Magnet Goblin Hackers Exploit 1-day Vulnerabilities to Deploy NerbianRAT Linux Malware

Magnet Goblin Hackers Exploit 1-day Vulnerabilities to Deploy NerbianRAT Linux Malware
Table of Contents
    Add a header to begin generating the table of contents
    The Magnet Goblin hackers, driven by financial motives, use 1-day vulnerabilities to breach servers and install custom Linux malware NerbianRAT and MiniNerbian.

    What are 1-day Vulnerabilities?

    1-day vulnerabilities are publicly disclosed flaws for which a patch has already been released. Threat actors who wish to exploit these vulnerabilities must act swiftly before their intended targets can apply security updates.

    Typically, exploits for 1-day vulnerabilities are not immediately available upon disclosure. However, in some cases, it is relatively easy to determine how to take advantage of the vulnerability.

    Additionally, by reverse-engineering the patch, the underlying issue and its exploitation methods can be discovered.

    Magnet Goblin Hackers Are Capable Enough to Exploit 1-day Vulnerabilities Within a Day, Says Checkpoint

    According to Check Point analysts who have identified Magnet Goblin, these threat actors are known for their swift exploitation of newly disclosed vulnerabilities. In some cases, they exploit flaws within a day of a Proof of Concept (PoC) exploit being released.

    The hackers target various devices and services, including Ivanti Connect Secure (CVE-2024-21887, CVE-2023-46805, CVE-2024-21888, CVE-2024-21893), Apache ActiveMQ, ConnectWise ScreenConnect, Qlik Sense (CVE-2023-41266, CVE-2023-41265, CVE-2023-48365), and Magento (CVE-2022-24086).

    Magnet Goblin leverages these vulnerabilities to infect servers with custom malware, specifically NerbianRAT, MiniNerbian, and a customized version of the WARPWIRE JavaScript stealer.

    Timeline of Magnet Goblin activities

    Timeline of Magnet Goblin activities

    Source: Check Point

    Custom Linux Malware ‘NerbianRAT’ Modus Operandi

    According to the latest report from Check Point, while NerbianRAT for Windows has been known since 2022, Magnet Goblin has been circulating a Linux variant of the malware since May 2022. Despite being sloppily compiled, this Linux variant remains effective.

    Upon initial execution, the malware carries out several preliminary actions. These include collecting system information such as the current time, username, and machine name.

    NerbianRAT generates a unique bot ID, sets a hardcoded IP address as both the primary and secondary host, establishes the working directory, and loads a public RSA key for encrypting network communication using AES.

    Subsequently, NerbianRAT loads its configuration, which specifies the activity times (worktime), time intervals for communication with the command and control (C2) server, and other relevant parameters.

    Configuration parameters

    Configuration parameters

    Source: Check Point

    Upon receiving instructions from the command and control (C2) server, the custom Linux malware is capable of executing various actions on the infected system. These actions, which may be sent in any order, include:

    • Immediate execution of a Linux command
    • Sending the command result to the server, while also cleaning the associated file and terminating any ongoing commands
    • Updating a specific configuration variable
    • Modifying the interval for establishing connections
    • Requesting additional actions from the server
    • Refreshing the command buffer for C2 execution commands
    • Executing a Linux command in a new thread
    • Adjusting and saving worktime settings
    • Returning idle timings, configuration details, or command results
    • Taking no action, remaining idle

    Magnet Goblin Hackers Also Use MiniNerbian, a Mini Version of the NerbianRAT

    MiniNerbian, a streamlined variant of NerbianRAT, focuses on command execution and supports the following actions:

    • Executing commands from the C2 and returning the results
    • Updating the activity schedule, either for the entire day or specific hours
    • Updating the configuration settings
    Similarities Between Codes of NerbianRAT and MiniNerbian

    Similarities Between Codes of NerbianRAT and MiniNerbian

    Source: Check Point

    Unlike the more intricate NerbianRAT, MiniNerbian communicates with the C2 server through HTTP, distinguishing it from the former’s employment of raw TCP sockets for communication.

    It is possible that Magnet Goblin hackers use MiniNerbian as a redundant or stealthier backdoor in certain cases. According to Check Point, identifying specific threats like the attacks carried out by Magnet Goblin amidst the vast amount of 1-day exploitation data can be challenging.

    This allows such hacker groups to camouflage themselves amidst the chaos that often follows the disclosure of vulnerabilities.

    Taking prompt action to apply patches is crucial in countering 1-day exploitation. Furthermore, implementing additional measures like network segmentation, endpoint protection, and multi-factor authentication can help mitigate the potential impact of breaches.

    Trending

    Daily Briefing Newsletter

    Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

    Related Posts