Skip to main content

Woburn, MA – August 10, 2015 -“Darkhotel,” an elite spying crew discovered by Kaspersky Lab experts in 2014 and famous for infiltrating Wi-Fi networks in luxury hotels to compromise select corporate executives, has been using a zero-day vulnerability from Hacking Team’s collection since the beginning of July 2015. Not known to have been a client of Hacking Team, the Darkhotel group appears to have grabbed the files once they became publicly available after the notorious leak of Hacking Team files on July 5, 2015.

This is not the group’s only zero-day; Kaspersky Lab estimates that during the past few years Darkhotel may have gone through half a dozen or more zero-days targeting Adobe Flash Player, apparently investing significant money in supplementing its arsenal. In 2015, the Darkhotel group extended its geographical reach around the world while continuing to spearphish targets in North and South Korea, Russia, Japan, Bangladesh, Thailand, India, Mozambique and Germany. 

Collateral assistance from Hacking Team

In addition, Kaspersky Lab security researchers have registered new techniques and activities from Darkhotel. In attacks dated 2014 and earlier, the group misused stolen code-signing certificates and employed unusual methods like compromising hotel Wi-Fi to place spying tools on targets’ systems. In 2015, many of these techniques and activities have been maintained, but Kaspersky Lab has also uncovered new variants of malicious executable files as well as:

  • Ongoing use of stolen certificates. The Darkhotel group appears to maintain a stockpile of stolen certificates and deploys their downloaders and the backdoors signed with these certificates to cheat the targeted system. Some of the more recent revoked certificates include Xuchang Hongguang Technology Co. Ltd. – the company whose certificates were used in previous attacks performed by the threat actor.
  • Relentless spoofing social-engineering techniques. The Darkhotel APT is indeed persistent: it tries to spearphish a target, and if it doesn’t succeed it returns several months later for another try with much of the same social-engineering schemes.
  • Deployment of Hacking Team’s zero-day exploit. The compromised website, tisone360.com, contains a set of backdoors and exploits. The most interesting of these is the Hacking Team Flash zero-day vulnerability.

“Darkhotel has returned with yet another Adobe Flash Player exploit hosted on a compromised website, and this time it appears to have been driven by the Hacking Team leak. The group has previously delivered a different Flash exploit on the same website, which we reported as a zero-day to Adobe in January 2014. Darkhotel seems to have burned through a pile of Flash zero-day and half-day exploits over the past few years, and it may have stockpiled more to perform precise attacks on high-level individuals globally. From previous attacks we know that Darkhotel spies on CEOs, senior vice presidents, sales and marketing directors and top R&D staff,” – said Kurt Baumgartner, principal security researcher at Kaspersky Lab.

Since last year, the group has enhanced its defensive techniques, for example by expanding its anti-detection technology list. The 2015 version of the Darkhotel downloader is designed to identify anti-virus technologies from 27 vendors, with the intention of bypassing them.

 

Kaspersky Lab products successfully detect and block new Dark Hotel modules as Trojan.Win32.Darkhotel  and Trojan-Dropper.Win32.Dapato.

To learn more, please read the blog post available at Securelist.com.

General guidance on mitigating APTs is available in the article “How to mitigate 85% of all targeted attacks using 4 simple strategies”.

About Kaspersky Lab

Kaspersky Lab is one of the world’s fastest-growing cybersecurity companies and the largest that is privately-owned. The company is ranked among the world’s top four vendors of security solutions for endpoint users (IDC, 2014). Since 1997 Kaspersky Lab has been an innovator in cybersecurity and provides effective digital security solutions and threat intelligence for large enterprises, SMBs and consumers. Kaspersky Lab is an international company, operating in almost 200 countries and territories across the globe, providing protection for over 400 million users worldwide.

Learn more at www.kaspersky.com.

 

Learn more at www.kaspersky.com.

For the latest in-depth information on security threat issues and trends, please visit:

Securelist | Information about Viruses, Hackers and Spam
Follow @Securelist on Twitter

Threatpost | The First Stop for Security News
Follow @Threatpost on Twitter

Media Contact
Sarah Kitsos 
781.503.2615
sarah.kitsos@kaspersky.com

"Darkhotel" Cyberespionage Group Boosts Attacks with Exploit Leaked from Hacking Team

"Darkhotel" Cyberespionage Group Boosts Attacks with Exploit Leaked from Hacking Team
Kaspersky Logo