top of page

New Malware Disguised as Palo Alto VPN Targets Middle East Users

A new cybersecurity threat has emerged, targeting users in the Middle East with malware disguised as the Palo Alto Networks GlobalProtect virtual private network (VPN) tool. This sophisticated malware can execute remote commands, exfiltrate files, and bypass security measures, posing a significant risk to organizations in the region.

Palo Alto Networks GlobalProtect | BetterWorld Technology

Key Takeaways

  • Malware masquerades as Palo Alto Networks GlobalProtect VPN tool.

  • Targets users in the Middle East.

  • Capable of executing remote PowerShell commands, downloading and exfiltrating files, and encrypting communications.

  • Bypasses sandbox solutions and employs evasion techniques.

  • Uses a two-stage process to establish connections to command-and-control (C2) infrastructure.

Malware Capabilities

The malware can execute remote PowerShell commands, download and exfiltrate files, encrypt communications, and bypass sandbox solutions. This makes it a significant threat to targeted organizations. The malware employs a two-stage process, setting up connections to command-and-control (C2) infrastructure that mimics a company VPN portal, allowing threat actors to operate undetected.

Initial Intrusion Vector

The initial method of intrusion is currently unknown, but it is suspected to involve phishing techniques. Users are deceived into thinking they are installing the GlobalProtect agent. The activity has not been attributed to a specific threat actor or group.

Technical Details

The attack begins with a setup.exe binary that deploys the primary backdoor component called GlobalProtect.exe. Once installed, it initiates a beaconing process to alert the operators of the progress. The first-stage executable also drops two additional configuration files (RTime.conf and ApProcessId.conf) used to exfiltrate system information to a C2 server.

The malware implements evasion techniques to bypass behavior analysis and sandbox solutions by checking the process file path and specific files before executing the main code block. The backdoor serves as a conduit to upload files, download next-stage payloads, and execute PowerShell commands. Beaconing to the C2 server is facilitated by the Interactsh open-source project.

Regional Focus

The malware pivots to a newly registered URL, 'sharjahconnect,' designed to resemble a legitimate VPN portal for a company based in the U.A.E. This tactic allows the malware's activities to blend in with expected regional network traffic, enhancing its evasion characteristics.

In today's digital age, protecting your business from cyber threats is more important than ever. BetterWorld Technology's cybersecurity experts are dedicated to safeguarding your data and infrastructure with comprehensive, tailored solutions. Whether you need proactive monitoring, threat assessment, or incident response, we have the expertise to keep your business secure. Book a consultation with us now and take the first step toward fortifying your cybersecurity defenses with BetterWorld Technology.

Sources

10 views

Comments


bottom of page