{"id":15070,"date":"2015-05-29T16:38:06","date_gmt":"2015-05-29T16:38:06","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=4015"},"modified":"2019-11-15T07:04:11","modified_gmt":"2019-11-15T12:04:11","slug":"grabit-an-smb-targeting-spy-campaign","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/grabit-an-smb-targeting-spy-campaign\/15070\/","title":{"rendered":"Grabit &#8211; an SMB-targeting spy campaign"},"content":{"rendered":"<p>Kaspersky Lab has just publicized the discovery of a new cyber-espionage campaign. Unlike previous threats, it\u2019s targeting smaller entities \u2013 namely SMBs. That\u2019s where it gets interesting.<\/p>\n<p><strong>Grabit and run<\/strong><\/p>\n<p>Grabit is a rather fresh campaign: the data gathered so far indicates it launched some time in late February 2015. As almost half of the total number of infections (44.87%) occurred in Thailand (with India as a distant second \u2013 24.36% and US as an even more distant third \u2013 10.26%), it could have been a local operation. Still, the first samples arrived to Kaspersky Lab\u2019s experts from the company\u2019s partners in USA.<\/p>\n<p>Grabit gets distributed via a Microsoft Office Word (.doc) email attachment containing a malicious macro AutoOpen.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Grabit \u2013 an #SMB-targeting spy campaign. #Protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FYFG8&amp;text=%23Grabit+%26%238211%3B+an+%23SMB-targeting+spy+campaign.+%23Protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The following is a quote from Securelist\u2019s thorough (as usual) <a href=\"https:\/\/securelist.com\/blog\/70087\/grabit-and-the-rats\/\" target=\"_blank\" rel=\"noopener\">analysis<\/a> of the malware:<\/p>\n<p>\u201cThis macro simply opens a socket over TCP and sends an HTTP request to a remote server that was hacked by the group to serve as a malware hub, before downloading the malware. In some cases the malicious macro was password protected, but our threat actor might have forgotten that a .doc file is actually an archive and when that archive is opened in a convenient editor of your choice, the macro strings are shown in clear-text.<\/p>\n<p>The malware is in plain view, modifying commonplace registry entries, such as the startup configurations, and not covering its tracks. Its binaries are not deleted in most cases, and its communication is in clear-text, where the victim can sniff the communication and grab the FTP\/SMTP server\u2019s credentials.\u201d<\/p>\n<p>The attackers control their victims using HawkEye keylogger, a commercial spying tool from HawkEyeProducts, and a configuration module containing a number of Remote Administration Tools (RATs).<\/p>\n<p>According to Kaspersky Lab\u2019s researchers, the malware actually does little to hide its presence, although it has a very serious protection from analysis: \u201ca weak knight in a heavy armor\u201d, Securelist says.<\/p>\n<p>While it is strange on its own, most likely it indicates that only a part of the malware has been written from scratch, the rest could have been acquired somewhere else.<\/p>\n<p>But regardless, the threat shouldn\u2019t be underestimated: a keylogger discovered in just one of the command-and-control servers was able to steal 2887 Passwords, 1053 Emails and 3023 Usernames from 4928 different hosts, internally and externally, including Outlook, Facebook, Skype, Google mail, Pinterest, Yahoo, LinkedIn and Twitter, as well as bank accounts and others.<\/p>\n<p><strong>Recommendations for businesses to protect themselves:<\/strong><\/p>\n<ul>\n<li>\u0421heck this location C:Users&lt;PC-NAME&gt;AppDataRoamingMicrosoft, if it contains executable files, you might be infected with the malware. This is a warning you should not ignore.<\/li>\n<li>The Windows System Configurations should not contain a grabit1.exe in the startup table. Run \u201cmsconfig\u201d and ensure that it is clean from grabit1.exe records.<\/li>\n<li>Don\u2019t open attachments and links from people you don\u2019t know. If you can\u2019t open it, don\u2019t forward it to others \u2013 call for the support of an IT-administrator.<\/li>\n<li>Use an advanced, up to date anti-malware solution, and always follow the AV task list for suspicious processes.<\/li>\n<\/ul>\n<p>Probably disabling macros by default isn\u2019t the worst idea either.<\/p>\n<p><strong>Picking smaller targets<\/strong><\/p>\n<p>Cyber-espionage is actually regarded as a threat for high-profile entities \u2013 large corporations, enterprises, government organizations, etc. Cyber-espionage isn\u2019t your common malware attack that often only requires an attacker to know where to get a proper piece of code.<\/p>\n<p>Spying and not getting intercepted and bashed off requires a lot of technical prowess, so it\u2019s not something that script-kiddies go for eagerly. The known spying campaigns are usually comprised of rather advanced tools, mostly custom-built, and the actors behind them are clearly motivated by getting something specific, even if the lists of their apparent points of interest are very large, as was the case with Crouching Yeti APT campaign.<\/p>\n<p>However, attackers of all kinds are switching to <a href=\"https:\/\/business.kaspersky.com\/addressing-the-global-trafficking-of-financial-data\/1089\" target=\"_blank\" rel=\"noopener nofollow\">softer targets<\/a>, and cyberspies aren\u2019t an exclusion here. There are reasons for that.<\/p>\n<p><em>Reason 1. Mainstay and satellites<\/em><\/p>\n<p>It is not a vacuum that the large enterprises are operating in: every such mainstay is surrounded by a constellation of smaller contractors and suppliers. And it is logical to assume that they may have at least some of the information the hackers are looking for.<\/p>\n<p><em>Reason 2. Softer targets<\/em><\/p>\n<p>An enterprise working with some information that is of special interest for cyberspies are usually well protected and hard to infiltrate. Its satellites may be much softer targets, more brittle nuts to crack.<\/p>\n<p><em>Reason 1+2. They may know something<\/em><\/p>\n<p>Given all this, attackers may either use the \u201csatellites\u201d as leverage to eventually infiltrate the networks of the primary target \u2013 a large enterprise \u2013 or to \u201cgather a full mosaic\u201d from the accessible bits and pieces without an actual intrusion into the mainstay\u2019s networks.<\/p>\n<p>And if there is an option to extract the data of interest from the \u201csofter targets,\u201d hackers will definitely use it \u2013 especially when there are cybermercenaries at play: as businessmen, they are extremely interested in optimizing their effort-to-result rate.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#SMB-targeting campaigns were predicted long ago. #Protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FYFG8&amp;text=%23SMB-targeting+campaigns+were+predicted+long+ago.+%23Protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In this particular case it does look like there have been mercenaries at work: the SMBs attacked by the Grabit malware operate in such diverse sectors as chemicals, nanotechnology, education, agriculture, media, construction, and more.<\/p>\n<p>Probably (mind that it is mere speculation for now) this is a wide dragnet sort of intelligence-gathering operation. What is <em>not <\/em>a speculation is that it is still active and may soon expand well beyond its current geographical limits.<\/p>\n<p>So it is recommended that you stay aware and ready.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab has just publicized the discovery of a new cyber-espionage campaign. Unlike previous thresats, it&#8217;s targeting smaller entities &#8211; namely SMBs. That&#8217;s where it gets interesting.<\/p>\n","protected":false},"author":209,"featured_media":15502,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[872,2310,2302,2304],"class_list":{"0":"post-15070","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cyberespionage","10":"tag-grabit","11":"tag-protectmybiz","12":"tag-smb"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/grabit-an-smb-targeting-spy-campaign\/15070\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/grabit-an-smb-targeting-spy-campaign\/15070\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/grabit-an-smb-targeting-spy-campaign\/15070\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cyberespionage\/","name":"cyberespionage"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15070"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15070\/revisions"}],"predecessor-version":[{"id":30477,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15070\/revisions\/30477"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15502"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}