Article Details

Original Article Text

Click to Toggle View

‘Sandman’ hackers backdoor telcos with new LuaDream malware. A previously unknown threat actor dubbed 'Sandman' targets telecommunication service providers in the Middle East, Western Europe, and South Asia, using a modular info-stealing malware named 'LuaDream.' This malicious activity was discovered by SentinelLabs in collaboration with QGroup GmbH in August 2023, who named the threat actor and malware after the backdoor's internal name of 'DreamLand client.' The operational style of Sandman is to keep a low profile to evade detection while performing lateral movement and maintaining long-term access to breached systems to maximize its cyberespionage operations. A popular target The Sandman threat actor targets telecommunication service providers in the Middle East, Western Europe, and South Asia subcontinents. SentinelOne says the threat actor first gains access to a corporate network using stolen administrative credentials. Once the network is breached, Sandman has been seen using "pass-the-hash" attacks to authenticate to remote servers and services by extracting and reusing NTLM hashes stored in memory. The SentinelLabs report explains that, in one instance, all workstations targeted by the hackers were assigned to managerial personnel, indicating the attacker's interest in privileged or confidential information. LuaDream malware SandMan has been seen deploying a new modular malware named 'LuaDream' in attacks using DLL hijacking on targeted systems. The malware gets its name from using the LuaJIT just-in-time compiler for the Lua scripting language The malware is used to collect data and manage plugins that extend its functionality, which are received from the command and control server (C2) and executed locally on the compromised system. The malware's development appears to be active, with a retrieved version string indicating the release number "12.0.2.5.23.29," and the analysts have seen signs of logs and testing functions going as far back as June 2022. LuaDream's staging relies on a sophisticated seven-step in-memory process aiming to evade detection, initiated by either the Windows Fax or Spooler service, which runs the malicious DLL file. SentinelLabs reports that the timestamps in the DLL files used for order hijacking are very close to the attacks, which might indicate they were custom-created for specific intrusions. Anti-analysis measures in the staging process include: LuaDream comprises 34 components, with 13 core and 21 support components, which utilize the LuaJIT bytecode and the Windows API through the ffi library. Core components handle the malware's primary functions, like system and user data collection, plugin control, and C2 communications, while support components deal with the technical aspects, like providing Lua libs and Windows API definitions. Upon initialization, LuaDream connects to a C2 server (via TCP, HTTPS, WebSocket, or QUIC) and sends gathered information, including malware versions, IP/MAC addresses, OS details, etc. Due to the attackers deploying specific plugins through LuaDream in each attack, SentinelLabs doesn't have an exhaustive list of all plugins available. However, the report notes one module named 'cmd,' whose name suggests it gives the attackers command execution capabilities on the compromised device. While some of Sandman's custom malware and part of its C2 server infrastructure have been exposed, the threat actor's origin remains unanswered. Sandman joins a growing list of advanced attackers targeting telecom companies for espionage, using unique stealthy backdoors that are challenging to detect and stop. Telecommunication providers are a frequent target for espionage activities due to the sensitive nature of the data they manage. Earlier this week, we reported on a new cluster of activity tracked as 'ShroudedSnooper' that used two novel backdoors, HTTPSnoop and PipeSnoop, against telecommunication carriers in the Middle East.

Daily Brief Summary

CYBERCRIME // ‘Sandman’ Threat Actor Targets Telecom Providers with New LuaDream Malware

The 'Sandman' threat actor is targeting telecommunications providers in Middle East, Western Europe, and South Asia using a new info-stealing malware called 'LuaDream'. The actor was identified by SentinelLabs in collaboration with QGroup GmbH.

'Sandman' typically gains access to networks using stolen admin credentials, then uses “pass-the-hash” attacks to move laterally within the network and maintain access for long-term cyberespionage operations.

The LuaDream malware, named after the LuaJIT compiler it uses, is a modular malware deployed via DLL hijacking on targeted systems. It collects data, manages plugins to extend functionality, and is being actively developed, as indicated by version strings observed.

The malware uses a sophisticated seven-step in-memory staging process to evade detection. Anti-analysis measures include custom-creating DLL files close to the time of attacks, suggesting these are tailored for specific intrusions.

ATT&CK evidence points to the presence of 34 components, including 13 core and 21 support components, which utilize the LuaJIT bytecode and Windows API via the ffi library.

LuaDream connects to a command and control (C2) server upon initialization and sends information about malware versions, IP/MAC addresses, and OS details. SentinelLabs have identified specific plugins deployed in each attack but believe there may be others.

While parts of 'Sandman's' custom malware and its C2 server infrastructure have been exposed, the actor's origin is still unknown. Sandman is one of several advanced attackers targeting telecom companies for espionage with unique, stealthy backdoors.