StealthFalcon malware spread through the Windows update mechanism

By using the Windows update delivery system, the malicious traffic of this trojan can evade firewalls

Trojan

Windows Background Intelligent Transfer Service (BITS) is being exploited again, with a malware strain is using it to spread between computers.

Windows BITS is the default mechanism the operating system (OS) uses to send Windows updates to systems all over the world, and attackers are now using it to hide traffic to and from their command and control (C&C) server, sent by the backdoor.

Slovakian cyber security outfit ESET discovered the trojan and named it Win32/StealthFalcon, eponymic of the group to which it's attributed.

The StealthFalcon group has been around since 2012, according to the limited reports there are on the organisation, and is believed to be a state-sponsored group which originally targeted United Arab Emirates (UAE) dissidents.

Instead of sending HTTP or HTTPS traffic back to the C&C server, the trojan masks this traffic by routing it through BITS, a method the researchers believe will more easily evade firewalls.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

This is because BITS isn't just used for Windows updates, other programs use it to distribute their own updates and even Mozilla is working on pushing Firefox's improvements through BITS.

Because BITS is known by firewalls to carry traffic from legitimate sources, such as necessary updates, it often doesn't search it when scanning for cyber threats, making it a perfect fit to carry malicious code.

The researchers said the method of the trojan's delivery was "beyond the scope of this investigation" but targets have been observed in UAE Saudi Arabia, Thailand and the Netherlands.

Links have been made between StealthFalcon and Project Raven, two groups previously thought to be independent of one another, after pieces from reports such as their file naming structure were found to be too similar to be different parties.

Amnesty International's Senior Technologist, Claudio Guarnieri, has concluded that Stealth Falcon and Project Raven actually are the same group.

Advertisement - Article continues below

Details of Project Raven were unearthed in a January Reuters investigation which allegedly found evidence that former NSA experts were helping UAE authorities track and hack dissidents, journalists and human rights activists.

Although leveraging BITS to hide malicious traffic is an unusual method, it has certainly been done before. Chinese state-sponsored hacking groups Periscope and Tropic Trooper are both believed to have launched similar attacks.

Featured Resources

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management

Download now

6 ways your business could suffer if you don’t backup Office 365

Office 365 makes it easy to lose valuable data regularly, unpredictably, unintentionally, and for good

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now

8 digital best practices for IT professionals

Don't leave anything to chance when going digital

Download now
Advertisement

Recommended

Visit/security/30081/what-is-a-trojan-virus
Security

What is a Trojan?

14 Aug 2019
Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

23 Dec 2019
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/operating-systems/27717/how-to-fix-a-stuck-windows-10-update
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

10 Feb 2020
Visit/security/cyber-security/354827/mcafee-researchers-trick-tesla-autopilot-with-a-strip-of-tape
cyber security

McAfee researchers trick Tesla autopilot with a strip of tape

21 Feb 2020