Malware

BlackWater, a malware that uses Cloudflare Workers for C2 Communication

Crooks continue to abuse the interest in Coronavirus outbreak, now experts found a new backdoor called BlackWater that pretends to provide information about COVID-19.

Experts found a new backdoor malware called BlackWater that pretends to provide information about the COVID-19 outbreak while abusing Cloudflare Workers as an interface to the C2 server.

Cloudflare Workers provide a serverless execution environment that allows users to create entirely new applications or augment existing ones without configuring or maintaining infrastructure.

Cloudflare Workers allow users to run JavaScript in Cloudflare’s data centers. Using a Worker, users can modify your site’s HTTP requests and responses, make parallel requests, or generate responses from the edge.

Researchers from MalwareHunterTeam discovered a suspicious RAR file named “COVID-19-” that was being distributed online, likely through phishing emails.

The RAR archive contains a file named “Important – COVID-19” that displays a Word icon. Once opened, the malicious code will extract a Word document to the %UserProfile%\downloads folder called “Important – COVID-19.docx.docx” and opens it using the Microsoft Word.

The Word doc is a weaponized document containing information on the COVID-19 virus outbreak, it acts as a dropper for the final payload and executes it.

Upon execution, the BlackWater malware connects to a Cloudflare Worker that acts as a command and control server.

“This is where things get a bit interesting as the malware is then launched using a command line that causes the BlackWater malware to connect to a Cloudflare Worker that acts as a command and control server or at least a passthrough to one.” reported BleepingComputer.

Below the command used by the malware to contact the C2.

sqltuner[.]exe lively-dream-c871.m7.workers.dev

The popular malware researcher Vitali Kremez told BleepingComputer that the worker contacted by the malware is a front end to a ReactJS Stapi App that is used as a command and control server.

The malware connects the worker, which in turn responds with a JSON encoded string that may contain commands.

According to the experts, the malware is under active development.

The use of a Cloudflare Worker represents a novelty in the threat landscape, it is a design choice that could allow the BlackWater to avoid the detection. Another advantage of using Cloud Workers as command and control is that the malware attack could be easily scaled.

“I think this is why they employ as it returns back the legit Cloudflare proxy IP which acts as a reverse proxy passing the traffic to the C2. It makes blocking the IP traffic impossible given it is Cloudflare (unless the whole Cloudflare worker space is banned) infrastructure while hiding the actual C2.” Kremez told BleepingComputer.

For more technical details read the post published by BleepingComputer:

https://www.bleepingcomputer.com/news/security/blackwater-malware-abuses-cloudflare-workers-for-c2-communication/

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, passphrases)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

App Store Security: Apple stops $2B in fraud in 2024 alone, $9B over 5 years

Apple blocked over $9B in fraud in 5 years, including $2B in 2024, stopping scams…

16 minutes ago

Crooks use a fake antivirus site to spread Venom RAT and a mix of malware

Researchers found a fake Bitdefender site spreading the Venom RAT by tricking users into downloading…

4 hours ago

Iranian Man pleaded guilty to role in Robbinhood Ransomware attacks<gwmw style="display:none;"></gwmw>

Iranian man pleads guilty to role in Baltimore ransomware attack tied to Robbinhood, admitting to…

5 hours ago

DragonForce operator chained SimpleHelp flaws to target an MSP and its customers

Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a…

16 hours ago

Russia-linked APT Laundry Bear linked to 2024 Dutch Police attack

A new Russia-linked APT group, tracked as Laundry Bear, has been linked to a Dutch…

23 hours ago

Nova Scotia Power confirms it was hit by ransomware attack but hasn’t paid the ransom

Nova Scotia Power confirms it was hit by a ransomware attack but hasn't paid the…

1 day ago