ADVERTISEMENT
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Advertise Here
  • Login
National Insight News
Advertisement
  • News
  • Politics
  • Business
  • Entertainment
  • Sports
  • Health
  • Tourism
No Result
View All Result
  • News
  • Politics
  • Business
  • Entertainment
  • Sports
  • Health
  • Tourism
No Result
View All Result
National Insight
No Result
View All Result
Home Featured

Cyber-security : How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World

by NationalInsight
August 21, 2017
in Featured, News
Reading Time: 3min read
0
30
SHARES
369
VIEWS
Share on FacebookShare on TwitterShare on WhatsApp

Kaspersky Lab experts have discovered a backdoor planted in a server management software product used by hundreds of large businesses around the world. When activated, the backdoor allows attackers to download further malicious modules or steal data.

Kaspersky Lab has alerted NetSarang, the vendor of the affected software, and it has promptly removed the malicious code and released an update (http://APO.af/uoH4Qj) for customers.

ShadowPad is one of the largest known supply-chain attacks. Had it not been detected and patched so quickly, it could potentially have targeted hundreds of organisations worldwide.

In July, 2017 Kaspersky Lab’s Global Research and Analysis (GReAT) team was approached by one of its partners – a financial institution. The organisation’s security specialists were worried about suspicious DNS (domain name server) requests originating on a system involved in the processing of financial transactions. Further investigation showed that the source of these requests was server management software produced by a legitimate company and used by hundreds of customers in industries like financial services, education, telecoms, manufacturing, energy, and transportation.

You might also like

Pat Akpabio: The Noise and the Facts: Separating Fiction from Truth

NAN Applauds Oyo Government for Transparent Resolution of Land Disputes

ACPN Calls for Sanctions Over Alleged Illegal Drug Distribution in Federal Hospitals

Load More

 

The most worrying finding was the fact that the vendor did not mean for the software to make these requests.

Further Kaspersky Lab analysis showed that the suspicious requests were actually the result of the activity of a malicious module hidden inside a recent version of the legitimate software. Following the installation of an infected software update, the malicious module would start sending DNS-queries to specific domains (its command and control server) at a frequency of once every eight hours. The request would contain basic information about the victim system (user name, domain name, host name). If the attackers considered the system to be “interesting”, the command server would reply and activate a fully-fledged backdoor platform that would silently deploy itself inside the attacked computer. After that, on command from the attackers, the backdoor platform would be able to download and execute further malicious code.

ALSO READ  Entrepreneur Donates Food to Ekiti People to Cushion COVID-19 effect 

Following the discovery, Kaspersky Lab researchers immediately contacted NetSarang. The company reacted fast and released an updated version of the software without the malicious code.

So far, according to Kaspersky Lab research, the malicious module has been activated in Hong Kong, but it could be lying dormant on many other systems worldwide, especially if the users have not installed the updated version of the affected software.

While analysing the tools techniques and procedures used by the attackers, Kaspersky Lab researchers came to the conclusion that some similarities exist that point to PlugX malware variants used by the Winnti APT, a known Chinese-speaking cyberespionage group. This information, however, is not enough to establish a precise connection to these actors.

“ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component. Luckily NetSarang was fast to react to our notification and released a clean software update, most likely preventing hundreds of data stealing attacks against its clients. However, this case shows that large companies should rely on advanced solutions capable of monitoring network activity and detecting anomalies. This is where you can spot malicious activity even if the attackers were sophisticated enough to hide their malware inside legitimate software,” said Igor Soumenkov, security expert, Global Research and Analysis Team, Kaspersky Lab.

NetSarang Statement

“To combat the ever-changing landscape of cyberattacks NetSarang has incorporated various methods and measures to prevent our line of products from being compromised, infected, or utilised by cyberespionage groups. Regretfully, the Build release of our full line of products on July 18th, 2017 was unknowingly shipped with a backdoor which had the potential to be exploited by its creator.

ALSO READ  Hon Segun Odebunimi (BUNVIC); A Link To Resources .By Adedamola Aje

The security of our customers and user base is our highest priority and ultimately, our responsibility. The fact that malicious groups and entities are utilising commercial and legitimate software for illicit gain is an ever-growing concern and one that NetSarang, as well as others in the computer software industry, is taking very seriously.

NetSarang is committed to its users’ privacy and has incorporated a more robust system to ensure that never again will a compromised product be delivered to its users. NetSarang will continue to evaluate and improve our security not only to combat the efforts of cyber espionage groups around the world but also in order to regain the trust of its loyal user base.”

All Kaspersky Lab products detect and protect against the ShadowPad malware as “Backdoor[dot]Win32[dot]ShadowPad[dot]a”.

Kaspersky Lab advises users to update (http://APO.af/uoH4Qj) immediately to the latest version of the NetSarang software, from which the malicious module has been removed, and to check their systems for signs of DNS queries to unusual domains. A list of the command server domains used by the malicious module can be found in the Securelist blogpost (http://APO.af/PXBCv3), which also includes further technical information on the backdoor.
Distributed by APO on behalf of Kaspersky.

author avatar
NationalInsight
See Full Bio
Tags: Cybersecurity
Share12Tweet8Send
Previous Post

Ekiti APC, civil society groups holds welcome rally for Buhari ,blast Fayose over ‘death wish’

Next Post

Off-grid solar will transform business in Nigeria-Survey

NationalInsight

NationalInsight

Related Posts

President of the Senate, Godswill Akpabio
Featured

Pat Akpabio: The Noise and the Facts: Separating Fiction from Truth

by NationalInsight
October 31, 2025
310
#image_title
Featured

NAN Applauds Oyo Government for Transparent Resolution of Land Disputes

by NationalInsight
October 31, 2025
224
#image_title
Featured

ACPN Calls for Sanctions Over Alleged Illegal Drug Distribution in Federal Hospitals

by NationalInsight
October 31, 2025
218
#image_title
Featured

Ologburo Congratulates Ambassador Arapaja on Nomination as PDP National Secretary

by NationalInsight
October 31, 2025
228
Tinubu is suitable to be president in 2023
Featured

Satguru Maharaj Ji Faults Sowore’s Comment on Tinubu, Says Calling President a Criminal Is Unacceptable

by NationalInsight
October 31, 2025
215
Next Post
Solar Panel

Off-grid solar will transform business in Nigeria-Survey

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Post

President of the Senate, Godswill Akpabio

Pat Akpabio: The Noise and the Facts: Separating Fiction from Truth

October 31, 2025
310
#image_title

NAN Applauds Oyo Government for Transparent Resolution of Land Disputes

October 31, 2025
224
#image_title

ACPN Calls for Sanctions Over Alleged Illegal Drug Distribution in Federal Hospitals

October 31, 2025
218
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Advertise Here

Recent Posts

  • Pat Akpabio: The Noise and the Facts: Separating Fiction from Truth
  • NAN Applauds Oyo Government for Transparent Resolution of Land Disputes
  • ACPN Calls for Sanctions Over Alleged Illegal Drug Distribution in Federal Hospitals

Copyright © 2020 National Insight News

No Result
View All Result
  • Politics
  • Entertainment
  • News
    • Business
    • Health
    • Tourism
  • Sports
  • Contact Us
  • Privacy Policy

Copyright © 2020 National Insight News

Welcome Back!

Login to your account below

Forgotten Password?

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
WP Twitter Auto Publish Powered By : XYZScripts.com