Original Article Text

Click to Toggle View

Fake KeePass password manager leads to ESXi ransomware attack. Threat actors have been distributing trojanized versions of the KeePass password manager for at least eight months to install Cobalt Strike beacons, steal credentials, and ultimately, deploy ransomware on the breached network. WithSecure's Threat Intelligence team discovered the campaign after they were brought in to investigate a ransomware attack. The researchers found that the attack started with a malicious KeePass installer promoted through Bing advertisements that promoted fake software sites. As KeePass is open source, the threat actors altered the source code to build a trojanized version, dubbed KeeLoader, that contains all the normal password management functionality. However, it includes modifications that install a Cobalt Strike beacon and export the KeePass password database as cleartext, which is then stolen through the beacon. WithSecure says that the Cobalt Strike watermarks used in this campaign are linked to an initial access broker (IAB) that is believed to be associated with Black Basta ransomware attacks in the past. A Cobalt Strike watermark is a unique identifier embedded into a beacon that is tied to the license used to generate the payload. "This watermark is commonly noted in the context of beacons and domains related to Black Basta ransomware. It is likely used by threat actors operating as Initial Access Brokers working closely with Black Basta," explains WithSecure. "We are not aware of any other incidents (ransomware or otherwise) using this Cobalt Strike beacon watermark – this does not mean it has not occurred." The researchers have found multiple variants of KeeLoader have been discovered, signed with legitimate certificates, and spread through typo-squatting domains like keeppaswrd[.]com, keegass[.]com, and KeePass[.]me. BleepingComputer has confirmed that the keeppaswrd[.]com website is still active and continues to distribute the trojanized KeePass installer [VirusTotal]. In addition to dropping Cobalt Strike beacons, the trojanized KeePass program included password-stealing functionality that allowed the threat actors to steal any credentials that were inputted into the program. "KeeLoader was not just modified to the extent it could act as a malware loader. Its functionality was extended to facilitate the exfiltration of KeePass database data," reads the WithSecure report. "When KeePass database data was opened; account, login name, password, website, and comments information is also exported in CSV format under %localappdata% as .kp. This random integer value is between 100-999." Ultimately, the attack investigated by WithSecure led to the company's VMware ESXi servers being encrypted with ransomware. Further investigation into the campaign found an extensive infrastructure created to distribute malicious programs disguised as legitimate tools and phishing pages designed to steal credentials. The aenys[.]com domain was used to host additional subdomains that impersonated well-known companies and services, such as WinSCP, PumpFun, Phantom Wallet, Sallie Mae, Woodforest Bank, and DEX Screener. Each of these was used to distribute different malware variants or steal credentials.  WithSecure attributes this activity with moderate confidence to UNC4696, a threat actor group previously linked to Nitrogen Loader campaigns. Previous Nitrogen campaigns were linked to the BlackCat/ALPHV ransomware. Users are always advised to download software, especially highly sensitive ones like password managers, from legitimate sites and avoid any sites linked in advertisements. Even if an advertisement displays the correct URL for a software service, it should still be avoided, as threat actors have repeatedly proven that they can circumvent ad policies to display the legitimate URL while linking to imposter sites. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // Trojanized KeePass Installs Lead to Ransomware via ESXi Servers

Threat actors distributed trojanized KeePass versions for eight months to deploy Cobalt Strike beacons and ransomware.

Malicious KeePass installer was promoted through Bing ads, leading to fake software download sites.

The modified KeePass, named KeeLoader, included functionality that stole credentials and exported password databases in cleartext.

KeePass alterations linked to Black Basta ransomware and believed to be operated by Initial Access Brokers.

Researchers unearthed various signed variants fooling users through typo-squatting domains.

The compromised companies' VMware ESXi servers were encrypted in the ransomware attacks.

WithSecure linked the activity to UNC4696, a group associated with past Nitrogen Loader and BlackCat/ALPHV ransomware campaigns.

The investigation revealed an extensive infrastructural setup for disseminating various malware and credential phishing schemes under impersonated domains.