No rest for the wicked HiatusRAT. [Research Saturday]
Oct 28, 2023
auto_awesome
Danny Adamitis, Lumen's Black Lotus Labs researcher, discusses the HiatusRAT malware targeting business-grade routers. The research reveals a shift in targeting towards a US military procurement system and Taiwan-based organizations, aligning with the strategic interest of the People's Republic of China. The podcast also highlights the importance of replacing legacy SIMs, securing data through Microsoft's mission innovation, upgrading end-of-life routers, and monitoring and updating old hardware devices in cybersecurity.
The Hiatus Rat malware campaign targeted older routers and focused on networks of interest for strategic intelligence, aligning with China's interests.
To defend against router-based intrusions, organizations should use secure protocols for email traffic and regularly monitor and update their routers while implementing analytics and logging for detecting abnormal data transfers.
Deep dives
Router-based intrusions pose a significant threat
Researchers have been investigating router-based intrusions as a lesser-known security threat that can bypass firewalls and EDR solutions. Routers can serve as critical choke points, providing access to network traffic and potentially compromising organizations' security. This research focuses on the Hiatus Rat malware campaign, which targeted a range of networks, including IT service providers, MSSPs, and municipal level government organizations, aligning with the strategic interests of China. The campaign primarily targeted older DreTech Weiger routers, which were end of life but still active on the internet. The malware employed two primary binaries, including a variant of TCP dump to capture packets and a custom Trojan called HIDIS RAT for remote access and control.
Sophistication of the threat actor and their strategies
The threat actor behind the Hiatus Rat campaign demonstrated a high level of sophistication. They selected specific targets, focusing on networks of interest that could provide strategic intelligence or access to downstream customer networks. The choice to target end-of-life routers exploited the lack of cyber hygiene and ongoing updates. Notably, the threat actor maintained the same command and control servers throughout the campaign, showing a brazen approach. Their shifting targeting in the summer of 2023 emphasized the focus on Taiwan and US military procurement servers, indicating economic espionage objectives.
Recommendations for defense and prevention
To defend against router-based intrusions like the Hiatus Rat malware campaign, several recommendations are provided. Using secure protocols for email traffic, such as secure SMTP, POP3, and IMAP, can enhance encryption and protect sensitive data. It is crucial for organizations to be aware of their routers, regularly monitor and update them, and work with Internet Service Providers (ISPs) to ensure proper security measures. Analytics and logging should be implemented to detect abnormal data transfers, regardless of geolocation, as threat actors can engage in traffic tunneling to evade traditional threat models.
Danny Adamitis from Lumen's Black Lotus Labs sits down to discuss their work on "No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action." Last March Lumen's Black Lotus Lab researchers discovered a novel malware called HiatusRAT that targeted business-grade routers.
The research states "In the latest campaign, we observed a shift in reconnaissance and targeting activity; in June we observed reconnaissance against a U.S. military procurement system, and targeting of Taiwan-based organizations." This shift in information gathering and targeting preference exhibited in the latest campaign is synonymous with the strategic interest of the People’s Republic of China according to the 2023 ODNI threat assessment.