LevelBlue Completes Acquisition of Cybereason. Learn more

LevelBlue Completes Acquisition of Cybereason. Learn more

Services
Cyber Advisory
Managed Cloud Security
Data Security
Manage Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings

Matryoshka Malware from CopyKittens Group

A dangerous weapon in the hands of a skilled attacker is alarming but that same weapon in the hands of a novice can be terrifying. Lately, we have started to see activity from a group in the Middle East who, rather than write their own code, seem to be taking bits and pieces from existing malware to develop their own attack toolset. As a result, this group has been referred to as ‘CopyKittens’. Researchers at Minerva and ClearSky have dubbed this malware “Matryoshka” due to its multi-stage framework.

Their most commonly used initial attack vector is a simple, yet alarmingly effective, spearphishing attack, infecting unsuspecting victims via a malicious email attachment (usually an executable that has been disguised as something else). From there, Matryoshka runs second stage malware via a dropper and covertly installs a Remote Access Toolkit (RAT). This is done using a reflective loader technique that allows the malware to run in process memory, rather than being written to disk. This not only hides the install of the RAT but also ensures that the RAT will be ‘reinstalled’ after system restart.

The real threat that the Matryoshka malware (as well as the CopyKittens group) demonstrates is how easy it is for anyone to build (or assemble) his or her own deadly electronic weapons. While threat actors in the past had to possess real skill in crafting their attack methods, today’s ‘copy cat’ criminals only need the desire to do evil [GG1] (as well as a network connection) to wreak havoc.

Impact on you

  • A RAT on your network means that an attacker could have complete control of your machine, able to steal locally stored data, hijack browser sessions (and therefore credentials), etc.
  • With the traditionally specialized skill of malware authoring available to any one who searches hard enough, the number of these types of attacks will only increase in the future.
  • Malware such as Matryoshka that is able to hide itself in your environment and then download/deploy additional software leaves the door open (literally) for future attacks.

How AlienVault Helps

LevelBlue Labs continues to perform cutting edge research on threats like these, collecting large amounts of data and then analyzing it to extrapolate expert threat intelligence. The Labs team has already released IDS signatures and correlation rule updates to the AlienVault Unified Security Management (USM) platform so customers can identify activity related to this exploit:

  • System Compromise, Trojan infection, Matryoshka
  • System Compromise, C&C Communication, CopyKittens Activity

For further investigation into the CopyKitten APT group or the Matryoshka malware, visit the Open Threat Exchange (OTX) to see what research members of the community have done:

https://otx.alienvault.com/pulse/565391eb67db8c7a156c4ab4/

ABOUT LEVELBLUE

LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo