SECURITY
SECURITY
SECURITY
Researchers at S.C. Bitdefender SRL today warned of new custom malware actively targeting remote desktop protocol clients to steal data.
First noticed in its use as part of a state-sponsored East Asian espionage operation called RedClouds, the server-side implant, dubbed “RDStealer,” monitors RDP connections with client drive mapping enabled, infecting connecting RDP clients with a Logutil backdoor and exfiltrating sensitive data.
The RDStealer malware is notable because it employs an advanced dynamic link library sideloading technique. The stealth method is said to involve chaining together multiple DLLs that seamlessly integrate into the system, initiated via the Windows Management Instrumentation subsystem. The malware and its accomplice, Logutil, are coded in the Go programming language, enabling them to operate across various systems.
The Bitdefender Labs researchers claim that this is the first known instance of such an attack method, demonstrating an escalation in the sophistication of cybercriminal activities. The finding shows how threat actors are using new methods to exploit older, widely used technologies, underscoring the need for robust, multilayered security measures.
Although the report runs through the procedures of how RDStealer operates, the security recommendations to counter the risk of being compromised are relevant in terms of the broader security landscape.
The researchers argue that defense-in-depth architecture remains the most effective protection against modern cyberthreats. The defense-in-depth security approach employs multiple overlapping measures designed to guard against various threats.
Key to the strategy is mastering prevention capabilities, which include minimizing exposed attack surfaces, identifying and correcting vulnerabilities, and constantly updating access policies. Automated protection controls should be applied to all potential threat entry points, including next-generation antivirus and integrated reputation measures for intellectual property and web addresses and domains.
However, detection capabilities become vital if a threat actor bypasses those controls. The researchers emphasize the need for endpoint detection and response, extended detection and response or managed detection and response services that can minimize the timeframe during which a threat remains undetected.
It’s also noted that maintaining response capabilities across all these layers is crucial for reducing security risks. Maintenance can include applying patches, investigating potential security incidents or controlling damage after a breach. Undertaking such practices increases the odds of preventing cybersecurity incidents from becoming full-blown breaches.
Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.
Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.