December 3, 2023

Researchers have spotted a  new cloud service provider credential harvester tool set shared in wild through Telegram.

The toolset called as Alien Fox is described as a cloud spammer  Swiss Army knife that has an ability to attack multiple services in numerous ways. The toolset is used to harvest application programming interface keys and secrets from services, including Amazon Simple Email Service and Microsoft Office 365.

AlienFox  involves the distribution of source code archives. Though primarily distributed on Telegram, some of the modules are also available on GitHub. Most of the tools offered as part of AlienFox are open source, meaning that they can also be modified to suit the specific needs of attackers.

Modus of Operandi

  • Using AlienFox starts with attackers using the toolset to collect lists of misconfigured hosts from security scanning platforms such as LeakIX and SecurityTrails.
  • Once after obtaining the information, multiple scripts in the toolset are then used to extract sensitive information, such as API keys and secrets from configuration files exposed on victims’ web servers.

Later versions of AlienFox are said to establish AWS account persistence and privilege escalation. The toolkit can also collect send quotas and automate spam campaigns through victim accounts or services.

The spread of AlienFox represents an unreported trend toward attacking more minimal cloud services, unsuitable for crypto mining, to enable and expand subsequent campaigns.

The emergence of toolkits like AlienFox underscores the increasing sophistication of attacker networks and their collective ability to cause harm and disruption. The trend is concerning where the attackers behind AlienFox are adapting the tool to be effective across more targets, particularly those in use widely across enterprises.

To defend against AlienFox tools, organizations should use configuration management best practices and adhere to the principle of least privilege. Consider using a Cloud Workload Protection Platform (CWPP) on virtual machines and containers to detect interactive activity with the OS.

The AlienFox toolset demonstrates another stage in the evolution of cybercrime in the cloud. Cloud services have well-documented, powerful APIs, enabling developers of all skill levels to readily write tooling for the service. The toolset has gradually improved through improved coding practices as well as the addition of new modules and capabilities.

This research was documented by researchers from SentinelOne

Indicators of Compromise

  • c0184407dcbec911a325d41e9a9ef1dbed524fe5
  • 41a2cab42a08adf93b5ada1eafb75d5b4f496853
  • 3cb5b4182ef6e8174f87c8ed3551f91b72c47370
  • 17592a2fdb8dae9c4c88f1fbf7e9c632129f98df
  • ab8d480c090ab8be0cdb0ff5bc0f59972845b125
  • 15ade0df5b4e6a82ceec429a2673fd1ed011eb93
  • aa8be80db30c4f5a49c3e75254ef6d0101c37987
  • 064734bc43ee2d83e8a275293d17fc925620bba1
  • 9381c30e29089639249e67b62f61c6df4869c6c1
  • fd5228889cd12f343236f7d51c98fab4db6c4763
  • fd3375553dda2347c0b383d8e800bfe4f93d3af0
  • f4ef68d3d2b58a58a82e00ebeaaed556e03328af
  • 23abd146befe761337e5155a116138acf81331d9
  • f5af939480fc86a086bc589047444b1c448ebb09
  • ac265c12a4f08378e2519e290b0c45a1adc7156f
  • 0f1583b56dd02fc200c7dae0d3c9b32b4278846b
  • 74c4cfa0edae5e87001c901214789cb0f0087031
  • ec5b2efe8eadfac7ceca545e25f06240bbf16960
  • 9eb13d9a678cd2e78da41563b7461887ce5997b6
  • 25bbda606c72e81fac9abe76e0f00f9cd12770e4
  • e786fc1fdfcb7be28650383eb33cdf6c90f1d033
  • 8e6e18ba7e251d31b46d17535010a8c583345b23
  • b3559eeac9a9caa840cc96980fe0bbd1c7da37d3
  • 40df29a738fd5cab0face169d8a8426dff7d2d10
  • e663e24fc6aadbaae5bbf722a84097a6127f4066
  • c2f51b44e26e4aca40beb887ac4d36f3e091e26a
  • 4266bdb139ae6d22ddf98501cc3af280aa488b42
  • 329328dc57acece8c47ab5c73f7b9c7e4e09981a
  • fc08c15dfd6074d80e1f8d777fb49f8c14b4af20
  • aa4672621f81f601882ad13f26d37dc8218bb06a
  • 07289c56e65a98a85bc794374949aae98b819823
  • 4ab401d4c490460fd457151f643b5ec7e594cd41
  • 7848e53133f4470c29e33ee6dd87f8f326c5fa38
  • 7d7bad6282531521b9103817a38bff3a34b89428
  • 15129436f5bab6c3eea9b2dfc4d0f0043438e013
  • 15aec55e56225700766d79b6fb9d212cced21951
  • ebdc60f33d22c4256ca6ab4058059db1d618ec11
  • 894fd799168f9ff11e74ee37d5bec35387feef24
  • 28de7d7fcd18471f53737fd8a3df3a23a34cf758
  • 3ddb8dc53b6151ea036db3d2a5f34e5f5b39e044
  • ceda47dd1aacc515d8bdda04299ab1ebf1ba0d73
  • 23abd146befe761337e5155a116138acf81331d9
  • ac265c12a4f08378e2519e290b0c45a1adc7156f
  • b8dc12cc600aced9d34c463c5bf5edb53db605fb
  • 45a0675088afdcf2ec059510fc2a4905957c2a69
  • c3464926cf2075595c77dc5b3fbcf1f014c8046b
  • fc0479a3d1188384613f437f28e28614a6118e94
  • 5c9993e5d7468551c60e6dab488eccea7f4ef007
  • ece7e6727d2daa254e4d4a6be62744d6f3a2a2ef
  • afb7b010bafb9f7faf2b528f128ff24da94e0190
  • 959e377131762ccb879c36c53e3b71473d3b72fd
  • 48afb7ac8fdf6a8da47601806a8028c61dad2eb7

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: