Russian antivirus maker Kaspersky has said it uncovered “rogue UEFI firmware images” seemingly developed by black hats with links to China.

The rogue images had been “modified from their benign counterpart to incorporate several malicious modules”, according to a post on Kaspersky’s Securelist blog, which named the attack MosaicRegressor.

“MosaicRegressor is a multi-stage and modular framework aimed at espionage and data gathering. It consists of downloaders, and occasionally multiple intermediate loaders, that are intended to fetch and execute payload on victim machines,” said Kaspersky in a statement.

The firm explained that UEFI malware, being “typically shipped within SPI flash storage that is soldered to the computer’s motherboard”, is by its nature “resistant to OS reinstallation or replacement of the hard drive”. The technique shot to public prominence in 2015 when malware-for-governments purveyor Hacking Team was itself hacked, with details of its firmware-level spyware becoming public knowledge.

The malware-laden MosaicRegressor images were discovered in use as part of a wider campaign targeting charities in Africa, Asia, and Europe, “all showing ties in their activity to North Korea” – though Kaspersky attributed the malicious software to “a Chinese-speaking” person or group, possibly connected to the Winnti hacking crew. A single IP address mentioned in a previous list of suspected C2 infrastructure linked to Winnti gave Kaspersky a clue as to its origins, though no more than that.

“After further analysis we were able to determine that [the UEFI images] were based on the leaked source code of Hacking Team’s VectorEDK bootkit, with minor customizations,” the company added.

The malicious firmware modules wrote an executable called IntelUpdate.exe to the infected machine’s startup folder, meaning the program would run whenever the system was booted. Among other components Kaspersky found were “a DXE driver that is based on Hacking Team’s ‘rkloader’ component,” and a Hacking Team driver called ntfs among others.

Fellow infosec biz ESET has conducted in-depth research into UEFI rootkits deployed by APT28, aka Russia’s Fancy Bear hacking crew. In that case the rootkit was introduced to the target machine via “a poisoned application delivered via spear phishing emails.” ®

Source link