
From Shadow to Spotlight: The Evolution of LummaStealer and Its Hidden Secrets
In this Threat Analysis report, Cybereason investigates the evolution of LummaStealer and its hidden secrets
Cybereason Intel Team
Two weeks after the NotPetya attack disrupted organizations across the world, especially those in the Ukraine, researchers agree that the malware propagating by corrupted software updates of an accounting program from the Ukrainian company M.E.Doc. In this blog, the Cybereason Intelligence Group asks how NotPetya was installed on machines, how the malicious code ended up on M.E. Doc’s servers and why the attackers didn’t carry out a more advanced attack. Understanding the how NotPetya was installed on victim’s machines and M.E. Doc’s servers can help all researchers better understand and detect these types of threats while knowing if two actors were involved in the attack can help refine the overall investigation.
No one knows how NotPetya ended up on the victim’s machines. Researchers agree that the malware propagated by the M.E. Doc software update process (EzVit.exe) Microsoft, for example, showed how EZVIT.exe calls two different process that install NotPetya, but does not explain how those files got into the ProgramData or AppData folders on the target host. Also, the NotPetya payload was not flagged in any of the EZVIT updates. But we don’t know if two separate infections happened simultaneously or if the backdoor was just one part of a multistage attack.
Here are three options that could explain how NotPetya infected computers.
One option is that it was placed in the software during the development process. Another possibility is that a genuine update was uploaded to the server but the attackers accessed the server and replaced the legitimate update with a malicious one. To pull this off the attackers would have targeted a M.E. Doc server with weak security, allowing anyone to connect to it.
There’s the chance that attackers accessed M.E. Doc’s network either by launching an attack against the company or infiltrating a third party that M.E. Doc works with, giving adversaries access to the server and allowing them to upload the malicious code.
This feeds into theory that two threat actors were involved. The hypothesis is that one threat actor was indeed in M.E. Doc’s network carrying out an APT. But another threat actor found its way onto M.E. Doc’s network and launched a wiper that knocked out the APT.
The Cybereason Intel Team is a talented group of researchers with years of experience in the cybersecurity space.
In this Threat Analysis report, Cybereason investigates the evolution of LummaStealer and its hidden secrets
In this blog, you learn about a highly sophisticated, well-funded, and strategically motivated nation-state cybersecurity threat called cuckoo spear.
In this Threat Analysis report, Cybereason investigates the evolution of LummaStealer and its hidden secrets
In this blog, you learn about a highly sophisticated, well-funded, and strategically motivated nation-state cybersecurity threat called cuckoo spear.
Get the latest research, expert insights, and security industry news.
Subscribe