📜 ⬆️ ⬇️

Autumn aggravation: how RTM hackers staged a massive attack on banks and businesses on behalf of state institutions

image


This fall, Group-IB recorded a massive malicious mailing to financial institutions and enterprises. The attackers sent more than 11,000 letters from the fake mailing addresses of Russian state institutions - all of them contained an RTM Trojan designed to steal money from remote banking services (RB) and payment systems. On average, one successful theft of this type brings about 1.1 million rubles to attackers.

Text: Semen Rogachev, Group-IB Malicious Code Analyst

Since September 11, the Group-IB Threat Intelligence system (cyber intelligence) recorded mass mailings to Russian banks, industrial and transport companies: 3210 letters were sent in September, 2311 - in October, 4768 - in November, and 784 - in December. Mailings went “waves”, the peak fell on September 24 and 27 - 729 and 620 letters, respectively. In total, from September to early December, hackers sent 11,073 letters from 2,900 different e-mail addresses forged by government agencies. Found about 900 different domains associated with the addresses of senders.
')
In the mailing list, among the addresses of senders, are the following domain names associated with state and municipal organizations:


Some letters include the headers of "Domain Key Identifier Mail" ("DKIM"). “DKIM” is an email message authentication method that protects senders from tampering with email and confirms the fact of sending a letter from a stated domain. For example:

image

The result of the test "DKIM":

image

How the circuit worked


Letters from the newsletter are disguised as important documents (for example, “Submission on Thursday”, “Service Note”, “Payment August-September”, “Copies of documents”, etc.) are indicated as the subject of the letter. The text of the letter corresponds to the topic, for example:

image

Or:

image

A characteristic feature is the discrepancy between the sender's address and the return address of the letter. The return address of the letter is registered on public domains.

For example:

image

Or

image

Each letter is attached attachment, which is an archive containing the executable file. Unpacked files have “PDF” icons - files, which further misleads the user. After running the unpacked file, the computer is infected.

image

RTM Trojan appeared in late 2015 - early 2016. It is aimed at working with RBS and payment systems. RTM is modular, its modules substitute details, read keyboard presses, replace DNS servers and security certificates, take screenshots, etc.

Infection process



Description and functionality



image


image

image

image


Further actions depend on the commands received from the "C & C" server.

Received commands are encrypted with a modified RC4 algorithm. In each message received from the “C & C” server, the first 4 bytes are the XOR key. Before decrypting the received data, every 4 bytes of the “S-box” are added with this key modulo two. The "RC4" key itself is stored in the program.

Bytes 4 through 8 are the CRC32 code for the rest of the message. After decryption. The program checks the correctness of the message by comparing the received "CRC-32" code from the message with the actual "CRC-32" code of the message.

image

The 9th byte of the received message determines the command to be executed.


image


image



image


image


image


image


image


image

image


image


image


image

image


image

image


image


image

image

image


image

Table 1 - List of "URLs" indicating interaction with banks


image

Table 2 - List of files indicating interaction with banks


image

Table 3 - List of class names


image

Theft scheme


RTM with the help of screenshots and keylogger learns the username and password of the user, downloads and launches tools for remote computer control, after which either a payment order is created and sent to the RBS system via remote control on the infected computer, or the authentication data and secret key used in the RBS system is stolen , and sending the order occurs from the attacker's computer. According to Group-IB, in the event of successful theft, on average, hackers “earn” on such attacks about 1,100,000 rubles from one legal entity.

In general, in the fall - from September to November - the RTM criminal group launched several large-scale attacks on large Russian banks and enterprises. The malicious activity was detected and blocked using the Threat Detection System Polygon (TDS) cyber attack early warning system, which allows you to “unpack” suspicious emails in a safe environment isolated from the bank’s main network, check them for malicious attachments and make a verdict on the degree of danger of the detected object .

Source: https://habr.com/ru/post/432256/


All Articles