{"id":15090,"date":"2015-08-11T18:01:03","date_gmt":"2015-08-11T18:01:03","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=4357"},"modified":"2020-12-14T13:02:21","modified_gmt":"2020-12-14T18:02:21","slug":"darkhotel-hackingteam","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/darkhotel-hackingteam\/15090\/","title":{"rendered":"Spreading the Disease: Darkhotel gets HackingTeam 0-day, but still stoppable"},"content":{"rendered":"<p>Kaspersky Lab experts have investigated a new series of attacks by the Darkhotel cybercriminal group. Featuring an Adobe Flash 0-day exploit from the Hacking Team breach, the attack also has a wider geographic reach. The first <a href=\"https:\/\/securelist.com\/blog\/research\/66779\/the-darkhotel-apt\/\" target=\"_blank\" rel=\"noopener\">sighting<\/a> of Darkhotel is mostly remembered for its unusual spreading mechanism. Along with peer-to-peer and other spreading tactics, this APT has, for several years, maintained a capability to use hotel networks to follow and hit selected targets as they travel around the world.<\/p>\n<p>In 2015, actors\u2019 preferable techniques shifted towards persistent spear-phishing of their chosen targets. Currently, we\u2019re finding victims in other geographical regions, new variants of malicious .hta, .rar spearphishing attachments with right-to-left override (RTLO) method to fake files extensions, and <a href=\"https:\/\/securelist.com\/blog\/research\/71713\/darkhotels-attacks-in-2015\/\" target=\"_blank\" rel=\"noopener\">the deployment of a 0-day from Hacking Team<\/a>.<\/p>\n<p><strong>It\u2019s not only high profile targets, and more than the perimeter needs to be secured<\/strong><\/p>\n<p>Darkhotel\u2019s targeted attack modules, which infects hotel networks, show us that state-owned organizations or large enterprises with a lots of sensitive data are not the only targets. Relatively small businesses (like hotels, in this case) can become a stepping stone to reach a target, and hotels aren\u2019t the only way to aim the corporate C-level managers and their secrets through third-party organizations. So <strong>even small and medium companies have to keep the risk of targeted attacks in mind<\/strong>.<\/p>\n<p>Some enterprises underestimate the value of endpoint protection in their IT security strategy; Darkhotel\u2019s victims could tell a lot about just how important endpoints security is. Portable, mobile devices aren\u2019t always used inside the perimeter; <strong>outside the corporate environment<\/strong>, endpoints connecting through unknown wired and wireless networks, should be <strong>properly protected<\/strong>.<\/p>\n<p><strong>How the disease is spreading<\/strong><\/p>\n<p>Now spreading to North and South Korea, Russia, Japan, Thailand and Germany, among others, Dark Hotel begins with a spearphishing or drive-by infection that exploits the Adobe Flash 0-day.<\/p>\n<p>Some targets are spearphished repeatedly using similar social-engineering schemes. Darkhotel consistently archives droppers (.scr executable files with faked extensions using RTLO) within .rar archives, in order to appear to the target as innocuous .jpg files.<\/p>\n<div id=\"attachment_4358\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-4358\" class=\"size-full wp-image-4358\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/08\/06020347\/RTLO-example2-1.png\" alt=\"To check what type it really is, switch to Details view\" width=\"640\" height=\"472\"><p id=\"caption-attachment-4358\" class=\"wp-caption-text\">To check what type it really is, switch to Details view<\/p><\/div>\n<p>In addition to using the leaked Adobe Flash 0day to target specific systems, less targeted methods \u2013 including malicious web sites (e.g. \u201ctisone360.com\u201d) \u2013 are being used to spread the attack. Like the Hacking Team 0-day, it looks as though the \u201ctisone360.com\u201d site was also delivering a Flash CVE-2014-0497 exploit. Detailed attack information is available <a href=\"https:\/\/securelist.com\/blog\/research\/71713\/darkhotels-attacks-in-2015\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><strong>Kaspersky Lab technologies to fight Darkhotel successfully<\/strong><\/p>\n<p>A full list of measures available to mitigate targeted attacks can be found <a href=\"https:\/\/encyclopedia.kaspersky.com\/knowledge\/strategies-for-mitigating-advanced-persistent-threats-apts\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">here<\/a>. Kaspersky Lab supports the majority of these measures and recommends implementing as many of them as possible. We detect new Darkhotel downloaders and infostealers with the verdict \u201cTrojan.Win32.Darkhotel.*\u201d, spearphishing attachments are detected as \u201cTrojan-Dropper.Win32.Dapato.*\u201d and \u201cTrojan-Downloader.Win32.Agent.*\u201d<\/p>\n<p><strong>0-day prevention<\/strong><\/p>\n<p>Darkhotel\u2019s lightly obfuscated .hta files, used for initial penetration, are detected <strong>using emulation<\/strong> with the \u201cHEUR:Trojan.Script.Iframer\u201d verdict. Heuristic algorithms exist for previously unknown malware samples that cannot be detected using databases. Such algorithms are based on the knowledge of both structure and emulated behavior typical patterns.<\/p>\n<p>Kaspersky Lab\u2019s <a href=\"http:\/\/media.kaspersky.com\/en\/business-security\/AEP_WP%20(1).pdf\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Automatic Exploit Prevention<\/strong><\/a> functionality is designed to fight exploits, including 0-days, and is highly effective at detecting Darkhotel components. Heuristics and Automatic Exploit Prevention in Kaspersky Lab\u2019s advanced antimalware engine is a crucial part of a multilayered, comprehensive defense.<\/p>\n<p><strong>Apply patches in time<\/strong><\/p>\n<p>Regularly updating to the latest version of installed software and patching OS will help prevent a vast range of attacks. Timely patching is most easily achieved using a Patch Management toolkit, such as \u00a0Kaspersky Lab\u2019s, working together with or instead of Microsoft WSUS. <strong>Vulnerability Assessment<\/strong> and <strong>Patch Management<a href=\"#_ftn1\" name=\"_ftnref1\" target=\"_blank\" rel=\"noopener\"><strong><sup>[1]<\/sup><\/strong><\/a><\/strong> combined will also update all popular third-party software to the latest versions.<\/p>\n<p><strong>Stolen certificates<\/strong><\/p>\n<p>Like other current Advanced Threat groups, Darkhotel uses stolen certificates to give their modules the appearance of trusted apps. Trust in files is based on their reputation and digital signatures play a big role in gauging reputation. But a digital signature by itself is not enough to create trust. Kaspersky Lab products <strong>detect digitally signed malware<\/strong>.<\/p>\n<p><strong>Compromised Wi-Fi network start pages<\/strong><\/p>\n<p>The most interesting initial penetration technique in the Darkhotel campaign is its infection of hotels\u2019 startup web pages. Targets, including high-level managers, are infected immediately after authentication with luxury hotel local WiFi networks. This attack vector could be successfully mitigated by enabling <strong>Web Anti-Virus in <\/strong><a href=\"https:\/\/www.kaspersky.com\/business-security\/small-to-medium-business\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Kaspersky Endpoint Security<\/strong><\/a><strong> policy.<\/strong><\/p>\n<p><strong>Control servers known URLs<\/strong><\/p>\n<p>When command and control (CnC) servers of any targeted attack are determined we add their addresses into our security database. Kaspersky Lab clients can obtain all the current information about active CnC servers from our special <a href=\"https:\/\/www.kaspersky.com\/enterprise-it-security\/security-intelligence-services\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>data feed<\/strong><\/a>. This feed could be used (e.g. in customer\u2019s SIEM system) to alert system administrators of\u00a0any communications with these malicious servers.<\/p>\n<p><strong>Malicious e-mail attachments<\/strong><\/p>\n<p>Despite all the new ingenious ways to infect hosts, spear-phishing with disguised malicious attachments is still by far the most popular method for malefactors. All <a href=\"https:\/\/www.kaspersky.com\/business-security\/small-to-medium-business\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> product installations protect hosts from this malware propagation technique. Organizations can also deploy <a href=\"https:\/\/www.kaspersky.com\/business-security\/mail-server\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Kaspersky Security for Linux Mail Server<\/strong> or Kaspersky Security for MS Exchange<\/a> centrally to secure business e-mail traffic on the server side.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/D5hYy21cGXo?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\" target=\"_blank\" rel=\"noopener\"><sup>[1]<\/sup><\/a> Vulnerability Assessment and Patch Management are included in <a href=\"https:\/\/www.kaspersky.com\/business-security\/total\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Total Security for Business<\/a>, <a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-advanced\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business Advanced<\/a> and <a href=\"https:\/\/www.kaspersky.com\/business-security\/systems-management\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Systems Management<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab experts have investigated a new series of attacks by the Darkhotel cybercriminal group. Here are the details. <\/p>\n","protected":false},"author":611,"featured_media":15607,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[499,864],"class_list":{"0":"post-15090","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-darkhotel"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/darkhotel-hackingteam\/15090\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/darkhotel-hackingteam\/15090\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/darkhotel-hackingteam\/15090\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/611"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15090"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15090\/revisions"}],"predecessor-version":[{"id":38043,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15090\/revisions\/38043"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15607"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}