Site icon TheCyberThrone

Russian Snake Malware Hunt Alert

Advertisements

A security joint advisory revealed  about a sophisticated espionage tool dubbed as Snake malware used by Russian cyber actors against their targets.

The malware is spread across 50 countries across North America, South America, Europe, Africa, Asia, and Australia, Snake’s custom communications protocols employ encryption and fragmentation for confidentiality and are designed to hamper detection and collection efforts. Globally, the Russian Federal Security service has used Snake to collect sensitive intelligence from high-priority targets such as government networks, research facilities, and journalists.

The advisory was published by the US FBI, the US NSA, the US CISA, US CNMF, the UK NCSC, the Canadian CCS, the Canadian CSE, the Australian ACSC, and the New Zealand NCSC.

Advertisements

This tool is the most sophisticated cyber espionage tool in the FSB’s arsenal, stemming from three principal areas.

The FSB has also implemented new techniques to  evade detection, with the effectiveness of the cyber espionage implant depending on its long-term stealth to provide consistent access to important intelligence. It is deployed to external-facing infrastructure nodes on a network, and from there uses other TTPs to conduct additional exploitation operations.

Once after gaining access to a target network, the FSB typically enumerates the network and works to obtain administrator credentials and access domain controllers. A wide array of mechanisms has been employed to gather user and administrator credentials to expand laterally across the network, to include keyloggers, network sniffers, and open-source tools.

The threat actor relies on credentials and lightweight remote-access tools internally within a network. Sometimes they deploy a small remote reverse shell along with Snake to enable interactive operations.

Advertisements

Methods for detecting Snake malware

Network-based detection:

Host-based detection:

Memory analysis:

Advertisements

Preventing Snake’s persistence and hiding techniques

Exit mobile version