Casa > cibernético Notícias > NetSarang Apps Riddled with ShadowPad Backdoor

NetSarang Apps Riddled com ShadowPad Backdoor

imagem ShadowPad Backdoor

Pesquisadores de segurança descobriram que muitos produtos de conectividade feitas por NetSarang estão infectadas com o backdoor ShadowPad. This was done in a hacker attack which allowed the criminals to intrude into the company’s servers and place malicious installers in the place of the legitimate files.

Story relacionado: Redes internas afetadas por auto-propagação Emotet Trojan

NetSarang Products Infected With The ShadowPad Backdoor

NetSarang, one of the well-known software developers of connectivity solutions, has been found to feature dangerous malware-infected installers of their products. The security incident was reported by a cybersecurity company that made the analysis after carefully reviewing the applications downloaded from their official site. The discovery was made after one of the vendor’s customers noticed a suspicious DNS request coming from an installed software package on their own network. The investigation reveals that several products made by the company have been compromised: Xmanager Enterprise 5 (Construir 1232), Xmanager 5 (Construir 1045), Xshell 5 (Construir 1322), Xftp 5 (Construir 1218) e Xlpd 5 (Construir 1220).

The security experts and the investigators believe that the criminals behind the infections have been able to access the download servers and modify the source code of the build services or replace the installers with their own versions. The malicious files were released on July 18 while the discovery was made several weeks later on August 4. Kaspersky Labs reveal that the malware was activated only on systems owned by a company in Hong Kong suggesting that the virus code can be used against targets only. It is possible that other companies have been affected by the malware as well. Fortunately as the anti-virus companies are now alerted of the threat it is easy to remove both active and dormant infections.

Story relacionado: Ataques Mamba ransomware em grande escala na ascensão outra vez

Impact of the ShadowPad Backdoor

The ShadowPad backdoor is a modular malware that is designed to infect the victims in two stages:

  1. The first stage embeds the shellcode into a legitimate process callednssock2.dll”. This initiates the network connection to the hacker-controlled C&servidores C. Durign this stage sensitive information is gathered from the victim computer and is relayed to the criminals.
  2. The next step is to engage the built-in ShadowPad backdoor engine. The collected samples have the ability to activate five different modules that feature a modular architecture. This means that it is possible to load additional plugins if required.

All network connections are encrypted using a private key which make it very hard for administrators to discover infections on their networks. As this is a sophisticated backdoor it allows the criminals to perform several malicious actions on the compromised machines:

  • Recolha de informações ‒ By request the hackers can initiate a data harvesting process that is able to download a list of all hardware components, software configuration files or user data. Isto inclui o seguinte: data and time, memory status, CPU frequency, free disk space, video mode, system regional settings, PID of processes, versão do sistema operacional, usernames and domain name.
  • DNS Module ‒ ShadowPad backdoor is able to communicate with the C&C servers using the DNS protocol.
  • Seqüestro de dados ‒ The ShadowPad backdoor is able to steal sensitive user files from the compromised machines. When private data is hijacked from the victims the supplied information can be used for criminal purposes like financial abuse or identity theft.
  • infecções por vírus ‒ The backdoor can be used as a payload dropper for other threats. Infections with it can lead to dangerous infections.
  • Propagação rede ‒ The remote control capabilities allow the hackers to infect other hosts located on the same network by exploiting found weaknesses.

As a result the backdoor allows the hackers to upload malware files to the compromised clients and bind them to running processes or new threads. This all can be done in a VFS (virtual file system) that is contained in the Windows registry. Thanks to the encryption module the malware actions cannot be effectively discovered by most anti-virus utilities. This is the reason why we recommend the use of a quality anti-spyware product which is able to effectively detect incoming samples and delete active infections with a few mouse clicks.


Remoção de Malware Ferramenta

digitalizador Spy Hunter só irá detectar a ameaça. Se você quiser a ameaça de ser removido automaticamente, você precisa comprar a versão completa da ferramenta anti-malware.Saiba Mais Sobre SpyHunter Anti-Malware Ferramenta / Como desinstalar o SpyHunter

Martin Beltov

Martin formou-se na publicação da Universidade de Sofia. Como a segurança cibernética entusiasta ele gosta de escrever sobre as ameaças mais recentes e mecanismos de invasão.

mais Posts

Me siga:

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

Compartilhar no Facebook Compartilhar
Compartilhar no Twitter chilrear
Compartilhar no Google Plus Compartilhar
Partilhar no Linkedin Compartilhar
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Partilhar no StumbleUpon Compartilhar