New malware abuses Facebook, Google and other cloud platforms

Malware Magnifying Glass
(Image credit: Andriano.cz / Shutterstock)

A cyberespionage campaign using a new malware that relies on Facebook, Google Drive and Dropbox for command and control communication has been discovered by the cybersecurity firm Cybereason.

The Molerats hacker group is behind the new campaign which uses two new backdoors, called SharpStage and DropBook, as well as a previously undocumented malware downloader named MoleNet to abuse popular cloud computing services.

The malware is designed to avoid detection by using Dropbox and Facebook services to steal data and receive instructions from its operators. Once data is stolen from targeted users, both backdoors then use Dropbox to extract it.

The campaign targets political figures or government officials in the Middle East with an email luring them to download malicious documents. However, the document only shows a summary of its content and recipients are then instructed to download password-protected archives stored in Dropbox or Google Drive to see all of the information. This is how Molerats is able to infect users with its SharpStage and DropBook backdoors that can then download additional malware.

Abusing cloud platforms

According to a new report from Cybereason's Nocturnus Team, the Phyton-based DropBook backdoor only receives instructions on Facebook and from the iOS note-taking app Simplenote. The hackers are then able to control the backdoor using commands published in a post on Facebook with Simplenote serving as a backup.

DropBook is able to check a system's installed programs and file names, execute shell commands from Facebook or Simplenote and fetch additional payloads from Dropbox. Molerats' other backdoor SharpStage depends on a traditional command and control server as opposed to using cloud services for instructions.

While Cybereason discovered three SharpStage variants, they all share similar functionalities including the ability to take screenshots, execute arbitrary commands and decompress data received from the command and control server. Both backdoors are used to target Arabic-speaking users and their code can check compromised machines to see if the Arabic language is installed.

The cybersecurity firm also found that Molerats is using another malware called MoleNet which can run WMI commands to profile an operating system, check for debuggers, restart a machine from the command line, upload details about the OS, fetch new payloads and create persistence on a targeted system.

By using popular cloud platforms to communicate with its malware, the Molerats group has made its espionage attempts much harder to detect. Interested users can check out Cybereason's full Molerats in the Cloud report for more information on the group's recent campaigns, infrastructure and previous malware.

  • We've also highlighted the best VPN services

Via BleepingComputer

TOPICS
Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in Security
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
China
Notorious Chinese hackers FamousSparrow allegedly target US financial firms
A digital representation of a lock
NYU website defaced as hacker leaks info on a million students
NHS
NHS IT supplier hit with major fine following ransomware attack
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does