• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      event logo
      V3 Technology Awards

      2016 V3 Awards

      • Date: 25 Nov 2016
      • London
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

APT17 DeputyDog hackers are pushing Blackcoffee malware using TechNet

FireEye and Microsoft report shutting down Chinese-based hacker group

Dog at Laptop
DeputyDog hackers return
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 14 May 2015
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

The infamous APT17 DeputyDog hackers have been using Microsoft's TechNet blog to distribute a dangerous Blackcoffee malware, according to researchers at FireEye.

The tactic was revealed in the Hiding in Plain Sight: FireEye Exposes Chinese APT Obfuscation Tactic research paper, which claimed the hackers have been using the blog as a means to hide their activities from security professionals.

"FireEye has determined that APT17, a China-based advanced persistent threat group, posted in forum threads and created profile pages to host encoded C2 IP addresses that would direct a variant of the Blackcoffee backdoor to their C2 server," read the paper.

"They used legitimate infrastructure - the ability to post or create comments on forums and profile pages - to embed a string that the malware would decode to find and communicate with the true CnC IP address."

The researchers said TechNet's security was not compromised and the tactic could be used on most forums and blogs. They added the tactic is particularly troublesome as it makes spotting malicious activity more difficult.

"This additional obfuscation puts yet another layer between APT17 and the security professionals attempting to chase them down," read the paper.

"APT17's tactic - using a dead drop resolver and embedding encoded IP addresses as opposed to displaying it in plain text - can delay detection, discourage IT staff from discovering the actual CnC IP address, and prevent discovery of the CnC IP via binary analysis."

The Blackcoffee malware offers the hackers a variety of powers.

"Blackcoffee's functionality includes uploading and downloading files; creating a reverse shell; enumerating files and processes; renaming, moving, and deleting files; terminating processes; and expanding its functionality by adding new backdoor commands," explained the paper.

The APT17 hacker group is believed to be based in China and has mounted high-profile cyber strikes on big name targets including the US government, the defence industry, law firms, information technology companies and mining companies in the past.

FireEye reported successfully shutting down the TechNet operation as part of a joint operation with Microsoft, but warned it expects similar attacks to appear in the very near future.

"We have already observed threat actors adopting similar techniques and moving some CnC activity to legitimate websites that they do not need to compromise," read the paper.

"In the same vein, some threat actors have already begun using social media sites such as Twitter and Facebook for malware distribution and CnC.

"FireEye expects that threat groups are already using this technique, with their own unique variations, and others will adopt similar measures to hide in plain sight."

APT17 is one of many threat campaigns believed to be sponsored by the Chinese government.

The US Department of Defense (DoD) warned on Monday that China is developing dangerous cyber attack tools that could knock a nation's infrastructure offline using data stolen during high-profile hacks.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Hacking
  • malware
  • China
  • Microsoft
  • FireEye

V3 Latest

iphone 6s plus in grey
Apple sees smartphone slump but Samsung soars amid global market growth

Gartner data shows BlackBerry and Windows Phone all but dead

  • Mobile Phones
  • 19 August 2016
surveillance-eye-watching-you
Bulk data collection by MI5, MI6 and GCHQ is warranted, says terrorism watchdog

Report seized on by government to justify Snoopers' Charter

  • Government
  • 19 August 2016
Uber and Volvo team up for self-driving car development
Uber and Volvo partner for $300m self-driving car push

Firms will create new base vehicle to further self-driving ambitions

  • Gadgets
  • 19 August 2016
Sainsbury's sign
Sainsbury's creates chief data officer role

New post designed to to 'enhance data-driven approach to retailing'

  • Databases
  • 19 August 2016
blog comments powered by Disqus
Back to Top

Most read

Microsoft Windows 10 on a laptop
Windows 10 Anniversary Update: 8 ways to tackle problems caused by latest release
Surface Book fulcrum hinge
Microsoft Surface Book 2 release date, specs and price rumours
Hacker
NSA hack sees information up for auction in major security incident
surveillance-eye-watching-you
Bulk data collection by MI5, MI6 and GCHQ is warranted, says terrorism watchdog
Lenovo Ideapad 710S
Lenovo Ideapad 710S review
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016