The new Gazer - the back door targets the ministries and embassies around the world
Security researchers at ESET have discovered a new malware with the aim of consular offices, ministries and embassies around the world to track governments and diplomatic activities.
Security researchers at ESET have discovered a new malware with the aim of consular offices, ministries and embassies around the world to track governments and diplomatic activities.
Operating since 2016, this malware campaign uses a backdoor called Gazer, thought to be hacked by APT (persistent, intentional hacker) Turla, previously linked to Russian espionage. , proceed.
Gazer written in C ++ is a fake email intrusion door and hijack the target computer in two steps.
- Malware dropped on the back door of Skipper, which was also related to Turla earlier.
- Install elements of Gazer.
Diagram of operation principle of the Gazer rear door
In previous espionage campaigns, the Turla hack team used Carbon and Kazuar rear doors as malware in the second stage. According to research published by ESET ( https://www.welivesecurity.com/wp-content/uploads/2017/08/eset-gazer.pdf ), the following doors also have many similarities with Gazer.
The Gazer receives an encrypted command from a C&C server remotely and avoids being detected using a legitimate website that has been hacked into a proxy (these sites mostly use WordPress CMS). Instead of using Windows Crypto API, Gazer uses 3DES and RSA encryption libraries to encrypt data before sending it to C&C server. This is the familiar tactic of the APT Turla group.
The Gazer used the technique of inserting code to take control of the computer and hide it for a long time to steal information. It is also possible to transfer the received command with a poisoned endpoint to another poisoned device in the system.
So far ESET researchers have discovered four variants of Gazer, mainly spying in Southeastern Europe and former Soviet political groups. Interestingly, previous versions of Gazer received Comodo authentication for Solid Loop Ltd, while the latest version had SSL authentication from Ultimate Computer Support Ltd.
According to the researchers, Gazer has been used to infect many computers around the world, mainly in Europe. Kaspersky Lab also released similar details about Gazer but called it the APT campaign 'Whitebear' (White Bear).https://securelist.com/introducing-whitebear/81638/
You should read it
- Top 12 most dangerous backdoor in computer history
- What is backdoor?
- Learn about Backdoor.Win32.Bredolab.eua malware
- Hacker 'implements' the backdoor onto Symbian firmware
- 'Backdoor' plugin, WordPress 3.2 RC2 launches
- Malicious Code EvilGnome attacks Linux systems with many rare tricks
- Alarm of dangerous bot, Trojan infection rate
- How many types of malware do you know and how to prevent them?
- Detects backdoor on NetSarang's server management software
- Detecting dangerous backdoors targeting both Windows, macOS and Linux
- Information about Gpcode.ak virus
- Learn about SpeakUp - New Malware targets Linux servers
Maybe you are interested
CES 2022: ASUS ZenBook 17 Fold, one of the most beautiful laptop models ASUS has ever launched 11 things filmmakers have fooled viewers Amazon was officially investigated by the EU with monopoly claims and unfair competition How to make the browser always start in incognito mode Is Microsoft Edge really safer than Chrome or Firefox? Anonymous browsing has more uses than you think