Original Article Text

Click to Toggle View

StripedFly malware framework infects 1 million Windows, Linux hosts. A sophisticated cross-platform malware platform named StripedFly flew under the radar of cybersecurity researchers for five years, infecting over a million Windows and Linux systems during that time. Kaspersky discovered the true nature of the malicious framework last year, finding evidence of its activity starting in 2017, with the malware wrongly classified as just a Monero cryptocurrency miner. The analysts describe StripedFly as nothing short of impressive, featuring sophisticated TOR-based traffic concealing mechanisms, automated updating from trusted platforms, worm-like spreading capabilities, and a custom EternalBlue SMBv1 exploit created before the public disclosure of the flaw. While it's unclear if this malware framework was utilized for revenue generation or cyber espionage, Kaspersky says its sophistication indicates that this is an APT (advanced persistent threat) malware. Based on the compiler timestamp for the malware, the earliest known version of StripedFly featuring an EternalBlue exploit dates April 2016, while the public leak by the Shadow Brokers group occurred in August 2016. StripedFly in over a million systems The StripedFly malware framework was first discovered after Kaspersky found the platform's shellcode injected in the WININIT.EXE process, a legitimate Windows OS process that handles the initialization of various subsystems. After investigating the injected code, they determined it downloads and executes additional files, such as PowerShell scripts, from legitimate hosting services like Bitbucket, GitHub, and GitLab, including PowerShell scripts. Further investigation showed that infected devices were likely first breached using a custom EternalBlue SMBv1 exploit that targeted internet-exposed computers. The final StripedFly payload (system.img) features a custom lightweight TOR network client to protect its network communications from interception, the ability to disable the SMBv1 protocol, and spread to other Windows and Linux devices on the network using SSH and EternalBlue. The malware's command and control (C2) server is on the TOR network, and communication with it involves frequent beacon messages containing the victim's unique ID. For persistence on Windows systems, StripedFly adjusts its behavior based on the level of privileges it runs on and the presence of PowerShell. Without PowerShell, it generates a hidden file in the %APPDATA% directory. In cases where PowerShell is available, it executes scripts for creating scheduled tasks or modifying Windows Registry keys. On Linux, the malware assumes the name 'sd-pam'. It achieves persistence using systemd services, an autostarting .desktop file, or by modifying various profile and startup files, such as  /etc/rc*, profile, bashrc, or inittab files. The Bitbucket repository delivering the final stage payload on Windows systems indicates that between April 2023 and September 2023, there have been nearly 60,000 system infections. It is estimated that StripedFly has infected at least 220,000 Windows systems since February 2022, but stats from before that date are unavailable, and the repository was created in 2018. However, Kaspersky estimates that over 1 million devices were infected by the StripedFly framework. Malware modules The malware operates as a monolithic binary executable with pluggable modules, giving it an operational versatility often associated with APT operations. Here's a summary of StripedFly's modules from Kaspersky's report: The presence of the Monero crypto miner is considered a diversion attempt, with the primary objectives of the threat actors being data theft and system exploitation facilitated by the other modules. "The malware payload encompasses multiple modules, enabling the actor to perform as an APT, as a crypto miner, and even as a ransomware group," reads Kaspersky's report. "Notably, the Monero cryptocurrency mined by this module reached its peak value at $542.33 on January 9, 2018, compared to its 2017 value of around $10. As of 2023, it has maintained a value of approximately $150." "Kaspersky experts emphasize that the mining module is the primary factor enabling the malware to evade detection for an extended period." The researchers also identified links to the ransomware variant ThunderCrypt, which utilizes the same C2 server at "ghtyqipha6mcwxiz[.]onion:1111."  The 'repeatable tasks module' also suggests that the unidentified attackers could be interested in revenue generation for some victims.

Daily Brief Summary

MALWARE // Sophisticated StripedFly Cross-Platform Malware Infects Over 1 Million Systems

The StripedFly malware framework infected over a million Windows and Linux systems over five years before its discovery and appropriate classification by cybersecurity firm Kaspersky.

This advanced persistent threat (APT) malware was inaccurately classified as a Monero cryptocurrency miner due to its diversion tactics.

It featured advanced TOR-based traffic concealment, automatic updates, and worm-like propagation, with evidence of its activity dating back to 2017.

Infected systems were likely initially breached via a custom EternalBlue SMBv1 exploit targeting internet-connected devices, using trusted platforms like Bitbucket, GitHub, and GitLab to execute additional files.

The multi-module malware has numerous functionalities including crypto mining, data theft, system exploitation, and ransomware capabilities, indicative of an APT operation.

StripedFly adapts its persistence strategies based on the privilege level it operates on and the availability of PowerShell in Windows systems. On Linux, it masquerades as 'sd-pam' and secures persistence via systemd services or by modifying various profile and startup files.

Cybersecurity experts estimate that between February 2022 and September 2023, over 280,000 systems were infected, pointing to the severity and scale of the uncompromised systems.