Malicious hackers have their own shadow IT problem

Share:

Researchers at watchTowr Labs found that abandoned and expired internet infrastructure left by hacking groups can function as backdoors within other backdoors.

Every chief information security officer worth their salt spends time thinking about the problem of shadow IT in their enterprise. Systems, hardware or infrastructure that might have been connected to your network years ago, for reasons no one can remember, were then summarily forgotten until years later when they become an entry point in a data breach or compromise.

But new research from watchTowr Labs suggests that this problem may not be restricted to the business world or defenders, and that the sloppy work left behind by malicious hacking groups can — with some creative thinking and a $20 domain purchase — be turned against them.

In a post published Wednesday, watchTowr Labs CEO Benjamin Harris and researcher Aliz Hammond said they have successfully identified entry points into thousands of live backdoors being used by hackers through the interconnected infrastructure they leave behind.

“Put simply — we have been hijacking backdoors (that were reliant on now abandoned infrastructure and/or expired domains) that themselves existed inside backdoors, and have since been watching the results flood in,” Harris and Hammond wrote. “This hijacking allowed us to track compromised hosts as they ‘reported in’, and theoretically gave us the power to commandeer and control these compromised hosts.”

Advertisement

In many cases, attackers leave behind old web shells containing snippets of code that could be used to identify and compromise newer, active web shells and domains being used in ongoing hacking campaigns. While those shells are usually password protected, Harris and Hammond said using the extract function allowed them to overwrite the hardcoded password with their own login credentials.

The researchers then collected shells that referenced more than 40 different expired domains and purchased them, often for as low as $20 a pop, and “pointed our shiny new domains at our logging server, which did nothing other than log incoming requests before responding with a 404.”

Among the victims spotted were government organizations in Bangladesh, China and Nigeria, as well as universities in China, Thailand and South Korea. All told, they claim to have access to 4,000 backdoors. The number of victims compromised through those backdoors is likely exponentially higher; a single backdoor seemingly left over from a prior Lazarus Group operation was connected to more than 3,900 unique compromised domains.

Much of the attacker traffic captured by watchTowr appeared to come from Chinese and Hong Kong IP addresses and were directed at “Chinese targets,” but the researchers stressed that this could be a product of the sample size they collected and that setting up proxy infrastructure in other countries is a common tactic for malicious hacking groups.

Harris and Hammond stressed that they were careful not to cross the line into doing anything that could be considered illegal as part of their research, noting “these requests were coming to us, we didn’t manipulate systems into communicating with us, and we certainly did not respond with code to be evaluated.” They also obfuscated compromised hostnames and other technical details.

Advertisement

The domains purchased by watchTowr were handed over to the nonprofit Shadowserver Foundation, which turned them into a sinkhole.

Harris and Hammond wrote that the project underscores “that as the Internet ages, and as we begin to truly understand the scope of impact for abandoned and expired infrastructure, we’re likely to see problems like this continue.”

“We like to be semi-positive … it is somewhat encouraging to see that attackers make the same mistakes as defenders,” Harris and Hammond wrote. “It’s easy to slip into the mindset that attackers never slip up, but we saw evidence to the contrary — boxes with open web shells, expired domains, and the use of software that has been backdoored. Perhaps the playing field is more level than we thought.”

Perhaps attackers need to attend more Washington D.C. cybersecurity conferences for tips on properly managing their shadow IT.

Source

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
9:19 pm, Jan 14, 2025
weather icon 9°C
L: 8° | H: 10°
overcast clouds
Humidity: 91 %
Pressure: 1034 mb
Wind: 7 mph SW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 8:00 am
Sunset: 4:18 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 9:00 pm
weather icon
8° | 10°°C 0 mm 0% 3 mph 97 % 1035 mb 0 mm/h
Thu Jan 16 9:00 pm
weather icon
5° | 9°°C 0 mm 0% 4 mph 96 % 1034 mb 0 mm/h
Fri Jan 17 9:00 pm
weather icon
4° | 8°°C 0 mm 0% 5 mph 92 % 1035 mb 0 mm/h
Sat Jan 18 9:00 pm
weather icon
2° | 7°°C 0 mm 0% 3 mph 90 % 1033 mb 0 mm/h
Sun Jan 19 9:00 pm
weather icon
2° | 7°°C 0 mm 0% 4 mph 96 % 1024 mb 0 mm/h
Tomorrow 12:00 am
weather icon
8° | 9°°C 0 mm 0% 3 mph 93 % 1034 mb 0 mm/h
Tomorrow 3:00 am
weather icon
7° | 8°°C 0 mm 0% 3 mph 95 % 1033 mb 0 mm/h
Tomorrow 6:00 am
weather icon
6° | 6°°C 0 mm 0% 2 mph 96 % 1034 mb 0 mm/h
Tomorrow 9:00 am
weather icon
7° | 7°°C 0 mm 0% 3 mph 97 % 1035 mb 0 mm/h
Tomorrow 12:00 pm
weather icon
9° | 9°°C 0 mm 0% 2 mph 89 % 1034 mb 0 mm/h
Tomorrow 3:00 pm
weather icon
9° | 9°°C 0 mm 0% 2 mph 89 % 1033 mb 0 mm/h
Tomorrow 6:00 pm
weather icon
7° | 7°°C 0 mm 0% 2 mph 95 % 1034 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
7° | 7°°C 0 mm 0% 2 mph 96 % 1034 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€94,128.38
3.16%
Ethereum(ETH)
€3,145.61
4.19%
XRP(XRP)
€2.59
5.97%
Tether(USDT)
€0.97
0.00%
Solana(SOL)
€182.59
3.36%
Dogecoin(DOGE)
€0.347176
7.00%
USDC(USDC)
€0.97
0.00%
Shiba Inu(SHIB)
€0.000021
3.79%
Pepe(PEPE)
€0.000017
4.86%
Peanut the Squirrel(PNUT)
€0.61
11.87%
Scroll to Top