Aggregator
完美黑客:罗伯特.莫瑞斯和它的蠕虫病毒
Darka5恶意家族样本分析
近期,广州大学、国家工业信息安全发展研究中心与杭州海康威视数字技术股份有限公司安全研究团队在研究过程中捕获到一例具有显著特征的病毒样本,该样本具有独特的攻击手法和高度的隐蔽性,根据其在下载服务器上的文件命名,该样本被命名为darka5。经过对该样本的深入分析,研究团队发现其不仅运用了先进的加密技术,还具备复杂的网络通信混淆手段,使得追踪和防御工作面临巨大挑战。
本报告将详细剖析darka5恶意家族样本的关键特征,涵盖其攻击向量、下载器行为、数据加密差异、通信流量混淆以及特殊的隐蔽手段,旨在为网络安全专家和防御者提供深入的见解,以更好地理解和应对这一新兴安全威胁。
一 样本分析
(一)攻击向量
darka5是一个通过IoT设备命令执行漏洞进行传播的恶意样本,研究团队通过物联网威胁诱捕系统成功捕获该样本,其投递方式较为复杂,通过分析捕获所得攻击日志可知,攻击者首先通过echo的方式实现样本文件的拼接,然后写入一个微型下载器,最终通过该下载器进行攻击样本的下载和执行。攻击载荷如下图所示:
攻击源IP为109.205.213.198,经公开信息追溯,该IP最早的活跃时间为2023年12月27日:
(二)下载器分析
基于对攻击向量的分析,研究团队成功还原出大小为1980字节的ELF文件,该文件未使用libc,推测其使用汇编语言编写。完整的函数列表如下:
在主函数中,该程序尝试通过HTTP协议从远程服务器(http://2.57.122.83:80/darka5)下载文件到本地的/dev/.j目录下:
(三)数据加密差异
通过分析,darka5样本采用了ChaCha20加密算法,该样本基于Mirai修改而来,与2023年360 Netlab曾分析过的Rimasuta样本相似,同样引入了ChaCha20算法,但仅限于常量字符串加密。
ChaCha20算法所使用的Key和Nonce硬编码在常量段:
在Key实际使用时,会先经过异或后再传入ChaCha20加密函数:
解密后,该样本的常量字符串表如下:
(四)通信流量混淆
在darka5样本中,对于Key的异或手段同样用在了与C2通信的过程中。当解析来自C2的攻击指令时,该样本会将流量内容与0x82异或操作,以还原出原始的攻击者指令:
(五)特殊的隐蔽手段
通过对darka5样本进行深入分析发现,该样本使用了较为特殊的C2连接方式。darka5样本具有一个统一的函数入口,用来返回即将要连接的C2服务器。该函数使用了加密常量表中存储的域名:iwant.coin、chongwa.bazar、packetsyikes.lib、qq.com、git.hbmc.net,以及端口:8338、9944、3177。在连接C2服务器的函数时,会根据连接失败的次数随机选择不同的域名:
除根据域名重试次数和随机数选择域名之外,darka5样本在解析域名的方式上亦呈现出与以往常见病毒的不同之处。通过逆向分析发现该样本在选择五个域名之中的任意一个之后,还会随机选择一个硬编码的DNS服务器来进行域名解析,以此提高域名解析的成功率。可能选择的DNS服务器列表如下:
在经过上述C2服务器地址解析过程后,如若C2服务器解析或者连接失败,darka5样本将自动增加重试计数,并影响下一次C2服务器的解析逻辑,此过程将持续进行,直至成功解析并连接到C2服务器为止。
在这种C2服务器解析的逻辑机制中,涉及多个具有不确定的变量因素,包括重试失败的次数、随机选取的域名结果以及随机选择的DNS服务器,这些变量因素均会对最终解析到的C2地址产生影响。同时,在这种随机选择和重试的机制下,C2服务器信息的隐蔽性得到了显著提升。darka5样本能够成功迷惑各类沙箱服务,使其在有限的分析时间内提取到错误的C2服务器信息。
二 总结
darka5样本运用多种技术手段,使其在与常规Mirai样本相比,展现出明显的差异性。无论是常量表使用ChaCha20算法加密,还是控制指令混淆,或是特殊的C2解析方式,这些特征都极大地增加了样本分析的难度,使得现有的自动化分析流程难以从中提取出有价值的信息。此外,根据捕获到的攻击向量分析,该病毒开发者显然擅长追踪和利用新漏洞,对此病毒家族后续可能造成的更大影响与危害,需予以高度警觉。
三 loc
注:该成果源自广州大学牵头的国家重点研发计划项目(2022YFB3104100)中的课题四“高质量攻击数据诱捕与分析关键技术及系统”(2022YFB3104104),旨在构建面向大规模物联网攻击威胁的主动防护能力。
Darka5恶意家族样本分析
Darka5恶意家族样本分析
黑客在PoisonSeed网络钓鱼攻击中降低FIDO2多因素认证强度
Darka5恶意家族样本分析
黑客在PoisonSeed网络钓鱼攻击中降低FIDO2多因素认证强度
CISA Recommends Segmentation & Zero Trust to Combat Interlock Ransomware
Oorlogsslachtoffer na 80 jaar geïdentificeerd
Steam 之后 Itch.io 限制成人游戏
更新:Itch.io 证实在支付公司压力下被迫对 NSFW 内容急速采取行动,否则平台的支付功能可能受到影响。
Sygnia Uncovers Active Chinese-Nexus Threat Actor Targeting Critical Infrastructure
Global leader in Incident Response divulges findings into persistent, long-term espionage campaigns targeting VMware ESXi and vCenter environments.
The post Sygnia Uncovers Active Chinese-Nexus Threat Actor Targeting Critical Infrastructure appeared first on Sygnia.
Удалите эти APK немедленно: список приложений-двойников в вашем телефоне
Autoswagger: Open-source tool to expose hidden API authorization flaws
