securityonline.info
Open in
urlscan Pro
2a05:d014:776:a63e:ceb:15ad:bbb7:6a9d
Public Scan
URL:
https://securityonline.info/researcher-identifies-toddycat-inspired-apt-attack-leveraging-icmp-backdoor-and-microsoft-exchan...
Submission: On November 26 via api from IN — Scanned from DE
Submission: On November 26 via api from IN — Scanned from DE
Form analysis
2 forms found in the DOMhttps://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
https://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
Text Content
Skip to content Cybersecurity News * Search for: * Home * Cyber Security * Data Leak * Linux * Malware Attack * Open Source Tool * Technology * Vulnerability * Windows * Home * Cyber Security * Data Leak * Linux * Malware Attack * Open Source Tool * Technology * Vulnerability * Windows Search for: Cybersecurity News * Cyber Security / Malware RESEARCHER IDENTIFIES TODDYCAT-INSPIRED APT ATTACK LEVERAGING ICMP BACKDOOR AND MICROSOFT EXCHANGE FLAWS by do son · September 3, 2024 Image: Kaspersky Cybersecurity researchers at Kaspersky’s Global Emergency Response Team (GERT) have uncovered a sophisticated attack involving an ICMP backdoor, bearing striking similarities to the tactics used by the ToddyCat APT group. This discovery was made during an investigation into suspicious activity on a client’s domain controllers and Exchange servers. The attackers exploited a combination of vulnerabilities, including the Microsoft Exchange server remote code execution flaw (CVE-2021-26855) and an older, patched IKEEXT service vulnerability, to gain initial access and establish persistence. One of the more intriguing aspects of this attack was the abuse of the IKEEXT service, a default component in Windows systems responsible for managing Internet Key Exchange (IKE) protocols. The attackers re-purposed an old vulnerability related to the wlbsctrl.dll library—a flaw first reported and patched by Microsoft in 2012—to achieve persistence. By planting a malicious version of wlbsctrl.dll in the system32 directory, the threat actors ensured that their backdoor would be executed each time the IKEEXT service was invoked, without needing to modify standard autorun configurations. Image: Kaspersky The attackers further exploited the IKEEXT service to perform lateral movement across the compromised network. By leveraging the Server Message Block (SMB) protocol, they established a custom firewall rule—codenamed “DLL Surrogate”—which enabled the malicious dllhost.exe to listen on port 52415. This allowed the threat actor to move laterally with minimal detection, spreading their foothold across the organization’s infrastructure. The attackers then deployed a custom ICMP backdoor, allowing them to maintain covert access to the compromised system. This backdoor, acting as a loader, decrypts and executes payloads stored within the Windows registry, ultimately leading to the establishment of a raw ICMP socket for communication. Image: Kaspersky Kaspersky’s analysis of the backdoor revealed that it operated as a loader, executing a series of complex actions to establish persistence and conceal its activities: * Mutex Checking and Termination: The backdoor first checked for a specific mutex in memory, terminating if the mutex was already present to avoid multiple instances running simultaneously. * Payload Retrieval and Execution: The backdoor then attempted to decrypt a file stored in the Windows directory, using a combination of AES encryption with keys derived from the volume serial number of the C drive. The decrypted payload was then stored in the Windows registry and executed in memory, ensuring that the malicious code remained hidden from disk-based detection tools. * Shellcode Injection: The decrypted payload, identified by its “CAFEBABE” header—a marker commonly associated with Java Class files—was loaded into memory and executed. This payload was designed to create a raw ICMP socket, allowing the system to receive and execute commands from the threat actor without establishing an outbound connection, thereby minimizing the risk of detection. While attribution remains uncertain, the attack’s tactics, techniques, and procedures (TTPs) align closely with those observed in previous campaigns associated with the ToddyCat APT group. RELATED POSTS: * ToddyCat’s Stealthy Assault: Asian Nations in the Crosshairs * ToddyCat: Unveiling the Stealthy APT Group Targeting Asia-Pacific Governments Share Tags: CVE-2021-26855ICMP BackdoorMicrosoft ExchangeToddyCat APT Follow: * * * * * SEARCH Visit Penetration Testing Tools & The Information Technology Daily Support Securityonline.info site. Thanks! * Vulnerability QNAP Patches Critical Zero-Day Exploited at Pwn2Own Ireland 2024 – CVE-2024-50388 October 30, 2024 * Vulnerability PoC Exploit Releases for Critical Symlink Flaw in Apple’s iOS – CVE-2024-44258 November 5, 2024 * Vulnerability CISA Adds Five Actively Exploited Vulnerabilities to KEV Catalog November 12, 2024 * Vulnerability From CVE to PoC: A Collection Maps Windows Privilege Escalation Landscape November 18, 2024 * Vulnerability CVE-2024-11477: 7-Zip Vulnerability Allows Remote Code Execution, Update Now! November 24, 2024 Reward BRILLIANTLY SAFE! securityonline.info CONTENT & LINKS Verified by Sur.ly 2022 WEBSITE 1. About SecurityOnline.info 2. Advertise on SecurityOnline.info 3. Contact * About Us * Contact Us * Disclaimer * Privacy Policy * DMCA NOTICE * Sponsors * Join Us * Member Login * Thank You * Membership Renewal Cybersecurity News © 2024. All Rights Reserved. * * * * * x ✕ DATENSCHUTZ & TRANSPARENZ securityonline.info und unsere Partner bitten um Ihre Zustimmung zur Nutzung Ihrer persönlichen Daten sowie zum Speichern und/oder Zugreifen auf Informationen auf Ihrem Gerät. Dazu gehört die Nutzung Ihrer persönlichen Daten für personalisierte Werbung und Inhalte, Werbe- und Inhaltsmessung, Publikumsforschung und die Entwicklung von Dienstleistungen. Ein Beispiel für die Verarbeitung von Daten könnte ein eindeutiger Identifikator sein, der in einem Cookie gespeichert wird. Ihre persönlichen Daten können von 911 Partnern gespeichert, abgerufen und geteilt werden oder speziell von dieser Seite genutzt werden. Sie können Ihre Einstellungen jederzeit ändern oder Ihre Zustimmung zurückziehen; der Link dazu befindet sich in unserer Datenschutzrichtlinie am Ende dieser Seite. Einige Anbieter können Ihre persönlichen Daten auf Grundlage eines berechtigten Interesses verarbeiten, gegen das Sie durch Verwalten Ihrer Einstellungen unten Einspruch erheben können. Einstellungen verwalten Nur notwendige Cookies Weiter mit den empfohlenen Cookies Anbieter-Liste | Datenschutzerklärung