

An Emerging Ducktail Infostealer – Active IOCs
May 7, 2024
CVE-2024-25355 – Node.js s3-url-parser module Vulnerability
May 7, 2024
An Emerging Ducktail Infostealer – Active IOCs
May 7, 2024
CVE-2024-25355 – Node.js s3-url-parser module Vulnerability
May 7, 2024Severity
High
Analysis Summary
Threat actors are increasingly exploiting the Microsoft Graph API as a means to establish and maintain communication with command-and-control (C&C) infrastructure hosted on Microsoft cloud services.
This tactic has been observed among various nation-state-aligned threat groups since January 2022, including APT28, APT29, OilRig, and others. The strategy involves leveraging legitimate APIs to avoid detection, with recent instances highlighting the deployment of previously undocumented malware like BirdyClient.
The cybersecurity analysts said, "The malware found in Ukraine appeared to be named BirdyClient or OneDriveBirdyClient by its developers because references to both names were found in its code."
In one instance, researchers discovered an attack on an unnamed Ukrainian organization involving BirdyClient, which utilizes the Microsoft Graph API to interface with OneDrive for C&C operations. Notably, attackers use a malicious DLL named "vxdiff.dll," posing as a legitimate component of the Apoint application to connect discreetly to the Graph API. This tactic not only enables stealthy communications but also leverages widely used cloud services like OneDrive often escaping suspicion due to their commonplace nature.
The adoption of the Graph API for C&C operations represents a strategic shift by threat actors, aiming to exploit its perceived inconspicuousness and cost-effectiveness. By utilizing APIs tied to well-known services, attackers can potentially evade traditional security measures that flag unusual network traffic. Moreover, the availability of free basic accounts for cloud services like OneDrive makes them attractive infrastructure sources for malicious activities.
In parallel, broader cybersecurity concerns extend to cloud environments, where attackers exploit trusted relationships or compromised third-party entities to gain elevated access. A cloud security firm highlighted the risk posed by adversaries with privileged access, who leverage compromised external entities to execute commands within compute instances or hybrid environments. This underscores the complex nature of modern cyber threats, where attackers exploit both technical vulnerabilities and human relationships to infiltrate and operate within cloud infrastructures.
Impact
- Privilege Escalation
- Security Bypass
Indicators of Compromise
MD5
- e3886a3f4e671704e306c08d1de3601c
- ff81a65150e318c1ffbeaba7a56bb09f
- 0ff09c344fc672880fdb03d429c7bda4
- 3bcdb533dd95f15cd3b6953829dc481e
- cc8882dfd58b69cbc341065d29f9c1e9
- f4840cb32f5a10fb9930ffb48095df30
- 36f0c1e2e20051cd87b77ea550141b52
- 2377abd182e56db339e005c5cf9448c7
- 4d6ffbf0bef1a7d57682609ac6c0f573
SHA-256
- afeaf8bd61f70fc51fbde7aa63f5d8ad96964f40b7d7fce1012a0b842c83273e
- 470cd1645d1da5566eef36c6e0b2a8ed510383657c4030180eb0083358813cd3
- f229a8eb6f5285a1762677c38175c71dead77768f6f5a6ebc320679068293231
- 4b78b1a3c162023f0c14498541cb6ae143fb01d8b50d6aa13ac302a84553e2d5
- a78cc475c1875186dcd1908b55c2eeaf1bcd59dedaff920f262f12a3a9e9bfa8
- 02e8ea9a58c13f216bdae478f9f007e20b45217742d0fbe47f66173f1b195ef5
- 1a87e1b41341ad042711faa0c601e7b238a47fa647c325f66b1c8c7b313c8bdf
- fe8f99445ad139160a47b109a8f3291eef9c6a23b4869c48d341380d608ed4cb
- 7fc54a287c08cde70fe860f7c65ff71ade24dfeedafdfea62a8a6ee57cc91950
SHA1
- 2da52586e89a60daf38d72fdcab6b4c4874f653a
- a210fed76436c11d14629947f9918061d81d3263
- 10d02cf4a73b73628c258d69dbd1a400631e0eb9
- 5222eb4ee7842919dbc827ed1f83b61c32bf2a54
- c8fbb7c0522a092239ca1eacf7a08e850fbea630
- d100ed0899ad0a669bfce037d449687aa35b85ac
- a619b6102d187c09bd113780a3635f9151e91e89
- 991a95da7b5379bcd872c954e627e2aaa6e07f6d
- 44d6d2c4f9567aaa709c65e799a976905b1e1bd0
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Ensure that your operating system and all applications are up to date with the latest security patches and updates to prevent vulnerabilities that can be exploited by malware.
- Implement two-factor authentication for your online accounts to provide an additional layer of security.
- Avoid downloading and installing pirated software, as these sites are often a source of malware infections.
- Educate yourself and your employees on safe computing practices, such as being cautious when opening emails and downloading attachments, to prevent future infections.