Lumen’s Black Lotus Labs has identified a new malware platform targeting enterprise-grade and small office/home office (SOHO) routers, capable of covertly harvesting public cloud authentication data from internet traffic. Dubbed Cuttlefish, the platform steals authentication material from web requests passing through the router from the adjacent local area network (LAN). Researchers warn that attackers can hijack DNS and HTTP connections to private IP spaces, typically associated with internal network communications. Cuttlefish exhibits code overlaps with HiatusRat, a malware used by a Chinese hacking group known for targeting US military networks and European organizations. While there are similarities in code, victimology appears to be separate. The malware operates passively, sniffing packets and acting only upon predefined rulesets. It is designed to acquire authentication material, focusing on public cloud-based services. Cuttlefish exfiltrates data by creating a proxy or VPN tunnel through compromised routers and using stolen credentials to access targeted resources. Active since at least July 2023, the latest campaign has been running from October 2023 through April 2024. Cuttlefish infections have been found at telecommunications providers in Turkey, with a few non-Turkish victims, including global satellite phone providers and potentially a US-based datacenter. Cuttlefish represents an advancement in networking equipment-based malware, combining route manipulation, connection hijacking, and passive sniffing capabilities. It specifically targets credential markers associated with cloud-based services such as Alicloud, AWS, Digital Ocean, CloudFlare, and BitBucket. Black Lotus Labs advises corporate network defenders to monitor weak credentials and suspicious login attempts, even from residential IP addresses, and to inspect SOHO devices for abnormal files or rogue iptables entries. Implementing certificate pinning for remote connections to high-value assets is also recommended to prevent connection hijacking.
The Sidewinder APT group (APT-C-24), also known as Rattlesnake, has shifted tactics in a recent campaign targeting South Asian countries, replacing legacy Office exploit delivery w...
More recent threat campaigns have illustrated the utilization of BAT-based loaders to distribute sophisticated Remote Access Trojans (RATs) including XWorm and Remcos. The attacks ...
Buterat backdoor is a malware family designed to gain long-term, unauthorized access to compromised systems. First seen in targeted attacks on business and government networks, it ...