APT

Sophisticated TajMahal APT Framework remained under the radar for 5 years

Cybersecurity experts at Kaspersky Lab uncovered a highly sophisticated spyware framework dubbed TajMahal that was involved in cyberespionage campaign for at least last 5 years.

Cybersecurity researchers at Kaspersky discovered a highly sophisticated spyware framework, dubbed TajMahal, that has been used in cyber operations for at least last 5 years. The TajMahal framework remained undetected until the fall of 2018 when the researchers detected an attack on a diplomatic organization belonging to a Central Asian country.

The TajMahal APT framework is a high-tech modular-based malware toolkit that supports a vast number of malicious plugins, but what makes it outstanding is a series of evasion techniques never seen before.

“More than a mere set of back doors, TajMahal is a high-quality, high-tech spyware framework with a vast number of plugins (our experts have found 80 malicious modules so far), allowing for all kinds of attack scenarios using various tools.” reads the analysis published by TajMahal. “According to our experts, TajMahal has been in operation for the past five years, and the fact that only one victim has been confirmed to date suggests only that others have yet to be identified.”

The TajMahal framework is composed of two main packages, named “Tokyo” and “Yokohama,” the experts observed over 80 distinct malicious modules, that set a record of the numbers of plugins ever seen for an APT attack framework.

Tokyo is the main back door and delivers the second-stage payload, experts noticed that it gains the persistence in the system even after the second stage starts. The Yokohama component is the second-stage attack payload, it creates a virtual file system complete with plugins, third-party libraries, and configuration files. The modular architecture makes it a privileged attack tool for several cyber espionage campaigns.

It implements several features, including stealing cookies, intercepting documents from the print queue, collecting data about the victim (including a list of backup copies of their iOS device), recording and taking screenshots of VoIP calls, stealing optical disc images made by the victim, indexing files, including those on external drives, and potentially stealing specific files when the drive is detected again.

The mystery behind this story is that Kaspersky Lab found only one TajMahal victim and this is very strange for a so sophisticated framework. Experts believe that the number of victims is greater and that many of the infections have yet to be discovered.

“The technical complexity of TajMahal makes it a very worrying discovery, and the number of victims identified thus far is likely to increase.” concludes Kaspersky.”So far we have detected a single victim based on our telemetry,” concludes Kaspersky.

“The TajMahal framework is an intriguing discovery that’s of great interest, not least for its high level of technical sophistication, which is beyond any doubt. The huge amount of plugins that implement a number of features is something we have never before seen in any other APT activity.”

“The question is, why go to all that trouble for just one victim?”

“This theory is reinforced by the fact that we couldn’t see how one of the files in the VFS was used by the malware, opening the door to the possibility of additional versions of the malware that have yet to be detected.”

Additional technical details, including Indicators of Compromise, are available in the blog post published on the SecureList blog

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – TajMahal framework, cyberespionage)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide

Chinese "kill switches" found in Chinese-made power inverters in US solar farm equipment that could…

3 hours ago

US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials

FBI warns ex-officials are targeted with deepfake texts and AI voice messages impersonating senior U.S.…

19 hours ago

Shields up US retailers. Scattered Spider threat actors can target them

Google warns that the cybercrime group Scattered Spider behind UK retailer attacks is now targeting…

22 hours ago

U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium, DrayTek routers, and SAP NetWeaver…

1 day ago

Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi

On day two of Pwn2Own Berlin 2025, participants earned $435,000 for demonstrating zero-day in SharePoint,…

2 days ago

New botnet HTTPBot targets gaming and tech industries with surgical attacks

New botnet HTTPBot is targeting China's gaming, tech, and education sectors, cybersecurity researchers warn. NSFOCUS …

2 days ago