Site icon TheCyberThrone

PlugX Malware is being employed in USB by Black Basta Ransomware

Advertisements

Researchers has shared their findings about an operation responding to a Black Basta ransomware compromise has revealed the use of a new wormable PlugX malware variant that can automatically infect any attached removable USB media devices.

This PlugX malware also hides attacker files in a USB device with a novel technique, which makes the malicious files only viewable on a *nix OS or by mounting the USB device in a forensic tool. Due to this ability to evade detection, the PlugX malware can continue to spread and potentially jump to air-gapped networks.

It is a modular malware framework, supporting an evolving set of capabilities throughout the years according to the researchers, PlugX is a second-stage implant, is used by multiple groups with a Chinese nexus as well as several cybercrime groups.

Advertisements

PlugX is around for over a decade and has been observed in some high-profile cyber-attacks, including the U.S. Government Office of Personnel Management (OPM) breach in 2015

The connection between the malware tool and Black Basta derives from the fact that the Brute Ratel post-exploitation tool used in these attacks is the same badger payload previously reported by Trend Micro and associated with the ransomware group.

The researchers also discovered a similar variant of PlugX with the added capability of copying all Adobe PDF and Microsoft Word documents from the infected host to the USB device’s hidden folder created by the PlugX malware.

The discovery of these samples indicates PlugX development is still alive and well among at least some technically skilled attackers, and it remains an active threat.

This research was documented by researchers from Palo Alto Unit 42

Indicators of Compromise

Known PlugX Samples:

Advertisements

Known File Directories

Known Windows Mutex Names

Known PlugX Encrypted Payload File Names

Known Windows Scheduled Task Names

Known Windows Process Names

Exit mobile version