In a recent crimeware report, Kaspersky experts have described AdvancedIPSpyware. It is a backdoored version of legitimate Advanced IP Scanner tool used by network admins to control local area networks (LANs). The malicious tool affected a broad audience with victims in Latin America, Africa, Western Europe, South Asia, Australia as well as CIS countries.
Adding malicious code to benign software in order to hide its harmful activity and trick the user is a technique that has become increasingly common. What hasn’t been seen as often is that the backdoored binary is actually signed. This is precisely the case of AdvancedIPSpyware, which is a backdoored version of legitimate Advanced IP Scanner tool used by network admins to control LANs. The certificate with which the malware was signed was most likely stolen. The malware was hosted on two sites, whose domains are almost identical to the legitimate Advanced IP Scanner website, differing only by one the letter. Furthermore, the websites look the same. The only difference is the “free download” button on the malicious websites.
The legitimate signed binary vs the malicious signed binary
Another uncommon feature of AdvancedIPSpyware is that the architecture is modular. Typically, modular architecture is seen with nation-state sponsored malware, not with the criminal type. However, in this case the attacks were not targeted, that drives at the conclusion that AdvancedIPSpyware does not refer to any politically motivated campaigns.
The AdvancedIPSpyware campaign has a broad victimology with affected users in Latin America, Africa, Western Europe, South Asia, Australia as well as CIS countries. The overall count of victims infected over the whole course of the campaign is about 80.
Besides AdvancedIPSpyware, the crimeware report published on Securelist includes the following findings:
“Email is the most common infection method used by both cybercriminals and nation states. This time we took a look at less common techniques employed by cybercriminals – both well-know and that have been stayed out of sight. Namely, the AdvancedIPSpyware stands out for its unusual architecture, usage of legitimate tool, and almost identical copy of the legitimate website,” – comments Jornt van der Wiel, a security expert at Kaspersky.
To learn more about AdvancedIPSpyware and other crimeware discoveries, read the report onSecurelist.com.
To protect yourself and your business from ransomware attacks, consider following these Kaspersky recommendations: