behind the Malware

  /     /     /  
Publicated : 23/11/2024   Category : security


Up Close with Evilnum, the APT Group Behind the Malware


The group behind Evilnum malware, which continues to target financial institutions, appears to be testing new techniques.



Researchers today published an analysis of advanced persistent threat (APT) group Evilnum, known for developing malware of the same name. A detailed look at its activity reveals an evolved toolset and infrastructure that combine custom malware with tools bought from malware-as-a-service (MaaS) providers.
Evilnum has been around for at least two years, according to Matías Porolli, a  malware researcher at ESET, which has been tracking the malwares operations since April. The group has historically targeted financial technology companies that offer training and investment platforms. Its attacks are few in number but very specific. This, combined with Evilnums use of legitimate tools in its activity, has helped the group fly mostly under the radar.
While Evilnums malware has been active since 2018, little is known about how it operates. ESET began its research when one of its automated systems flagged a malicious sample for an Evilnum custom components, says Porolli. Analysis revealed the code was related to an earlier report; telemetry data helped connect the dots and learn more about how Evilnum functions.
Most of the groups targets are located in the EU and UK, though some attacks have landed in Australia and Canada. Organizations usually have offices in several locations, which could explain the groups geographical range.
Evilnums primary goal is to spy on its targets and steal financial data from businesses and their customers. Its attackers have previously stolen spreadsheets and documents with customer lists, investments, and trading operations; internal presentations; software licenses and credentials for trading software and platforms; browser cookies and session data; email credentials; credit card information; and proof of address and identity documents. The group has also obtained access to VPN configurations and other IT-related information.
Like many threat groups, Evilnum starts with a phishing email. Messages contain a link to a ZIP file hosted in Google Drive. This archive has multiple LNK files designed to extract and execute a malicious JavaScript component while displaying a fake document. These shortcut files have double extensions to trick victims into believing they are harmless and opening them.
These LNK files all do the same thing: When opened, a file searches its contents for lines with a specific marker and writes them to a JavaScript file. This malicious file is executed and then writes and opens a decoy file with the same name as the LNK file. Decoy files are typically photos of credit cards or identity documents – things a financial institution may need from customers.
The emails take advantage of know your customer regulations, Porolli explains. Most of the malicious samples that they used in spear-phishing emails pretended to be photos of identity cards, credit cards, or bills with proof of address for account verification purposes. Financial institutions are required to verify such documents to prevent illegal activities, so the malicious emails may get mixed with legitimate verification emails from real customers.
Its assumed these decoy documents are legitimate and have been collected from other attacks, as Evilnum targets support representatives and account managers who receive these kinds of files. Attackers collect and reuse the documents on different businesses within the same region. 
Building Blocks of Evilnum Infrastructure
Evilnum runs an infrastructure with multiple command-and-control (C2) servers. One handles communications for the JavaScript component, which is the first stage of the attack and can launch other malware, such as MaaS tools or Python-based tools. Another server handles the C# component. A third server stores its tools and exfiltrated data, proxy server, and other parts.
This group keeps each of its malicious components independent from each other, with dedicated servers, Porolli explains. They dont reuse their infrastructure from attacks documented in the past, which makes it harder for analysts to track them.
The groups attackers also use backdoors – some custom, others purchased – which give them more options to maintain control over their victims and backup options in case one of their backdoors is removed. The length of time they remain on a network varies depending on the targets security, Porolli continues, but they can try to break in again if they lose control. 
In some attacks, Evilnum attackers deploy tools purchased from the Golden Chickens MaaS provider. These shops sell malicious binaries and needed infrastructure, such as C2 servers. Golden Chickens also sells to FIN6 and Cobalt Group, Porolli says; older versions of components that Evilnum uses were seen in other groups attacks. Researchers dont believe these groups are the same, but they happen to share a MaaS provider. Other groups using Golden Chickens also had financial targets, and it has a strong reputation on the black market.
While not much is known about how they use stolen data, Porolli points out their operation is profitable enough to invest in MaaS components. This model gives attackers both malware and an infrastructure thats unlikely to be traced back to them. 
Weve seen this group going for redundancy and independence of their malicious components in order to persist longer in a targets network, he adds.  
More details about the operation can be found in Porollis 
full analysis
.
Related Content:
7 Must-Haves for a Rockin Red Team
Fight Phishing with Intention
How Enterprises Are Developing and Maintaining Secure Applications
Study Finds 15 Billion Stolen, Exposed Credentials in Criminal Markets
 

Last News

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Up Close with Evilnum, the APT Group Behind the Malware