US Defense Contractors Struck by SockDetour Windows backdoor

This article has been indexed from

CySecurity News – Latest Information Security and Hacking Incidents

 

SockDetour, a new custom malware discovered on US defence contractor computers, has been utilised as a backup backdoor to sustain access to hijacked networks. 
The malicious payload was discovered by Unit 42 security researchers, who believe its administrators kept it hidden for a long time because it has been utilised in the open since at least July 2019. The fact that SockDetour “operates filelessly and socketlessly” on compromised Windows servers by hijacking network connections explains its stealthiness, making it much difficult to identify at the host and network levels. 
The connection hijacking is carried out with the help of the official Microsoft Detours library package, which is used for monitoring and instrumenting Windows API calls.
Unit 42 explained, “With such implementation, SockDetour [..] serves as a backup backdoor in case the primary backdoor is detected and removed by defenders.” 
The threat actors utilised a very precise delivery server in one of the attacks, QNAP network-attached storage (NAS) device commonly used by small businesses that had earlier been infected with QLocker ransomware — they most likely utilised the same security vulnerability (the CVE-2021-28799 remote code execution bug) to acquire access to the server. 
On July 27, 2021, the researchers discovered the malware on the Windows server of a

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: