APT16
APT16
Type: Likely Nation-State (based on targets)
APT16 Status: Believed Active
APT16 Other Names: OpTaiwan
Active Since/Discovered: June 2015
Last Report: January 1, 2016
Targets: Japanese organizations and Taiwanese Media and Entertainment
Target Sectors: financial services, high-tech, media, and government
Malware:
- ELMER Backdoor (Backdoor.APT.Suroot)
- Non-persistent proxy-aware HTTP backdoor written in Delphi
- Capable of performing file uploads and downloads, file execution, and process and directory listings
- Sends HTTP GET requests to a hard-coded CnC server to receive commands
- Parses the HTTP response packets received from the CnC server for an integer string corresponding to the command that needs to be executed
- IRONHALO (Trojan.IRONHALO)
- Downloader that uses the HTTP protocol to retrieve a Base64 encoded payload from a hard-coded command-and-control (CnC) server and uniform resource locator (URL) path
- Persists by copying itself to the current user’s Startup folder
- Encoded payload is written to a temporary file, decoded and executed in a hidden window
- DOORJAMB
Preferred Attack Vector: Spear phishing attack and Exploits
TTP:
- Malicious Microsoft Word document exploiting EPS (Encapsulated PostScript) embedded image file in Office (CVE-2015-2545 and CVE-2015-2546) document designed to bypass memory protections on Windows systems to abuse “dict and copy operators”
- The attacker gains access to memory by forging a string via EPS
- Used Windows local privilege escalation vulnerability CVE-2015-1701 to obtain SYSTEM level access to compromised machines
- Afterward, exploit shellcode deployed either the IRONHALO downloader or the ELMER backdoor
Unique:
- Attacks against Taiwan corresponded with their January 16, 2016 elections
- attacks may have been attempt to gain intel on politicians, anticipate election outcome, etc
Recent Comments