Microsoft experts said last week that the Russian hacker group APT29 (aka Cozy Bear, Dukes,…
The telecommunications systems targeted by LightBasin include External DNS servers (eDNS), Service Delivery Platform (SDP) systems, and SIM / IMEI. They are all part of the General Packet Radio Service (GPRS) network, which enables roaming between mobile operators.
The report states that it is common for the LightBasin grouping to brute force the target system to try to use the default credentials. After a successful hack, the attackers install and run a special malware on the target’s machine called SLAPSTICK, a backdoor for the Solaris Pluggable Authentication Module (PAM), which provides access to the system based on a hard-coded password.
With backdoor access to the target Solaris system, hackers are able to steal passwords to move to other machines, as well as securely gain a foothold in the system. Thus, in the course of the mentioned incident, hackers eventually gained access to several eDNS servers of the hacked company through a malware called PingPong by CrowdStrike analysts. It receives commands via ICMP requests to set the TCP reverse shell to the IP address and port specified in the packet.
PingPong’s generated reverse shells communicated over TCP port 53 (the default for DNS) with servers from other telecommunications companies in other parts of the world. As was said, to go unnoticed, LightBasin added iptables rules to the eDNS server that allowed SSH connections to five other compromised companies. In addition, the attackers used a trojanized version of iptables, which removed the output of the first two octets from IP addresses belonging to other compromised companies, making it even more difficult to find the changed rules.
CrowdStrikes analysts also point out that LightBasin uses a new technique for tunnelling traffic on telecommunications networks, which includes a special emulator and TinyShell (a common open source Unix backdoor).
In general, CrowdStrike lists the following set of utilities and malware that LightBasin uses in its operations:
Let me remind you that we also wrote that Three Chinese APT Groups Attack Major Telecommunications Companies.
News-bpudepi.today is a domain that tries to trick you into subscribing to its browser notifications…
Doguhtam.xyz is a site that tries to trick you into subscribing to its browser notifications…
News-xlixoti.com is a site that tries to force you into subscribing to its browser notifications…
Ducesousightion.com is a domain that tries to trick you into clik to its browser notifications…
News-xlabica.live is a domain that tries to trick you into clik to its browser notifications…
Mergechain.co.in is a site that tries to trick you into subscribing to its browser notifications…