New Cuttlefish Malware Hijacks Router Traffic to Harvest Credentials

by | May 2, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A newly discovered malware named ‘Cuttlefish’ has emerged, posing a significant threat to both enterprise-grade and small office/home office (SOHO) routers. Lumen Technologies’ Black Lotus Labs has conducted an in-depth analysis of this malware, revealing its alarming capabilities.

Cuttlefish operates by infiltrating routers and establishing a proxy or VPN tunnel, allowing it to stealthy monitor data passing through the compromised devices. This sophisticated approach enables the malware to bypass security measures that typically detect unusual sign-ins.

Furthermore, Cuttlefish can execute DNS and HTTP hijacking within private IP spaces, disrupting internal communications and potentially introducing additional malicious payloads.

While Cuttlefish shares some code similarities with HiatusRat, a malware previously associated with Chinese state interests, no direct links have been established between the two, making attribution challenging.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

According to Black Lotus Labs, Cuttlefish has been active since at least July 2023, primarily targeting routers in Turkey. However, isolated infections have also been reported in satellite phone and data center services globally.

Cuttlefish Infection chain

Cuttlefish infects routers by exploiting vulnerabilities or using brute-force attacks to gain access. Once inside, it deploys a bash script (“s.sh”) to collect host-based data like directory listings and active connections.

The script then downloads and executes the primary Cuttlefish payload (“.timezone”), which operates in memory to avoid detection. Cuttlefish is versatile, with builds supporting various router architectures, making it a significant threat to network security.

 

Infection chainInfection chain
Source: Black Lotus Labs

Monitoring Traffic

Cuttlefish monitors traffic by employing a packet filter to track all connections passing through the infected device. It scans for specific data, like usernames, passwords, and tokens associated with cloud-based services, in the intercepted packets. This information is then logged locally and eventually exfiltrated to the attacker’s command and control server.

Proxy functionalityProxy functionality
Source: Black Lotus Labs




Evading Detection

To evade detection, Cuttlefish creates a peer-to-peer VPN or proxy tunnel on the compromised device for data transmission. Additionally, it redirects DNS requests and manipulates HTTP traffic to control communication and potentially hijack internal or site-to-site traffic, granting access to secured resources typically inaccessible via the public internet.

Cuttlefish operational diagram

Cuttlefish operational diagram
Source: Black Lotus Labs

Protecting from Cuttlefish

To protect against Cuttlefish, Black Lotus Labs recommends eliminating weak credentials, monitoring for unusual logins, securing traffic with TLS/SSL, and inspecting devices for abnormal files.

For SOHO router users, regular rebooting, firmware updates, password changes, and disabling remote access are essential measures to mitigate the risk posed by Cuttlefish.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This