December 14, 2015 By Douglas Bonderud 2 min read

According to researchers from security firm FireEye, a new strain of malware called LATENTBOT has been discovered on machines across the U.S., U.K., South Korea, Brazil and Poland this year. The backdoor virus gives attackers access to virtually anything they want on a network and is nearly impossible to detect. In fact, the bot’s obfuscation is so good that it’s been lurking around corporate machines for the better part of two years. Here’s a quick rundown.

Right Under Your Nose

As reported by SecurityWeek, LATENTBOT is focused on remaining undetected and has largely succeeded; some of its earliest infections data back to 2013. This is the Holy Grail for malware-makers: the ability to craft code that even up-to-date, real-time antivirus solutions can’t detect, much less eliminate. The new backdoor is designed to leave “barely any traces on the Internet, is capable of watching its victims without ever being noticed and can even corrupt a hard disk, thus making a PC useless.”

It achieves this goal through a six-stage obfuscation process and by operating purely in memory on an infected system. It also has the ability to scan for cryptocurrency wallets using the Pony Stealer 2.0 malware plugin. The malware regularly implements new layers of obfuscation to keep antivirus solutions and IT professionals unaware of its presence.

While the malware isn’t targeted, it will avoid certain versions of Windows such as Vista or Server 2008. Once systems are infected, the code only stays in memory long enough to cause havoc, which may include:

  • Hiding desktop applications;
  • MBR wiping;
  • Ransom-locking the desktop;
  • Stealing information via Pony malware.

Despite the sophistication of LATENTBOT malware, however, attackers still rely on infected emails to carry their payload. Their weapon of choice is an infected Word document that uses the well-known Microsoft Word Intruder (MWI) to contact a MWISTAT server and give cybercriminals total access.

Common Problems With a Backdoor Virus?

According to The Straits Times, hidden malware is also making its way onto mobile devices: The Association of Banks in Singapore (ABS) is warning Android users to watch out for what appears to be a WhatsApp update but in fact carries a malware payload that attempts to grab user credit card data. It does so by intercepting the one-time password (OTP) sent by banks via SMS so users can access their accounts online. Much like LATENTBOT, this malware hides in plain sight — luckily, however, its history isn’t quite as long.

The New Threatscape

Brute force is passé. Obvious, high-volume attacks simply don’t have the same results they once did, so malware-makers have turned a corner. Simple yet sophisticated, lightweight apps are the new threatscape: They get in without being noticed, grab what they want and disappear.

It’s a wake-up call for companies. What’s happening on corporate networks is much more relevant than what’s installed behavior, far more than bad code, is the hallmark of this new backdoor virus and other emerging risks.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today