top of page

Subscribe to our newsletter

Understanding the Impact of StripedFly and Coathanger Malware on Windows, Linux, and Android Banking Systems: A Deep Dive into Recent Cybersecurity Breaches

CVE Image for report on CVE-2023-0001

Executive Summary

In recent months, the cybersecurity landscape has been significantly impacted by a series of sophisticated malware attacks. This report, prepared by Rescana, delves into the intricacies of these attacks, focusing on the StripedFly malware framework, the emergence of Android banking trojans, and the breach of the Dutch Ministry of Defense by Chinese hackers using the Coathanger malware. These incidents underscore the evolving tactics of cybercriminals and the urgent need for robust cybersecurity measures across various sectors, including government and financial institutions.

Technical Information

The StripedFly malware framework has emerged as a formidable threat, infecting over a million Windows and Linux systems since 2017. Initially mistaken for a simple cryptocurrency miner, it has been reclassified as a multi-functional malware capable of espionage and ransomware activities. Its capabilities include cryptocurrency mining, credential harvesting, and espionage, with the ability to capture screenshots and record microphone input. The malware infiltrates systems using a custom-made EternalBlue 'SMBv1' exploit, despite the availability of a patch (MS17-010) since 2017. Its persistence through system reboots and firmware upgrades makes it particularly challenging to detect and remove. More details can be found in Kaspersky's analysis: Kaspersky Press Release.

In 2023, the cybersecurity community witnessed the rise of ten new Android banking trojans targeting nearly 1,000 banking and fintech apps. These trojans, often disguised as legitimate apps, are designed to intercept and manipulate banking sessions. Their capabilities include capturing login credentials, bypassing multi-factor authentication, and performing automated transfers. They are typically distributed through unofficial app stores and phishing campaigns, posing significant risks to both individual users and financial institutions.

The Coathanger malware, used in the breach of the Dutch Ministry of Defense, represents a sophisticated tool for long-term persistence and data exfiltration. This malware is indicative of state-sponsored cyber operations, with its ability to persist through firmware upgrades. While details on the initial infection vector remain limited, the malware's resilience suggests advanced infiltration techniques.

Exploitation in the Wild

The StripedFly malware has been linked to over a million infections globally, with its mining module allowing it to evade detection for extended periods. Its espionage capabilities suggest potential use by state-sponsored actors. The rapid emergence of Android banking trojans highlights the increasing sophistication of malware targeting financial applications. The breach of the Dutch Ministry of Defense underscores the strategic use of advanced malware in geopolitical cyber operations.

APT Groups using this vulnerability

The StripedFly malware's espionage capabilities suggest potential use by state-sponsored actors, although specific APT groups have not been publicly identified. The Coathanger malware used in the Dutch Ministry of Defense breach is attributed to Chinese hackers, indicating its use in state-sponsored cyber operations.

Affected Product Versions

The StripedFly malware affects Windows and Linux systems that have not applied the MS17-010 patch. The Android banking trojans target nearly 1,000 banking and fintech apps, affecting users who download apps from unofficial sources. The Coathanger malware's specific affected product versions remain undisclosed, but its impact on government networks is evident.

Workaround and Mitigation

To mitigate the risks posed by the StripedFly malware, organizations should regularly update operating systems and applications to patch known vulnerabilities. Implementing endpoint detection and response (EDR) solutions can aid in timely detection and remediation. Security awareness training for employees is crucial to recognize phishing attempts and suspicious activities. For Android banking trojans, users should be encouraged to download apps only from official app stores and implement robust mobile security solutions with real-time threat detection. The breach involving Coathanger malware highlights the need for advanced threat detection and response solutions, regular security audits, and enhanced network segmentation and access controls.

References

For further information and updates, please refer to the following resources: Bleeping Computer Article and Kaspersky's Analysis on StripedFly.

Rescana is here for you

At Rescana, we are committed to helping our customers navigate the complex cybersecurity landscape. Our Continuous Threat and Exposure Management (CTEM) platform is designed to provide comprehensive insights and proactive measures to safeguard your organization against emerging threats. Should you have any questions about this report or any other cybersecurity concerns, please do not hesitate to contact us at ops@rescana.com.

bottom of page