Lucene search

K
thnThe Hacker NewsTHN:E15D0AB9B6B899C095129C9A36F33864
HistoryJun 15, 2024 - 8:13 a.m.

Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks

2024-06-1508:13:00
The Hacker News
thehackernews.com
9
pakistani
hackers
disgomoji malware
indian government cyber attacks
golang
linux systems
discord-c2
emojis
command and control
file upload
file download
file exfiltration

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.076 Low

EPSS

Percentile

94.2%

DISGOMOJI Malware

A suspected Pakistan-based threat actor has been linked to a cyber espionage campaign targeting Indian government entities in 2024.

Cybersecurity company Volexity is tracking the activity under the moniker UTA0137, noting the adversaryโ€™s exclusive use of a malware called DISGOMOJI thatโ€™s written in Golang and is designed to infect Linux systems.

โ€œIt is a modified version of the public project Discord-C2, which uses the messaging service Discord for command and control (C2), making use of emojis for its C2 communication,โ€ it said.

Itโ€™s worth noting that DISGOMOJI is the same โ€œall-in-oneโ€ espionage tool that BlackBerry said it discovered as part of an infrastructure analysis in connection with an attack campaign mounted by the Transparent Tribe actor, a Pakistan-nexus hacking crew

Cybersecurity

The attack chains commence with spear-phishing emails bearing a Golang ELF binary delivered within a ZIP archive file. The binary then downloads a benign lure document while also stealthily downloading the DISGOMOJI payload from a remote server.

A custom-fork of Discord-C2, DISGOMOJI is designed to capture host information and run commands received from an attacker-controlled Discord server. It also adopts the novel approach of sending and processing commands using different emojis -

  • ๐Ÿƒโ€โ™‚๏ธ - Execute a command on the victimโ€™s device
  • ๐Ÿ“ธ - Capture a screenshot of the victimโ€™s screen
  • ๐Ÿ‘‡ - Upload a file from the victimโ€™s device to the channel
  • ๐Ÿ‘ˆ - Upload a file from the victimโ€™s device to transfer[.]sh
  • โ˜๏ธ - Download a file to the victimโ€™s device
  • ๐Ÿ‘‰ - Download a file hosted on oshi[.]at to the victimโ€™s device
  • ๐Ÿ”ฅ - Find and exfiltrate files matching the following extensions: CSV, DOC, ISO, JPG, ODP, ODS, ODT, PDF, PPT, RAR, SQL, TAR, XLS, and ZIP
  • ๐ŸฆŠ - Gather all Mozilla Firefox profiles on the victimโ€™s device into a ZIP archive
  • ๐Ÿ’€ - Terminate the malware process on the victimโ€™s device
  • ๐Ÿ• - Inform the attacker that the command is being processed
  • โœ… - Inform the attacker that the command has completed execution

โ€œThe malware creates a dedicated channel for itself in the Discord server, meaning each channel in the server represents an individual victim,โ€ Volexity said. โ€œThe attacker can then interact with every victim individually using these channels.โ€

DISGOMOJI Malware

The company said it unearthed different variations of DISGOMOJI with capabilities to establish persistence, prevent duplicate DISGOMOJI processes from running at the same time, dynamically fetch the credentials to connect to the Discord server at runtime rather than hard coding them, and deter analysis by displaying bogus informational and error messages.

Cybersecurity

UTA0137 has also been observed using legitimate and open-source tools like Nmap, Chisel, and Ligolo for network scanning and tunneling purposes, respectively, with one recent campaign also exploiting the DirtyPipe flaw (CVE-2022-0847) to achieve privilege escalation against Linux hosts.

Another post-exploitation tactic concerns the use of the Zenity utility to display a malicious dialog box that masquerades as a Firefox update in order to socially engineer users into giving up their passwords.

โ€œThe attacker successfully managed to infect a number of victims with their Golang malware, DISGOMOJI,โ€ Volexity said. โ€œUTA0137 has improved DISGOMOJI over time.โ€

Found this article interesting? Follow us on Twitter ๏‚™ and LinkedIn to read more exclusive content we post.

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.076 Low

EPSS

Percentile

94.2%