ChamelDoH: New Linux Backdoor for Covert CnC Using DNS-over-HTTPS Tunnelling
Recent observations of the notorious threat actor ChamelGang deploying a previously unknown Linux implant represent a substantial increase of their capabilities. By using DNS-over-HTTPS (DoH) tunnelling, the recently found virus, known as ChamelDoH by cybersecurity company Stairwell, communicates and engages in destructive operations. Positive Technologies initially revealed ChamelGang in September 2021, outlining their attacks on crucial businesses in several nations. The specifics of ChamelDoH, its distinctive communication mechanism, and the shifting strategies used by ChamelGang are covered in this article.
ChamelGang's Background and Attack Patterns:
ChamelGang's actions, which hit the aviation, energy, and fuel industries in Russia, the U.S., India, Nepal, Taiwan, and Japan, were first discovered by Positive Technologies. The threat actor used a passive backdoor known as DoorMe to obtain unauthorised access and carry out data theft attacks on Red Hat JBoss Enterprise Application and Microsoft Exchange servers. Based on cookie parameters, this native IIS module processed particular HTTP requests.
The Discovery of ChamelDoH:
Stairwell recently found the ChamelDoH Linux backdoor. This malware, which was developed in C++, aims to gather system information and offers remote access for a variety of functions, such as file upload, download, deletion, and shell command execution. ChamelDoH stands out because to its unique method of communication, which sends DNS TXT requests to a malicious nameserver using DNS-over-HTTPS (DoH).
Unique Communication Method and Benefits for Threat Actors:
DoH for command-and-control (C2) has numerous advantages for ChamelGang. It is challenging to quickly prevent malicious traffic at the company level when using widely-used DNS servers like Cloudflare and Google. Furthermore, adversary-in-the-middle (AitM) attacks are more difficult to launch because to the use of HTTPS encryption. This essentially establishes an encrypted communication path between the infected computers and the C2 server, making it more challenging for security software to detect and deny bogus DoH requests.
Challenges for Security Solutions and Detection:
Because ChamelDoH attacks employ domain fronting similar to C2 assaults, Daniel Mayer, a researcher at Stairwell, underlines how difficult it is to identify and thwart these attacks. Even if the requests are made for legitimate services located on content delivery networks (CDNs), the Host header on the requests points them to the C2 server. This evasion technique makes the identification and prevention procedures more difficult for security systems.
Implications of ChamelDoH Discovery:
According to Stairwell's study, ChamelGang has put a lot of time and effort into creating a reliable toolset for Linux incursions. The discovery of ChamelDoH highlights the threat actor's growing sophistication and broadening capabilities. To combat these changing dangers, organisations must maintain vigilance and modify their security systems.
The discovery of the ChamelDoH Linux backdoor provides insight into the ChamelGang's ongoing efforts to improve their cyber capabilities. Security measures face significant challenges because ChamelGang uses DNS-over-HTTPS (DoH) for command-and-control communications to evade detection and eavesdropping. This development highlights the significance of firms maintaining current cybersecurity defences and being proactive in recognising and mitigating such risks.
As ChamelGang expands its assault vectors and targets critical enterprises, cybersecurity firms and law enforcement organisations must collaborate to develop effective defences. Exchanging threat intelligence, conducting in-depth investigations, and encouraging global cooperation are all necessary for dismantling the threat actors' infrastructure.
In order to defend against ChamelGang and related attacks, organisations should prioritise comprehensive security procedures, such as regular system updates, vulnerability patching, network monitoring, and employee training on best practises for recognising and mitigating potential risks. Businesses that employ proactive security measures and stay one step ahead of hackers can better protect their crucial systems, data, and reputation in a hostile digital world.
Comments
Post a Comment