EclecticIQ

Our Ecosystem

An ecosystem supporting our customers' intelligence-led proactive cybersecurity needs with collaborative partner programs delivering world-class joint solutions. 

Partner Program

Partner with EclecticIQ to bring valuable and innovative security solutions and services to end users. Open to all partner types, including technology developers, service providers, resellers, and community.

Our Partnerships

We partner with the world's premier technology and solution providers to support all phases of your cybersecurity needs. Explore all our partners' solutions and offerings to build and extend your cyber defense ecosystem.

EclecticIQ Resources

We are committed to increasing the knowledge and capabilities of the cybersecurity community through our research & analysis efforts and open source projects.

Browse Resources

Learn more about our technology, solutions and services, and stay updated on the cyber threat landscape with our research reports, webinars and other information.

Open Source Projects

We are proud to be an active member in the open source community and to help develop and advance progress of security technology. Learn more about contributions or go directly to our GitHub page.

Our Ecosystem

An ecosystem supporting our customers' intelligence-led proactive cybersecurity needs with collaborative partner programs delivering world-class joint solutions. 

Partner Program

Partner with EclecticIQ to bring valuable and innovative security solutions and services to end users. Open to all partner types, including technology developers, service providers, resellers, and community.

Our Partnerships

We partner with the world's premier technology and solution providers to support all phases of your cybersecurity needs. Explore all our partners' solutions and offerings to build and extend your cyber defense ecosystem.

EclecticIQ Resources

We are committed to increasing the knowledge and capabilities of the cybersecurity community through our research & analysis efforts and open source projects.

Browse Resources

Learn more about our technology, solutions and services, and stay updated on the cyber threat landscape with our research reports, webinars and other information.

Open Source Projects

We are proud to be an active member in the open source community and to help develop and advance progress of security technology. Learn more about contributions or go directly to our GitHub page.

Our Ecosystem

An ecosystem supporting our customers' intelligence-led proactive cybersecurity needs with collaborative partner programs delivering world-class joint solutions. 

Partner Program

Partner with EclecticIQ to bring valuable and innovative security solutions and services to end users. Open to all partner types, including technology developers, service providers, resellers, and community.

Our Partnerships

We partner with the world's premier technology and solution providers to support all phases of your cybersecurity needs. Explore all our partners' solutions and offerings to build and extend your cyber defense ecosystem.

EclecticIQ Resources

We are committed to increasing the knowledge and capabilities of the cybersecurity community through our research & analysis efforts and open source projects.

Browse Resources

Learn more about our technology, solutions and services, and stay updated on the cyber threat landscape with our research reports, webinars and other information.

Open Source Projects

We are proud to be an active member in the open source community and to help develop and advance progress of security technology. Learn more about contributions or go directly to our GitHub page.

Our Ecosystem

An ecosystem supporting our customers' intelligence-led proactive cybersecurity needs with collaborative partner programs delivering world-class joint solutions. 

Partner Program

Partner with EclecticIQ to bring valuable and innovative security solutions and services to end users. Open to all partner types, including technology developers, service providers, resellers, and community.

Our Partnerships

We partner with the world's premier technology and solution providers to support all phases of your cybersecurity needs. Explore all our partners' solutions and offerings to build and extend your cyber defense ecosystem.

EclecticIQ Resources

We are committed to increasing the knowledge and capabilities of the cybersecurity community through our research & analysis efforts and open source projects.

Browse Resources

Learn more about our technology, solutions and services, and stay updated on the cyber threat landscape with our research reports, webinars and other information.

Open Source Projects

We are proud to be an active member in the open source community and to help develop and advance progress of security technology. Learn more about contributions or go directly to our GitHub page.

CTI Investigation into COVID-19 Contact Tracing Apps

Peter Ferguson July 30, 2020

CTI Investigation into COVID-19 Tracing Apps In cooperation with the ThreatFabric research team.

