• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

 | 

Cisco fixed critical ISE flaws allowing Root-level remote code execution

 | 

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber Crime
  • Hacking
  • Malware
  • Italian companies and Ministry of the Interior under attack, experts spotted a huge botnet

Italian companies and Ministry of the Interior under attack, experts spotted a huge botnet

Pierluigi Paganini January 20, 2018

Threat actors with a deep knowledge of the Fiscal Italian ecosystem are using a huge botnet to target Italian companies and Ministry of the Interior.

On Januaty 18 a colleague of mine (Luca) called me telling a malicious email was targeting Italian companies. This is the beginning of our new analysis adventure that Luca and I run together.

The email pretended to be sent by “Ministero dell’ Economia e delle Finanze” the Italian Department of Treasury  and it had smart subjects such as:

    • Codici Tributo Acconti
    • F24 Acconti-Codice Tributo 4034

The attacker knows very well the Italian Fiscal Year since those modules are very popular from company administration employees at that time. The attacker would probably exploit this attack path reaching out as many companies as possible. The email address was not coming from the “Ministero dell’ economia e delle Finanze” at all, it was coming from the following addresses:

    • info@amber-kate.com
    • info@fallriverproductions.com

The email looks like :

 Huge Botnet Attacking Italian Companies
Malicious eMail

A simple link pointing to a high reputation domain was popping out the default browser and downloading the following Javascript file. The high level of obfuscation and the way the content was provided was so suspicious to be worth to follow the analysis.

 
Infection: Stage 1 Obfuscated

After a deobfuscation phase the javascript looked much more easy te be read from a human side.

 
Infection: Stage 1 Clear Text

A romantic “drop and execute” section was happening. A GET connection to 239outdoors.com/themes5.php was dropping a file named 1t.exe and later on the same script was able to execute the dropped file.  The file 1t.exe was running on the victim machine contacting the Command and Control waiting for further commands.

The new sample looks like GootKit, a weaponized version of Banker Malware.  The malware installs itself and contacts Command and Control asking “what to do” and sending the “stolen credentials” directly to the Command and Control server. Details on IPs, Persistencies and so on, is provided in the IoC section, but today’s we won’t describe GootKit, we got access to the Dropping site!

We want to figure out if we might help victims to deactivate the malicious botnet by providing as much as possible details without focusing on the reverse the Malware per se since appears to be known.

By getting further analyzing the dropping website we immediately understood that the same URL was dropping another threat. The parallel threat the dropping website was spreading to the world was called “Nuovo Documento 2008” and it was a .bat file as follows.

 
New Threat Stage 1

That executable .bat file on a first stage opens up a browser pointing to a legitimate image but later on, it uses a notorious technique called “certutil for delivery of file” to drop and execute another file. This technique is well described here  by carnal0wnage. Basically, the attacker uses the certutil.exe program do download a Base64 encoded payload, to decode it and to run it. This technique is very silent since the User-Agent of certutils.exe is not suspicious because it needs to connect outside the company networks to check certificates, so not much IPS rules on it. The dropped file name unslss.exe appears to be very close to the previously analyzed one (1t.exe) it contacts the same C&C and it behaves in a similar way.   But again we won’t focus on reverse such a malware but rather we wont be able to reach the highest number of IoC to protect as much as possible the victims. By analyzing the Dropping website we founded that a significative number of connections had additional referrers, so we decided to focus our attention on how many DNS were pointing to such a domain. We did it and the result was quite impressive (please see the Dropping URLs IoC Section).

Following the research on the dropping website, we found an interesting log of all the connection coming from possible victims. We collected that log, and we built the following possible infection list (possible Victims). We won’t publish the Victims IP addresses but if you can prove you are legitimated by your company to ask that logs we can give you (for free, of course)  the IP addresses we’ve found related to your company. A detailed list of possible infected networks follows.

Possible Victims:

  • ACI informatica s.p.a.
  • AGOS-AS
  • AGSM Verona Spa
  • ASGARR Consortium GARR
  • Acantho S.p.a
  • Alfanews S.r.l.
  • Ambrogio s.r.l.
  • Asco TLC S.p.A.
  • Autostrade-as
  • BT Italia
  • BT Italia S.p.A.
  • Banca Monte Dei Paschi Di Siena S.P.A.
  • Brennercom S.p.A.
  • COLT Technology Services Group Limited
  • Camera dei deputati
  • Cesena Net srl
  • Clouditalia Telecomunicazioni S.p.A.
  • Comune Di Brescia
  • Comune di Bologna
  • Consortium GARR
  • Consorzio per il Sistema Informativo
  • Costacrociere-as
  • Duebite-as
  • E4A s.r.l.
  • Energente S.r.l.
  • FASTNET SpA
  • FASTWEB SPA
  • FINECO Banca del Gruppo Unicredit
  • Fastweb
  • Forcepoint Cloud Ltd
  • GenyCommunications
  • Global Com Basilicata s.r.l.
  • H3G Italy
  • Hynet S.R.L.
  • IBSNAZ
  • ICT Valle Umbra s.r.l.
  • InAsset S.r.l.
  • InfoCamere SCpA
  • Infracom Italia S.p.A.
  • Inrete s.r.l
  • Insiel- Informatica per il sistema degli enti loca
  • Integrys.it di Stefania Peragna impresa individual
  • Intred S.p.A.
  • KPNQWest Italia S.p.a.
  • LEPIDA
  • Lepida S.p.A.
  • Liguria Digitale S.C.p.A.
  • Linea Com S R L
  • Linkem spa
  • Lombardia Informatica S.p.A.
  • Mandarin S.p.A.
  • Mc-link SpA
  • Metrolink S.R.L.
  • Ministero dell’Interno
  • Mnet srl
  • NGI SpA
  • Nemo S.r.l.
  • Nordcom S.p.a.
  • Officine Informatiche Srl
  • Progetto Evo S.r.l.
  • Provincia di Reggio nell’Emilia
  • Qcom spa
  • Raiffeisen OnLine GmbH
  • Regione Basilicata
  • Regione Toscana
  • Regione Veneto
  • STI ADSL
  • Sardegnait-as
  • Societa’ Gestione Servizi Bp S.p.A.
  • TELEX S.r.l.
  • TWT S.p.A.
  • Telecom Italia
  • Terra S.p.a.
  • Time-net S.r.l.
  • Tiscali SpA
  • Trenitalia SpA
  • Trentino Network S.r.l.
  • Universita’ degli Studi di Milano
  • Venis S.p.A.
  • Videotime SPA
  • Vodafone Group Services GmbH
  • Vodafone Italia DSL
  • Vodafone Omnitel B.V.
  • Vodafone Omnitel N.v.
  • WIIT S.p.A.
  • Welcome Italia S.p.A
  • Wind Telecomunicazioni
  • Wind Telecomunicazioni SpA

