NewsSecurity Vulnerabilities

Operation GhostSecret Data Theft Campaign

The HIDDEN COBRA advanced persistent threat group are believed to be conducting an ongoing campaign known as Operation GhostSecret.

Multiple malware tools with similarities to other known HIDDEN COBRA tools such as BANKSHOT are used. These tools have multiple capabilities, including; creating processes, transmitting data to a server and listing directory files.

A separate tool named Proxysvc is used to communicate with the command and control infrastructure, exfiltrating data and downloading further payloads using HTTP over SSL.

As part of its initialization, the implant gathers basic system information and sends it to its hardcoded control server 203.131.222.83 using SSL over port 443

Full technical details can be found here.

Control Servers

203.131.222.83

203.131.222.95

203.131.222.109

193.248.247.59

196.4.67.45

14.140.116.172 (old 2017 version address)

Affected Platforms

  • Windows Desktops and Servers
  • Linux-based Servers




Duncan

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.