Categories: Malware

New dangerous threat Magic Malware hit thousands of UK firms

The Internet is full of news regarding malware more or less sophisticated that are used for various purposes, cybercrime, cyber espionage, hacktivism or cyber warfare but not all these agents demonstrated their efficiency over the time.

This time thousands of UK companies have been targeted by a smart malware, dubbed “Magic Malware”,  that has gone undetected for at least eleven months according revelation of security firm Seculert.

 

 

 

Despite there is no certainty of the real purpose of the malware security experts believe that it is designed for cyber espionage operations, what seems very likely is that malicious agent is still a work in progress probably only at the first stage of a large scale operation.

The consideration arises from the observation that the malicious code detected containing various “indications of features which are not yet implemented”, and functions which are not yet used by the malware.

“The real intention of the attackers behind this magic malware is yet to be known. As the malware is capable of setting up a backdoor, stealing information, and injecting HTML into the browser, we believe that the current phase of the attack is to monitor the activities of their targeted entities,” wrote Aviv Raff in the post on official company website.

Aviv Raff has approached the analysis of the malware as a show of prestige organized in three phases:

  • “The Pledge” – malware detection
  • “The Turn” – the particular malware behavior
  • “The Prestige – the real intention of the attackers.

“This ‘Magic Malware’ is active, persistent and had remained undetected on the targeted machines for the past 11 months. Since then the attackers were able to target several thousands of different entities, most of them located in the United Kingdom,” 

What is singular is that the malicious code adopted a sly technique to communicate with control structures after infected the victims through a specialized server communication protocol.  “The Turn” phase represents the extraordinary behavior of the malware, after a first connection to the C&C malware and control server start communicating with a custom-made protocol, and always using a magic code at the beginning of the conversation.

In the following pictures the typical handshake between the interlocutors:

“Magic” malware receives an initial response to use “some_magic_code1” as a magic code

Then “magic” malware receives an instruction from the C2 server to add a new user

 

The malware once infected the victim takes complete remote control of it waiting for orders from the command and control server (C&C) exactly as for any other botnet architecture.

The malware is capable of downloading and executing additional malicious files, probably the modularity of the agent could adapt the malicious code for further use such as sabotage.

Another element that suggests the cyber espionage intent behind the malware is the nature of the targets, there are in fact financial companies, education and also communications providers.

Security experts are convicted that in the future the malware will continue its evolution, in the meantime lets install all defense systems and keep them updated.

Pierluigi Paganini

(Security Affairs – Malware)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

30 minutes ago

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

1 hour ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

23 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

This website uses cookies.