Executive Summary

With more countries providing COVID-19 contact tracing applications [1], threat actors will almost certainly continue to distribute malicious Android packages that pose as legitimate contact tracing applications serving banking trojans, spyware, and ransomware. As the current COVID-19 pandemic has caused public-health and economic issues to countries around the globe [2], nations have launched contact tracing applications to monitor, identify, alert and reduce the spread of infections. A joint analysis by ThreatFabric and EclecticIQ highlight that threat actors:

  • Disguised Android packages as legitimate contact tracing applications for financial gain.
  • Used repackaged commodity and opensource malware to lower the investment needed.
  • Used third party port forwarding and secure tunnelling services to provide anonymization to command and control (C2) infrastructure.
  • Delivered malicious Android packages through links pointing to phishing pages.

Walk-through of the investigation results in EclecticIQ Platform

Commodity and opensource malware used to lower barrier to entry

Malicious actors took advantage of the low barrier to entry to push malicious android applications under the guise of contact tracing applications to lower the investment cost needed and to steal user information. EclecticIQ and ThreatFabric researchers identified samples that were disguised as the official contact tracing applications for Colombia, Indian, and Indonesia. The samples used the commodity and opensource malware SpyMax [3], SpyNote [4], Aymyth [5], and repackaged applications with Metasploit [6] injected. One sample disguised as the official Indian contact tracing app had a thirteen-day period between the official release on the Google Play Store [7] and the estimated build time of the malicious sample.

Image of the ThreatFabric sandbox identifying the estimated build time for a malicious sample disguised as the official Indian contact tracing application

Figure 1 – Image of the ThreatFabric sandbox identifying the estimated build time for a malicious sample disguised as the official Indian contact tracing application

Third party tooling used to provide C2 anonymization

Malicious actors used third party tooling to provide anonymization to their command and control (C2) infrastructure. India was targeted with eight malicious applications that used Portmap.io and Ngrok. Portmap.io[8] is a commercially available port forwarding service, and Ngrok[9] is a secure tunnelling service.

Malicious Android packages distributed through phishing links

Malicious contact tracing applications were distributed through phishing links designed to trick users into downloading a malicious Android package. One sample was disguised as the official contact tracing application for India. The sample, identified by MalwareHunterTeam [10] was distributed through the phishing link, ‘http://prettysavantwholesale[.]com/Aarogya-Setu-v1.5[.]apk’. Distribution of malicious Android packages disguised as legitimate contact tracing applications is consistent across regions. The official Canadian contact tracing application was targeted with ransomware, which was distributed through two phishing links designed to trick the user into downloading the CryCryptor ransomware, according to ESET [11].

Investigation findings are consistent with previous open source reporting

The use of commodity and open source-based malware disguised as benign contact tracing applications is consistent with previous open source reporting. Legitimate SM_Covid19 applications were repackaged and injected with Metasploit giving the identified samples remote access trojan capabilities, according to researchers at Symantec [12], and three SpyNote samples were found to be disguised as the contract tracing application for India.

A publicly reported sample disguised as the contact tracing application for Singapore was identified by EclecticIQ and ThreatFabric as the commodity Android banking trojan Alien.

Figure 2 – Image of ThreatFabric enriched Alien.A sample disguised as the official contact tracing application for Singapore on the EclecticIQ Threat Intelligence Platform

Figure 2 – Image of ThreatFabric enriched Alien.A sample disguised as the official contact tracing application for Singapore on the EclecticIQ Threat Intelligence Platform

Malicious Android packages distributed for financial gain

Cybercriminals used openly available malware and tools to repackage malicious contact tracing applications for financial gain. The Canadian contract tracing application was targeted with an open source-based ransomware named CryCryptor, according to researchers at ESET [13]. A SpyNote [14] variant disguised as the official Indian contact tracing application shared command and control infrastructure with an Aymyth [15] sample posing as a legitimate process manager application. The shared command and control infrastructure showed related repackaged spyware being distributed as unrelated applications that appear to have no overlap in target demographic. EclecticIQ and ThreatFabric assess with high confidence that the majority of contact tracing attacks are financially motivated.

