July 26, 2018 By Douglas Bonderud 2 min read

New threat group RANCOR has been using previously undiscovered malware families to conduct espionage in Southeast Asia.

A previously unidentified threat group, RANCOR, is conducting malware-based espionage attacks in Singapore and Cambodia, according to a June 2018 report from Palo Alto Networks Unit 42. After observing the group throughout both 2017 and 2018, researchers identified two new malware strains: DDKONG and PLAINTEE.

Given the highly targeted distribution of this malware and the political nature of its decoy files, Palo Alto Networks concluded that RANCOR’s primary objective is likely espionage.

New Spear Phishing Campaign Could Have Far-Reaching Impact

RANCOR’s primary attack vector is spear phishing messages containing malicious attachments, such as Microsoft Excel files with embedded macros and HTML applications. The group also hosted decoy files on legitimate sites like Facebook and a Cambodian government website, according to a June 2018 IBM X-Force advisory. These decoy files contain details from public news articles focused primarily on political news and events.

RANCOR has only recently emerged, and at least one of its malware variants (PLAINTEE) has never been spotted in the wild before.

PLAINTEE leverages a custom User Datagram Protocol (UDP) to collect general system information and then creates a continuously operating beacon until a response is received from the command-and-control (C&C) server. With RANCOR already using KHRAT and DDKONG to infect targets, the group’s development and rapid implementation of brand new strains like PLAINTEE suggest an ability for rapid evolution — meaning RANCOR could quickly expand operations beyond Southeast Asia.

How Can Organizations Keep Abreast of New Malware Strains?

To stay ahead of emerging threat groups like RANCOR, IBM Security experts stress that cybersecurity professionals must both address in-house concerns and seek outside assistance. Security intelligence solutions powered by machine learning can help analysts detect potential decoys carrying DDKONG or PLAINTEE and prioritize their response accordingly.

Given the uniqueness of new malware strains such as these — and the increasing sophistication of the threat landscape at large — security experts also advise organizations to leverage the collective knowledge of the cybersecurity community and share threat intelligence to keep abreast of the latest developments.

Source: Palo Alto Networks

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today