Operation TunnelSnake

Discussion in 'malware problems & news' started by Minimalist, May 6, 2021.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    https://securelist.com/operation-tunnelsnake-and-moriya-rootkit/101831/
     
  2. Floyd 57

    Floyd 57 Registered Member

    Joined:
    Mar 17, 2017
    Posts:
    1,296
    Location:
    Europe
    That's pretty cool
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Scary stuff, so rootkits can still be a problem! The problem is that this rootkit is using a legitimate driver from VirtualBox to load an unsigned malicious driver on the system. I wonder which security tools would be able to spot such a thing. Actually, most EDR systems should be able to spot this, at least you would hope so. But that's why a hypervisor based HIPS would be very cool, something like this should be integrated into Windows.
     
  4. Floyd 57

    Floyd 57 Registered Member

    Joined:
    Mar 17, 2017
    Posts:
    1,296
    Location:
    Europe
    Or just don't download malware u know?
     
  5. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Good article.

    In times past on Windows XP when rootkits were so notorious I was more than happy and greeted that challenge by capturing the more clever ones suspending those bugs/drivers especially, and reseated and fitted them for security purposes against their own designs by hiding them in the Alternate Data Streams OF MY CHOICE. Sort of like thanks for the new technique file/driver. If possible (meaning pulling their strike code out and using the safe/code to monitor my own windows against them :D

    Oddysee was another of the best one. It could literally HIDE any file/process from detection except a rootkit revealer tool OR defragmenter! Little known detector- common defragger!
     
    Last edited: May 6, 2021
  6. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Detection rate of files/processes used on VT are quite low. On the other hand, there has been only 10 known instances of it being detected. In other words, a very targeted APT attack.

    BTW - you detect this crap as other like crap is detected, by signature.
     
  7. Floyd 57

    Floyd 57 Registered Member

    Joined:
    Mar 17, 2017
    Posts:
    1,296
    Location:
    Europe
    AV is so bad in static detection, u cannot possibly know it's a virus before it gets discovered as such, unless it's a bad one. So just because VT says 0/60 detected, it just means it's not KNOWN for being a virus. But it could be, just hasn't popped out yet.
     
  8. moredhelfinland

    moredhelfinland Registered Member

    Joined:
    Mar 31, 2009
    Posts:
    347
    Location:
    Finland
    If it creates a service "ZzNetSvc" and if i'm using a "HIPS" that monitors/or deny any new services(and registry entries), does it actually fail, because it needs that service to be enabled to go to second stage of infection?
     
  9. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Well, I was talking about behavior blocking, I don't expect AV's to detect this advanced stuff via signatures and heuristics. But cloud scanning should help, at least in theory. Remember Hypersight Rootkit Detector? It would be cool if Win 10 could improve PatchGuard to monitor suspicious behavior performed by drivers.

    https://www.softpedia.com/get/Security/Security-Related/Hypersight-Rootkit-Detector.shtml

    This is the same as saying "let's stop putting airbags in cars, because we can simply try to avoid car accidents". The point is that you never know when disaster strikes!

    Good point, I suppose that even when this service/driver is unsigned, it should still be spotted by HIPS like the one from SpyShelter and Comodo. I'm not sure which other AV's monitor driver loading.
     
  10. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Don't hold your breath on this one.

    The VBox driver attack is well known. Another example: https://unit42.paloaltonetworks.com/acidbox-rare-malware/ . If this was stopped, the rest of the attack is a moot point. Yet, it seems security solutions are ineffective against it. I did see something stating that if Win 10 virtual based memory integrity was enabled, the OS might detect it.

    Monitoring of registry service creation would also catch crap like this, but its not a standard HIPS mitigation since it will also be triggered for legit service creation. Likewise, monitoring for file creation in C:\Windows\System32\Drivers would have caught the unsigned driver .sys file creation. Again, a lot of FPs with this type of monitoring. Note that technically you're not supposed to be able to drop an unsigned .sys file in this directory. But as the malware analysis shows, it happened.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.