Threat actors will continue to push malicious Android packages as benign contract tracing applications for financial gain

Threat actors will almost certainly continue to use commodity and open source-based malware disguised as legitimate contact tracing applications for financial gain. Malicious actors have shown their willingness to target contact tracing applications consistently for over two months. The 12th April 2020 is the earliest estimated build time identified by EclecticIQ and ThreatFabric researchers, with June 23rd, 2020 the latest identified sample targeting a contact tracing application. Countries need and plan to implement contact tracing applications due to the continued increase in COVID-19 infections [16]. Threat actors are aware of this and will continue to use low barrier to entry tools to target contact tracing applications into the near future.

Users should download contract tracing applications from official stores

Users should only download contact tracing applications from the official Google Play Store or the official website stated by their government. Users should avoid clicking links distributed through messaging services or social media sites to avoid websites hosting malicious contact tracing applications.

References

[1] https://www.nytimes.com/2020/06/16/world/europe/contact-tracing-apps-europe-coronavirus.html

[2] https://www.worldbank.org/en/news/feature/2020/06/08/the-global-economic-outlook-during-the-covid-19-pandemic-a-changed-world

[3] https://cracked.to/Thread-Supreme-SpyMax-v2-0-Android-RAT-Updated

[4] https://unit42.paloaltonetworks.com/unit42-spynote-android-trojan-builder-leaked/

[5] https://github.com/AhMyth/AhMyth-Android-RAT

[6] https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/payload/android/meterpreter/reverse_tcp.md

[7] https://www.appbrain.com/app/aarogya-setu/nic.goi.aarogyasetu

[8] https://portmap.io/

[9] https://ngrok.com/

[10] https://twitter.com/malwrhunterteam/status/1260892816307367937

[11] https://www.welivesecurity.com/2020/06/24/new-ransomware-uses-covid19-tracing-guise-target-canada-eset-decryptor/

[12] https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/android-apps-coronavirus-covid19-malicious

[13] https://www.welivesecurity.com/2020/06/24/new-ransomware-uses-covid19-tracing-guise-target-canada-eset-decryptor/

[14] https://www.virustotal.com/gui/file/885d07d1532dcce08ae8e0751793ec30ed0152eee3c1321e2d051b2f0e3fa3d7/detection

[15] https://www.virustotal.com/gui/file/4ca1aebea3b2de81984c70a687ebe9aea0342526b9ea8c5fbca45a5dc78c1e25/detection

[16] https://www.ecdc.europa.eu/en/geographical-distribution-2019-ncov-cases

Appendix A - Samples

Screenshot 2020-07-29 at 12.18.17 Screenshot 2020-07-29 at 12.19.45 Screenshot 2020-07-29 at 12.21.41

Screenshot 2020-07-29 at 12.22.44 Screenshot 2020-07-29 at 12.23.28 Screenshot 2020-07-29 at 12.24.23 Screenshot 2020-07-29 at 12.25.07

Appendix B - MITRE Techniques

Appendix B-1

Appendix C - SpyNote.A Capabilities

Appendix C-1

Appendix D - SpyMax.A Capabilities

Appendix D-1

Appendix E - Ahymyth.A Capabilities

Appendix E-1

Appendix F - Alien.ACapabilities 

Appendix F-1

Appendix G - CryCryptor Capabilities

APPENDIX G-1

Appendix H - Metasploit Injection Capabilities 

Appendix H-1

Receive all our latest updates

Subscribe to receive the latest EclecticIQ news, event invites, and Threat Intelligence blog posts.

Explore all topics

© 2014 – 2024 EclecticIQ B.V.
EclecticIQ. Intelligence, Automation, Collaboration.
Get demo