Platinum APT’s new Titanium backdoor mimics popular PC software to stay hidden

Platinum APT’s new Titanium backdoor mimics popular PC software to stay hidden 1

The Platinum advanced persistent threat (APT) cyberattack group has developed a new backdoor with interesting concealment techniques. 

Platinum has been tracked since 2012 and generally targets government, military, and political targets across the APAC region. 

In recent years, the hacking group has become linked to the use of novel attack techniques, such as the abuse of a now-deprecated Windows feature called hotpatching and fileless code deployment, as well as steganography to hide Powershell and exploit code in plain text. 

See also: Facebook enjoys rare court win over privacy breach, investor claims

A past backdoor connected to Platinum uses text steganography to hide command-and-control (C2) communication. Now, the APT appears to have added a new backdoor, dubbed Titanium, to its arsenal. 

Named after a password to one of its archives, Titanium “hides at every step by mimicking common software” including protection-related, sound driver software, and video creation tools, according to Kaspersky researchers. 

In attack chains tracked by the team, Platinum will deploy Titanium as the last stage of infection. 

CNET: Lasers can seemingly hack Alexa, Google Home and Siri

Each example found involved the use of an exploit for executing code as a system-level user and shellcode to download an additional downloader. Platinum targets winlogon.exe but Kaspersky does not know how the injection occurs. 

The deployment of an SFX archive containing a Windows task installation script is then underway. This password-protected, encrypted archive is downloaded via BITS Downloader, and its main task is to install a Windows task to maintain persistence. 

The attack chain will then involve the launch of a further archive containing an installer, a COM object DLL, and the Titanium backdoor itself. Titanium’s paths all masquerade as a common software installer, such as for DVD creation software or as an audio driver, and the backdoor will then seek a connection to its C2 once executed. 

To establish a connection with its C2, Titanium will send a base64-encoded request containing a system ID, computer name, and the hard disk’s serial number. 

TechRepublic: You’ve got malware: Malicious actors are waiting in your inbox

When pinging the C2 for commands, the malware will be answered with PNG files containing steganographically hidden data, containing directions for the malicious code. Commands may include reading system files, deleting content, dropping and executing files, running command line queries and sending the results to the C2, and update configuration requests. 

Kaspersky is unaware of any active campaigns, at present.

“The Titanium APT has a very complicated infiltration scheme. It involves numerous steps and requires good coordination between all of them. In addition, none of the files in the file system can be detected as malicious due to the use of encryption and fileless technologies,” the researchers say. “One other feature that makes detection harder is the mimicking of well-known software.”

About the author

E-Crypto News was developed to assist all cryptocurrency investors in developing profitable cryptocurrency portfolios through the provision of timely and much-needed information. Investments in cryptocurrency require a level of detail, sensitivity, and accuracy that isn’t required in any other market and as such, we’ve developed our databases to help fill in information gaps.

Related Posts

E-Crypto News Executive Interviews

Crypto Scams

Cryptosoft
Cryptosoft Trading Bot Review
June 27, 2022
The Largest Crypto Scams Of 2022 (So Far)
The Largest Crypto Scams Of 2022 (So Far)
June 14, 2022
Scammers
How Do Scammers Entice Their Prey?
May 10, 2022
Beanstalk Farms Loses $80M In A Massive DeFi Governance Flash-Loan Hack
Beanstalk Farms Loses $80M In A Massive DeFi Governance Flash-Loan Hack
April 23, 2022
Prove
Joon Pak Head of Crypto at Prove talks to Us about Crypto Fraud And More
April 11, 2022

Automated trading with HaasBot Crypto Trading Bots

Blockchain/Cryptocurrency Questions and Answers

Is The Crypto Market Combating A Lehman Brothers Moment?
Is The Crypto Market Combating A Lehman Brothers Moment?
June 30, 2022
Russia
Roundtable Interview-What is the Effect of The Russia-Ukraine War on Cryptocurrency Prices?
March 4, 2022
GamStop
How Does Bitcoin Casino Work + 2021 Beginner’s Guide
November 8, 2021
Cryptocurrency
How to Buy and Sell Cryptocurrency
November 8, 2021
What Are Bitcoin Futures And How Will They Work In 2022?
November 4, 2021


CryptoCurrencyUSDChange 1hChange 24hChange 7d
Bitcoin20,416 0.60 % 1.86 % 3.25 %
Ethereum1,096.3 0.00 % 0.67 % 4.21 %
Tether1.000 0.17 % 0.15 % 0.04 %
USD Coin1.002 0.12 % 0.10 % 0.06 %
BNB225.67 1.63 % 3.63 % 1.49 %
Binance USD1.002 0.58 % 0.03 % 0.21 %
XRP0.3318 0.16 % 1.76 % 1.12 %
Cardano0.4681 0.09 % 1.66 % 2.55 %
Solana34.97 0.59 % 7.14 % 8.47 %
Dogecoin0.06772 0.67 % 0.41 % 5.57 %

bitcoin
Bitcoin (BTC) $ 20,314.00
ethereum
Ethereum (ETH) $ 1,087.91
tether
Tether (USDT) $ 1.00
usd-coin
USD Coin (USDC) $ 1.00
bnb
BNB (BNB) $ 224.89
binance-usd
Binance USD (BUSD) $ 1.00
xrp
XRP (XRP) $ 0.331648
cardano
Cardano (ADA) $ 0.466079
solana
Solana (SOL) $ 34.65
dogecoin
Dogecoin (DOGE) $ 0.067521