Following the found IoC provided by the long “analysis journey”. I managed this analysis over the night, so I am sure there would be some imprecisions, but I preferred to speed up the entire analysis process to give the opportunity to block such infamous threat as soon as possible.

Hope it helps the community.

IoC:

  • eMail:
  • info@amber-kate.com
  • info@fallriverproductions.com
  • Dropping URLS:
  • 185.61.152.71
  • 239outdoors.com
  • bentlabel.com
  • cdvdautomator.com
  • cloudblueprintprogram.com
  • cnchalftone.com
  • comedyyall.com
  • conticellolaw.com
  • couplesdoingbusiness.com
  • dvoper.com
  • equinnex.com
  • ericandchrissy.com
  • evelynleekley.com
  • expungementstennessee.com
  • flaveme.com
  • grkisland.com
  • healingfoodconsulting.com
  • hertzsynergy.com
  • hollywoodisruption.com
  • home-sphere.com
  • integrativenutritiontherapy.com
  • jdkanyuk.com
  • kineloveclips.com
  • kylesinger.com
  • legionchristmas.com
  • menshoesonlinestore.com
  • microtiasurgery.com
  • movielotbar.com
  • muiienweg.com
  • niarhoslondon.com
  • opsantorinitours.com
  • progunjobs.com
  • rocketpak.com
  • scottishwindowsolutions.com
  • silkygames.com
  • snapshotsandwhatnots.com
  • snotterkind.com
  • solespin.com
  • strangerthanchristmas.com
  • synchronr.com
  • taramadden.com
  • terento.website
  • theargumint.com
  • thegildedwren.com
  • thejourneytogodsheart.com
  • thesaltybody.com
  • topsantorinitours.com
  • tuftandneedles.com
  • videospanishlessons.com
  • vovachka.com
  • wall-runners.com
  • war-arena.com
  • www.scottishwindowsolutions.com
  • z1logistics.com
  • zayantetinyhomes.com
  • zefeed.com
  • Command and Controls
  • 185.44.105.97
  • ns15.dreamsinthesun.com
  • bdi2.nomadicdecorator.com
  • elis.k9redemptionrescue.com
  • api.hailstorm360.com
  • cerera.survivalbid.com
  • mark.k9redemptionrescue.org
  • nsc.dayswithsunrays.com
  • at.moonbeammagic.com
  • ssl.vci-cfo.com
  • sip3.propertiesandprojects.com
  • host1.jodiray.com
  • note.lawrencechoy.com
  • note.lawrencechoy.com:80
  • 185.44.105.97:80/200
  • note.lawrencechoy.com:80
  • Hashes
  • 63d6927881d4978da4e162c17d82e9c009d0a93e
  • 7ea33f51b6c4aa54beee7fd878886339c22d2232
  • 8cae0dc9255978a35cfd8db64cbe80001400de9b
  • 839ff9f4c3980ac67d4cbef296520ee364a0911f
  • 8cae0dc9255978a35cfd8db64cbe80001400de9b

The original post published by Marco Ramilli on his blog at the following URL:

Huge Botnet Attacking Italian Companies

About the author: Marco Ramilli, Founder of Yoroi

I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna. During my PhD program I worked for US Government (@ National Institute of Standards and Technology, Security Division) where I did intensive researches in Malware evasion techniques and penetration testing of electronic voting systems.

 

I do have experience on security testing since I have been performing penetration testing on several US electronic voting systems. I’ve also been encharged of testing uVote voting system from the Italian Minister of homeland security. I met Palantir Technologies where I was introduced to the Intelligence Ecosystem. I decided to amplify my cyber security experiences by diving into SCADA security issues with some of the most biggest industrial aglomerates in Italy. I finally decided to found Yoroi: an innovative Managed Cyber Security Service Provider developing some of the most amazing cyber security defence center I’ve ever experienced ! Now I technically lead Yoroi defending our customers strongly believing in: Defence Belongs To Humans

[adrotate banner=”9″] [adrotate banner=”12″]

Edited by Pierluigi Paganini

(Security Affairs – botnet, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]


facebook linkedin twitter

botnet Hacking malware

you might also like

Pierluigi Paganini June 26, 2025
Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages
Read more
Pierluigi Paganini June 26, 2025
Cisco fixed critical ISE flaws allowing Root-level remote code execution
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

    Cyber Crime / June 26, 2025

    Cisco fixed critical ISE flaws allowing Root-level remote code execution

    Security / June 26, 2025

    U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

    Security / June 26, 2025

    CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

    Hacking / June 26, 2025

    Hackers deploy fake SonicWall VPN App to steal corporate credentials

    Hacking / June 25, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT