{"id":21189,"date":"2022-01-18T13:13:12","date_gmt":"2022-01-18T13:13:12","guid":{"rendered":"https:\/\/www.veritis.com\/?p=12915"},"modified":"2025-06-09T10:47:52","modified_gmt":"2025-06-09T10:47:52","slug":"cybercriminals-exploit-aws-azure-clouds-to-distribute-remote-access-trojans","status":"publish","type":"news","link":"https:\/\/demolobby.com\/veritisbeta\/news\/cybercriminals-exploit-aws-azure-clouds-to-distribute-remote-access-trojans\/","title":{"rendered":"Cybercriminals Exploit Amazon Web Services, Azure Clouds to Distribute Remote Access Trojans!"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-12917 size-full\" title=\"Cybercriminals Exploit AWS, Azure Clouds to Distribute Remote Access Trojans\" src=\"https:\/\/veritis.com\/wp-content\/uploads\/2022\/01\/cybercriminals-exploit-aws-azure-clouds-to-distribute-remote-access-trojans.jpg\" alt=\"Cybercriminals Exploit AWS, Azure Clouds to Distribute Remote Access Trojans\" width=\"800\" height=\"422\" \/><\/p>\n<p>In a shocking turn of events, threat intelligence firm Cisco Talos discovered that malicious actors are increasingly exploiting <a href=\"https:\/\/www.veritis.com\/solutions\/cloud\/public-cloud-computing-services\/\" target=\"_blank\" rel=\"noopener\">public cloud technologies<\/a> to deliver remote access trojans (RATs). They are achieving their notorious objectives without going through the endeavor of hosting their own infrastructure.<\/p>\n<p>According to Cisco Talos, the threat actors are exploiting <a href=\"https:\/\/www.veritis.com\/solutions\/cloud\/\" target=\"_blank\" rel=\"noopener\">cloud services<\/a> like AWS and Azure to develop their infrastructure and connect to the internet with minimal time and cost.<\/p>\n<p>The cybercriminal, in this case, leveraged cloud platforms to deploy and deliver variants of commodity RATs, including Nanocore, Netwire and AsyncRAT, starting from October 2021. These malware variants are ingrained with malicious features capable of taking control over the victim\u2019s system to remotely execute arbitrary commands and pilfer the victim&#8217;s data.<\/p>\n<hr \/>\n<p><strong>Also Read: <a href=\"https:\/\/www.veritis.com\/blog\/aws-vs-azure-vs-gcp-the-cloud-platform-of-your-choice\/\" target=\"_blank\" rel=\"noopener\">AWS Vs Azure Vs GCP \u2013 The Cloud Platform of Your Choice?<\/a><\/strong><\/p>\n<hr \/>\n<h2>How threat actors organized the savvy malicious campaign?<\/h2>\n<p>In the observed malicious campaign, the infection chain was started with phishing emails that contained malicious ZIP attachments.<\/p>\n<blockquote><p>\u201cThese ZIP archive files contain an ISO image with a malicious loader in the form of JavaScript, a Windows batch file, or Visual Basic script. When the initial script is executed on the victim&#8217;s machine, it connects to a download server to download the next stage, which can be hosted on an Azure Cloud-based Windows server or an AWS EC2 instance,\u201d explained Cisco Talos.<\/p><\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-12918 size-full\" title=\"Infection Flow Diagram\" src=\"https:\/\/veritis.com\/wp-content\/uploads\/2022\/01\/infection-flow-diagram.jpg\" alt=\"Infection Flow Diagram\" width=\"800\" height=\"504\" \/><\/p>\n<p><strong>Some of the malicious ZIP file names observed in the campaign are:<\/strong><\/p>\n<ul>\n<li>WROOT_Invoice_Copy.zip<\/li>\n<li>YUEOP_Invoice_Copy.zip<\/li>\n<li>HOO8M_Invoice_Copy.zip<\/li>\n<li>TROOS_Invoice_Copy.zip<\/li>\n<li>TBROO1_Invoice_Copy.zip<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-12919 size-full\" title=\"Phishing Email Example\" src=\"https:\/\/veritis.com\/wp-content\/uploads\/2022\/01\/phishing-email-example.jpg\" alt=\"Phishing Email Example\" width=\"800\" height=\"551\" \/><\/p>\n<p>The researchers discovered that the perpetrator registered several dubious subdomains using DuckDNS to deliver the malware payload. DuckDNS is an open-source dynamic DNS service that offers public DNS server services.<\/p>\n<blockquote><p>\u201cSome of the actor-controlled malicious subdomains resolve to the download server on <a href=\"https:\/\/www.veritis.com\/blog\/azure-cloud-migration-4-step-strategy\/\" target=\"_blank\" rel=\"noopener\">Azure Cloud<\/a> while others resolve to the servers operated as C2 for the remote access trojan payloads,\u201d said the researchers.<\/p><\/blockquote>\n<p><strong>Some of the malicious subdomains identified by Cisco Talos are:<\/strong><\/p>\n<ul>\n<li>gg1592661[.]duckdns[.]org<\/li>\n<li>btime1624[.]duckdns[.]org<\/li>\n<li>justinalwhitedd554[.]duckdns[.]org<\/li>\n<li>wz303811[.]duckdns[.]org<\/li>\n<li>js1994[.]duckdns[.]org<\/li>\n<li>backu4734[.]duckdns[.]org<\/li>\n<li>www[.]backu4734[.]duckdns[.]org<\/li>\n<li>mback5338[.]duckdns[.]org<\/li>\n<li>nwire733[.]duckdns[.]org<\/li>\n<li>asyncmoney[.]duckdns[.]org<\/li>\n<li>nanoboss[.]duckdns[.]org<\/li>\n<li>asyncspread[.]duckdns[.]org<\/li>\n<li>tdeasy[.]duckdns[.]org<\/li>\n<li>dingspread[.]duckdns[.]org<\/li>\n<li>asyncpcc[.]duckdns[.]org<\/li>\n<li>duckdns[.]org<\/li>\n<li>duckdns[.]org<\/li>\n<li>duckdns[.]org<\/li>\n<\/ul>\n<blockquote><p>\u201cThe fact that the hackers are constantly modifying their C2 centers with DuckDNS just shows how \u2018by any means necessary\u2019 the hackers are willing to operate,\u201d said Garret Grajek, CEO at YouAttest. &#8220;The attacks like this one show a team effort in scanning, exploiting, obfuscation, and then finally exfiltration.&#8221;<\/p><\/blockquote>\n<p>Moreover, the downloader JavaScript used in the phishing campaign leveraged four layers of obfuscation.<\/p>\n<blockquote><p>\u201cEach stage of the de-obfuscation process results with the decryption methods for the subsequent stages to finally arrive at the actual malicious downloader method. The de-obfuscation process is performed at each stage with every next stage generated as the result of the previous stage de-obfuscation function.\u201d<\/p><\/blockquote>\n<p>In addition to the JavaScript loader trojan, the campaign also used a batch file downloader trojan and a VBScript downloader trojan and PowerShell dropper scripts.<\/p>\n<p>The researchers also discovered another alarming fact that the malicious actor maintained a distributed infrastructure featuring download servers, command and control servers, and malicious subdomains. Furthermore, they hosted the downloading servers on <a href=\"https:\/\/www.veritis.com\/blog\/aws-vs-azure-cloud-a-glance-at-comparison\/\" target=\"_blank\" rel=\"noopener\">AWS and Azure cloud services<\/a>.<\/p>\n<hr \/>\n<p><strong>Also Read: <a href=\"https:\/\/www.veritis.com\/news\/hugging-face-launches-open-computer-agent-ai-tool-for-automated-tasks\/\" target=\"_blank\" rel=\"noopener\">Hugging Face Launches Open Computer Agent AI Tool for Automated Tasks<\/a><\/strong><\/p>\n<hr \/>\n<h3>Hackers at an advantage<\/h3>\n<p>The Cisco researchers noted that exploiting cloud services to host the payloads is a sophisticated effort to avoid the radar while cutting down costs as they don\u2019t need to deploy their own infrastructure. \u201cIt also makes it more difficult for defenders to track down the attackers&#8217; operations,\u201d mentioned Cisco Talos.<\/p>\n<blockquote><p>\u201cThreat actors use well-known cloud services in their campaigns because the public passively trusts big companies to be secure,\u201d said Davis McCarthy, a security researcher at Valtix. &#8220;Network defenders may think communications to an IP address owned by Amazon or Microsoft is benign because those communications occur so frequently across a myriad of services.&#8221;<\/p><\/blockquote>\n<h3>How can businesses prevent these attacks?<\/h3>\n<p>As the cybercriminals behind the said campaign are using dynamic DNS that doesn\u2019t have a static IP address, developing an inventory of known <a href=\"https:\/\/www.veritis.com\/solutions\/cloud\/\" target=\"_blank\" rel=\"noopener\">cloud services<\/a> and their network communication behaviors is imperative to fend off these campaigns. Businesses must set up comprehensive multi-layered security controls to identify and defend similar threats.<\/p>\n<p>They must monitor their organizational traffic and set stringent rules around the script execution policies on their network endpoints. Moreover, organizations must double down on their email security to identify and prevent malicious emails and ax the infection at the early stage.<\/p>\n<p><a href=\"https:\/\/www.veritis.com\/contact\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3137\" src=\"https:\/\/www.veritis.com\/wp-content\/uploads\/2018\/07\/contact-us.png\" alt=\"Contact Us\" width=\"225\" height=\"56\" \/><\/a><\/p>\n<hr \/>\n<p><strong>More Articles:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.veritis.com\/news\/crowdstrike-software-incident-global-impact-and-industry-response\/\" target=\"_blank\" rel=\"noopener\">CrowdStrike Software Incident: Global Impact and Industry Response<\/a><\/li>\n<li><a href=\"https:\/\/www.veritis.com\/news\/cybersecurity-breach-at-ahold-delhaize-usa-exposes-sensitive-data\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Breach at Ahold Delhaize USA Exposes Sensitive Data<\/a><\/li>\n<li><a href=\"https:\/\/www.veritis.com\/blog\/waterfall-vs-agile-vs-devops-which-production-method-should-you-take\/\" target=\"_blank\" rel=\"noopener\">Waterfall Vs. Agile Vs. DevOps- Which Production Method Should You Take?<\/a><\/li>\n<\/ul>\n","protected":false},"featured_media":12916,"parent":0,"menu_order":0,"template":"","tags":[173,116,348,349,136,289,350],"class_list":["post-21189","news","type-news","status-publish","has-post-thumbnail","hentry","tag-aws","tag-azure","tag-azure-cloud","tag-cisco-talos","tag-cloud-services","tag-cybercriminals","tag-duckdns"],"acf":[],"_links":{"self":[{"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/news\/21189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/types\/news"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/media\/12916"}],"wp:attachment":[{"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/media?parent=21189"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/tags?post=21189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}