Autoswagger is a free, open-source tool that scans OpenAPI-documented APIs for broken authorization vulnerabilities. These flaws are still common, even at large enterprises with mature security teams, and are especially dangerous because they can be exploited with little technical skill. Autoswagger begins by detecting API schemas across a range of common formats and locations, starting with a list of an organization’s domains. It scans for OpenAPI and Swagger documentation pages, sending requests to each host … More →
The post Autoswagger: Open-source tool to expose hidden API authorization flaws appeared first on Help Net Security.
CISA Alerts on Google Chromium Input Validation Flaw Actively Exploited
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a severe input validation vulnerability in Google Chromium that is currently being actively exploited by threat actors. The vulnerability, designated as CVE-2025-6558, poses significant risks to millions of users across multiple web browsers and has prompted urgent action from federal cybersecurity authorities. […]
The post CISA Alerts on Google Chromium Input Validation Flaw Actively Exploited appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access
Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access
Key Operator of World’s Largest XSS Dark Web Platform Detained
International law enforcement agencies have dismantled one of the world’s most influential Russian-speaking cybercrime platforms following the arrest of its suspected administrator in a coordinated operation spanning France, Ukraine, and broader European cooperation. The takedown of xss.is represents a significant blow to global cybercriminal networks that have operated with relative impunity on the dark web […]
The post Key Operator of World’s Largest XSS Dark Web Platform Detained appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Why outsourcing cybersecurity is rising in the Adriatic region
In this Help Net Security interview, Aleksandar Stančin, Board Member Adriatics, Exclusive Networks, discusses the state of cybersecurity in the Adriatic region. He talks about how local markets often lag behind EU regulations, despite facing threats comparable to those in other parts of Europe. While adoption may be slower, progress is underway to strengthen cybersecurity across industries. Since your role focuses on the Adriatic region, what unique security challenges do you see compared to other … More →
The post Why outsourcing cybersecurity is rising in the Adriatic region appeared first on Help Net Security.
Cyber First Responders: Once More Unto the Breach
If you're looking for a career that lets you serve your community and protect critical systems, cybersecurity may be right for you. It offers more than just technical work. It's a crisis discipline and increasingly, one of the most vital roles in disaster resilience.