Categories: Cyber Security News

xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors

The xHunt advanced persistent threat group has firmly established itself as a sophisticated cyber-espionage actor, orchestrating targeted campaigns against organizations in Kuwait.

Since its emergence in 2018, the group has focused intently on the government, shipping, and transportation sectors.

Their operations are characterized by the use of a custom and evolving toolkit, with many tools bearing names derived from the Hunter x Hunter anime series.

Sponsored

This unique naming convention accompanies a persistent drive to infiltrate critical infrastructure and harvest sensitive intelligence through bespoke malware variants like Hisoka and Netero.

Attack vectors employed by xHunt are diverse, often beginning with strategic watering hole attacks or the direct compromise of web-facing Microsoft Exchange and IIS servers.

One particularly novel technique involves injecting hidden HTML tags into compromised government websites, redirecting visitors to actor-controlled servers to harvest NTLM hashes.

This passive credential theft allows the attackers to gain unauthorized access without immediate detection, utilizing the collected data to compromise further systems within the network.

The impact of these intrusions is profound, as the group deploys a suite of custom backdoors to maintain long-term access.

Picus Security analysts identified the malware after observing these distinctive behaviors, noting the group’s capability to blend into legitimate network traffic.

Tools such as the BumbleBee webshell and PowerShell-based backdoors like TriFive and Snugy allow the attackers to execute arbitrary commands.

By leveraging Exchange Web Services for command and control, the attackers communicate via email drafts within the Deleted Items folder, further complicating detection efforts.

Sponsored

Persistence and Defense Evasion Mechanisms

A critical aspect of xHunt’s methodology is their reliance on scheduled tasks to ensure the persistence of their PowerShell backdoors. Once a system is compromised, the attackers establish tasks that execute malicious scripts at precise intervals, often every few minutes.

These tasks are meticulously crafted to evade detection by mimicking legitimate Windows processes and placing files in trusted directories.

For instance, the group uses specific commands to schedule their payloads:-

schtasks /create /sc MINUTE /mo 5 /tn "MicrosoftWindowsSideShowSystemDataProvider" /tr "powershell -exec bypass -file C:WindowsTempxpsrchvw.ps1" /ru SYSTEM

This command establishes a task disguised as a SystemDataProvider, running with high privileges to execute the Snugy backdoor.

Additionally, xHunt actors employ masquerading techniques, such as placing tasks in the Windows Diagnostic Infrastructure directory and naming them ResolutionHosts to resemble legitimate system files.

These evasion tactics, combined with their use of SSH tunnels for lateral movement, make xHunt a resilient and elusive threat that requires comprehensive behavioral monitoring to detect effectively.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Windows 11 23H2 to 25H2 Upgrade Allegedly Breaking Internet Connectivity

A persistent bug in Windows 11 in-place upgrades is reportedly wiping critical 802.1X wired authentication…

1 hour ago

Coruna Exploit Kit With 23 Exploits Hacked Thousands of iPhones

Google’s Threat Intelligence Group (GTIG) has uncovered Coruna, a sophisticated iOS exploit kit containing 23…

1 hour ago

Roy Cooper, Michael Whatley secure US Senate nominations, setting up fierce November election

Former state and national GOP Chair Michael Whatley (left) and former Gov. Roy Cooper are…

1 hour ago

Tillis, more Republicans unload on Noem over Minneapolis operation, FEMA delays

U.S. Sen. Thom Tillis, Republican of North Carolina, speaks as Homeland Security Secretary Kristi Noem…

1 hour ago

Diana Fenton withdraws as nominee for child advocate after questions arise over independence, conflicts of interest

Diana Fenton has withdrawn her name from consideration to be New Hampshire’s next child advocate…

2 hours ago

Byron family shares son’s journey with Severe Hemophilia A

A family in Byron is sharing the story of their 1-year-old son, J.J. Larson and…

2 hours ago

This website uses cookies.