Cyber Security

Iranian Hackers Spotted Using a new DNS Hijacking Malware in Recent Attacks

The Iranian state-sponsored threat actor tracked under the moniker Lyceum has turned to using a new custom .NET-based backdoor in recent campaigns directed against the Middle East.

“The new malware is a .NET based DNS Backdoor which is a customized version of the open source tool ‘DIG.net,'” Zscaler ThreatLabz researchers Niraj Shivtarkar and Avinash Kumar said in a report published last week.

“The malware leverages a DNS attack technique called ‘DNS Hijacking’ in which an attacker-controlled DNS server manipulates the response of DNS queries and resolves them as per their malicious requirements.”

CyberSecurity

DNS hijacking is a redirection attack in which DNS queries to genuine websites are intercepted to take an unsuspecting user to fraudulent pages under an adversary’s control. Unlike cache poisoning, DNS hijacking targets the DNS record of the website on the nameserver, rather than a resolver’s cache.

DNS Hijacking Malware

Lyceum, also known as Hexane, Spirlin, or Siamesekitten, is primarily known for its cyber attacks in the Middle East and Africa. Earlier this year, Slovak cybersecurity firm ESET tied its activities to another threat actor called OilRig (aka APT34).

The latest infection chain involves the use of a macro-laced Microsoft Document downloaded from a domain named “news-spot[.]live,” impersonating a legitimate news report from Radio Free Europe/Radio Liberty about Iran’s drone strikes in December 2021.

DNS Hijacking Malware

Enabling the macro results in the execution of a malicious code that drops the implant to the Windows Startup folder to establish persistence and ensure it automatically runs every time the system is restarted.

CyberSecurity

The .NET DNS backdoor, dubbed DnsSystem, is a reworked variant of the open-source DIG.net DNS resolver tool, enabling the Lyceum actor to parse DNS responses issued from the DNS server (“cyberclub[.]one”) and carry out its nefarious goals.

In addition to abusing the DNS protocol for command-and-control (C2) communications to evade detection, the malware is equipped to upload and download arbitrary files to and from the remote server as well as execute malicious system commands remotely on the compromised host.

“APT threat actors are continuously evolving their tactics and malware to successfully carry out attacks against their targets,” the researchers said. “Attackers continuously embrace new anti-analysis tricks to evade security solutions; re-packaging of malware makes static analysis even more challenging.”

Products You May Like

Articles You May Like

iPhone 14 Series Tipped to Pack Larger Batteries Than iPhone 13 Models
Realme TechLife Watch R100 With Bluetooth Calling Launched in India: Here’s All You Need to Know
Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit Spyware
Artificial Photosynthesis Developed to Help Make Food Production More Energy-Efficient
Android Auto for Mobile Screens App Being Pulled Down; Replaced by Google Assistant Driving Mode: Report

Leave a Reply

Your email address will not be published.