In Google’s April 2023 Threat Horizons Report, security researchers in its Threat Analysis Group revealed that APT41 has been abusing the open-source GC2 red teaming tool in malware attacks.
The threat campaign interacts only with Google’s domains making it harder to detect, and it consists of an agent that is deployed on compromised devices, which then connects back to a Google Sheets URL to receive commands to execute.
These commands cause the deployed agents to download and install additional payloads from Google Drive or exfiltrate stolen data to the cloud storage service.
APT41’s use of GC2 is another indicator of a trend of threat actors using well intentioned, legitimate red teaming tools and RMM platforms as part of their attacks.
Matt Mullins, Senior Security Researcher, Cybrary provided this comment:
“APT41’s use of GC2 is a shift into using more novel and off-the-shelf modern open-source projects. While most of the APT pool still relies on certain tried-and-true approaches (such as using PowerShell and macros), this change up of tactics shows a willingness to change approaches with the time. The GC2 program isn’t anything revolutionary to the Red Team community as the utilization of covert channels as a non-standard C2 is something that good Red Teams have been organically developing for years now.
“The tool, which uses Google’s trusted domains and applications, allows for the masquerading of legitimacy. This approach exposes an Achilles heel to using major providers like Google and Microsoft-enterprises essentially have to whitelist all domains and subdomains associated with these companies. By doing so, any service that can be abused is a free hall pass for attackers. I have personally used this on my own operations before and can say that it leaves even the best defenders blind to C2 communications.
“The application also uses Go, which is a Google language (for extra insult), and in a similar vein it is a known compiled language to Red Teams. Go provides nice cross-compatibility with less robust detection maturity in most organizations. All of this makes for a great initial malware payload!
“Times are changing and so are APT groups. As we see more research and development done by Red Teams, we will see more advanced vectors and approaches like this. Defenders need to make sure they have validated their detections, their detections are robust, and that we have security at all layers (instead of depending on one product or tool to save us). Above all else, having a good Red Team will help your Blue Team train up to defend against advanced threats like this! Investing into a good offensive security program for ANY organization will pay exponentially in the long run.”
Christopher Peacock, Principal Detection Engineer, SCYTHE followed up with this comment:
“In this day and age, free and open-source hacking software is just that, hacking software. Any interesting capability posted publicly to GitHub will inevitably be used maliciously regardless of the projects’ intentions, licensing, or disclaimer.”
Clearly threat actors are becoming more and more dangerous by using tools to create even more novel and dangerous attacks. That means that those of us who are tasked with defending against these attacks need to work harder than ever to make sure that these attacks never succeed.
Google Puts Dark Web Monitoring In The Hands Of US Gmail Users
Posted in Commentary with tags Google on May 12, 2023 by itnerdGoogle announced a new security feature that will allow all US Gmail users to be able to use Google’s dark web report to discover if their email address has been found on the dark web and also take action with guidance provided by Google, such as turning on two-step authentication.
Originally only available to Google One plans, all Gmail accounts will now be regularly reminded to check if their email has been linked to any data breaches that ended up on nefarious cybercrime forums.
“And if any matching info is found on the dark web, we’ll notify you and provide guidance on how you might protect that information,” said Google One Director of Product Management Esteban Kozak.
Google also announced that it upgraded the Safe Browsing service on Chrome and Android to catch and block 25% more phishing attempts, and that Google added a new spam view in Google Drive.
Roy Akerman, Co-Founder & CEO, Rezonate had this to say:
“Google’s extension of its dark web report beyond Google One plans is a step in the right direction and part of Google’s responsibility in the ecosystem. This will reduce compromised accounts and further fraudulent attempts against businesses who’s corporate’s credentials were compromised. However, we seen with Google One existing customers, they may be aware their information is available in the dark web, yet no action is taken. Knowing is not enough, action must be taken to understand the potential risk and account changes must be put in place.”
I’ve always argued that if you give users the tools to protect themselves, and more importantly educate them on how to use those tools, that will help users to become more secure. Google has got the part right these tools existing mostly right as this needs to go beyond US users. But I hope Google really pushes to promote this so as to make sure that as many people as possible know these tools exist and how to use them. Because a single announcement won’t do.
Leave a comment »