17 January 2023

New backdoor based on leaked CIA’s Hive spyware spotted in the wild


New backdoor based on leaked CIA’s Hive spyware spotted in the wild

Qihoo Netlab 360's researchers have spotted a new backdoor based on US CIA’s Project Hive malware control system leaked by WikiLeaks in 2017 as part of its Vault 8 CIA leak series.

The researchers came across the new malware in October 2022, when one of their honeypots caught a suspicious ELF file spread via an unidentified vulnerability in F5 products. The malicious code was contacting the IP address 45.9.150.144 using SSL with forged Kaspersky certificates.

“After further lookup, we confirmed that this sample was adapted from the leaked Hive project server source code from CIA. This is the first time we caught a variant of the CIA HIVE attack kit in the wild, and we named it xdr33 based on its embedded Bot-side certificate CN=xdr33,” Netlab said in a report.

The xdr33 backdoor is designed to collect valuable data and provide a foothold for subsequent intrusions. It uses XTEA or AES algorithm to encrypt the original traffic, and protects traffic using SSL with Client-Certificate Authentication mode enabled.

“In terms of function, there are two main tasks: beacon and trigger, of which beacon is periodically report sensitive information about the device to the hard-coded Beacon C2 and execute the commands issued by it, while the trigger is to monitor the NIC traffic to identify specific messages that conceal the Trigger C2, and when such messages are received, it establishes communication with the Trigger C2 and waits for the execution of the commands issued by it,” the researchers explained.

“These modifications to xdr33 are not very sophisticated in terms of implementation, and coupled with the fact that the vulnerability used in this spread is N-day, we tend to rule out the possibility that the CIA continued to improve on the leaked source code and consider it to be the result of a cyber attack group borrowing the leaked source code.”

Back to the list

Latest Posts

Connect:fun campaign targets Fortinet bug to deploy malware and RMTs

Connect:fun campaign targets Fortinet bug to deploy malware and RMTs

The actors behind this campaign are not mass scanning but choosing target environments that have VPN appliances.
15 April 2024
Dutch chipmaker Nexperia hit with a cyberattack

Dutch chipmaker Nexperia hit with a cyberattack

The attackers reportedly stole hundreds of gigabytes of data from Nexperia's servers.
15 April 2024
Former Amazon engineer sentenced for hacking and crypto theft

Former Amazon engineer sentenced for hacking and crypto theft

Ahmed used sophisticated schemes to manipulate pricing data and exploit flaws in smart contracts.
15 April 2024