Kaspersky Lab has discovered a new business-oriented cyber-spying campaign called Grabit that was able to steal about 10 000 files from small/medium-sized organisations based mostly in Thailand, India and the US.
The list of target sectors includes chemicals, nanotechnology, education, agriculture, media and construction.
Other countries affected are the UAE, Germany, Israel, Canada, France, Austria, Sri Lanka, Chile and Belgium.
“We see a lot of spying campaigns focused on enterprises, government organisations and other high-profile entities, with small and medium-sized businesses rarely seen in the lists of targets,” says Ido Noar, senior security research in Kaspersky’s Global Research and Analysis team.
“But Grabit shows that it’s not just a ‘big fish’ game – in the cyber world every single organisation, whether it possesses money, information or political influence, could be of potential interest to one or other malicious actor.
“Grabit is still active, and it’s critically important to check your network to ensure you’re safe. On 15 May, a simple Grabit keylogger was found to be maintaining thousands of victim account credentials from hundreds of infected systems. This threat shouldn’t be underestimated.”
Infection starts when a user in a business organisation receives an email with an attachment that appears to be a Microsoft Office Word (.doc) file. The user clicks to download it and the spying programme is delivered to the machine from a remote server that has been hacked by the group to serve as a malware hub. The attackers control their victims using HawkEye keylogger, a commercial spying tool from HawkEyeProducts, and a configuration module containing a number of Remote Administration Tools (RATs).
To illustrate the scale of operation, Kaspersky Lab can reveal that a keylogger in just one of the command-and-control servers was able to steal 2887 Passwords, 1053 Emails and 3023 Usernames from 4928 different hosts, internally and externally, including Outlook, Facebook, Skype, Google mail, Pinterest, Yahoo, LinkedIn and Twitter, as well as bank accounts and others.
On the one hand, the Grabit threat actor does not go the extra mile to hide its activity: some malicious samples used the same hosting server, and even the same credentials, undermining its own security.
On the other hand, the attackers use strong mitigation techniques to keep their code hidden from analysts’ eyes. This leads Kaspersky Lab to believe that behind the sniffing operation is an erratic group, with some members more technical and focused on being untraceable than others. Expert analysis suggests that whoever programmed the malware did not write all the code from scratch.
To protect against Grabit, Kaspersky Lab recommends following these steps:
* Сheck this location C:\Users\<PC-NAME>\AppData\Roaming\Microsoft, if it contains executable files, you might be infected with the malware. This is a warning you should not ignore.
* The Windows System Configurations should not contain a grabit1.exe in the startup table. Run “msconfig” and ensure that it is clean from grabit1.exe records.
* Don’t open attachments and links from people you don’t know. If you can’t open it, don’t forward it to others – call for the support of an IT-administrator.
* Use an advanced, up to date anti-malware solution, and always follow the AV task list for suspicious processes.