Skip to content

On a roll in Vegas? Don’t blow it – keep your digital guard up

 

Gamblers and dealers beware; whether in Vegas or Monte Carlo, it’s not strictly your wallet that’s at risk of running on empty.

What do gamblers, casinos, and the FBI have in common? If your answer is money, then try again. The digital age has arrived at brick-and-mortar casinos around the world, bringing with it its own flavor, including malice of a different kind than traditional card counters or chip dumping.

It’s true that casinos are highly regulated and well-protected against fraud of many kinds (often resembling or surpassing the security at hospitals and airports), but these days, it’s cybercriminals who have their eyes set on the grand prize. Casinos bank more than just their guests’ stakes. It’s the sensitive data they keep, such as financial records, personal details, and more, that make up the jackpot nowadays.

With ESET World 2025 taking place in the city of “lost wages” from March 24, 2025, perhaps it’s a good opportunity to raise cyber awareness in an area that might not be so obvious, as, increasingly, it is the data of the city’s guests, rather than the vaults, feed tables, and slot machines, that criminals are interested in.

The table is set

The city of Las Vegas has many nicknames. Also known as the “gambling capital of the world,” the city is known for its lustrous casinos, luxurious hotels, and, of course, games. Within every casino, virtually hundreds of thousands of US dollars get exchanged daily. In 2023, this accounted for a collective $66.5 billion in casino revenue.

Not even George Clooney’s Ocean’s Eleven character, Danny Ocean, would scoff at such an amount, but even he would be shocked at the idea that there is more to a casino than the contents of its vaults.

Beyond the billions is the valuable data of a casino’s clientele, from people searching for lodging to event organizers, or regular, everyday casino-goers. From an even broader perspective, data on business partners (supply chains that provide the machines and security systems), employees, and even the top managers themselves, would be of great interest.

Place your bets

Why is all of this so interesting to threat actors? Let’s start with the sensitive data, like personal information. Anyone who’s ever checked in at a hotel knows the sort of details they have to provide to be given their rooms, such as:

  1. Some form of an ID (state IDs, drivers’ licenses, passports, etc.)
  2. Their name, address, preferences, email
  3. Payment details

On top of that could be other specifics, such as further personal data (companions, dietary restrictions, accessibility requirements) or more. This much granular data can be very valuable on the black market, with stolen personal data from documents such as IDs or passports costing from hundreds to thousands of dollars per document.

Thus, threat actors roll the dice. In 2023, it came to light that the prominent casino chain MGM Resorts was targeted by a cyberattack, with hackers exfiltrating data such as names, contact information, gender, date of birth, IDs, and even Social Security numbers. The attack reportedly cost the chain around $100 million … certainly not chump change.

High rollers have a role

So, who’s responsible for the cybersecurity of the casino’s guests? From one point of view, it is the establishment itself, since, as it is providing a service, it needs to cover any liabilities. This is supported by regulations and guidelines recommending tight security, especially for sensitive data. Just off the top, PCI DSS would cover payment data, while the NIST Cybersecurity Framework would help a casino/hotel of any size to enact appropriate cyber measures.

For casinos in Las Vegas, the Nevada Gaming Commission (NGC) has a clear set of cybersecurity regulations for gaming operators to follow.

Perhaps this also places a bit too much of a burden on these places of entertainment. And, while guests don’t want such thoughts on their minds while hitting the jackpot, the reality is that personal awareness plays a big role when all the chips are down. Otherwise, man-in-the-middle attacks, in which cybercriminals create functional, but fake, Wi-Fi access points (aka “evil twin” networks), can gather sensitive data from victims’ devices.

Don’t bet the farm!

There are threats aplenty in the world of casinos. Scams with fake ads copying a well-known casino’s brand can present promising online gambling opportunities with great welcome bonuses. In fact, some of these scams use unauthorized photos of employees and properties to appear legitimate. What’s more, by pretending to be casino staff, bad actors could try to social engineer their way toward sensitive data, or even gain access to a casino’s systems.

Ace in the hole

What both casino operators and guests have in common is an understanding that stacking the deck in their favor is important. To double down on their security, they should consider:

  • Prevention-first security: Simple antiviruses aren’t enough to protect the myriad devices casinos, hotels, or their guests have. Also, as various IoT vulnerabilities and supply-chain breaches enter the mix, these businesses and consumers must be on a proactive lookout. Businesses should consider investing in a platform such as ESET PROTECT Elite, which can provide all-encompassing protection with vulnerability management and advanced threat defense.
  • Active threat hunting: For those casinos that lack the right IT staff, it would be wise to invest in a managed security service, such as ESET PROTECT MDR Ultimate, which, on top of product security, also adds highly tailored 24/7 protection with experts acting as your wild card against would-be malice, ensuring business continuity.
  • Security audits: This is especially useful for protecting against supply-chain threats. A security audit could highlight weaknesses in casino systems, enabling the defenders to patch them up on time.
  • Zero-trust: Access management methods such as zero-trust can ensure proper controls to mitigate the chances of unverified access. For employees, having a solution capable of Secure Authentication is one way to achieve this.
  • Integrate: Casinos with existing security solutions should consider diversifying their existing security stacks with additional solutions such as Threat Intelligence. Consider that the more details that are available to an operation, the better and faster their decisions could be, saving a business millions in minutes.
  • Mobile Security: Visitors to Vegas are very likely to be on the move. Hopping on and off various networks, trying out new apps, and signing up to promotions for discounts all get safer with a security solution like ESET Mobile Security, which offers protection from viruses, ransomware, and other malware. Prevention First helps you stay safe, evade phishing scams, shop safely, browse, and download files.

Incidentally, advice like this will be discussed at ESET World 2025, at the Aria Resort & Casino in Las Vegas, where experts from all around the globe, from businesses, to analysts, to government actors, will present a path to achieving a secure future. Vegas will be the place to see where progress is protected, and to connect with CISOs, renowned threat hunters, and cybersecurity experts advising CISA, NATO, and Interpol.

Jackpot

There’s no reason not to implement powerful security measures to deter malicious actors from swooping in on one’s turf. This means that casinos, resorts, hotels, and even their guests, should realize that it’s not just everyone’s money they’re after – there are far more compelling reasons to be targeted.

 

ESET’s Ryan Grant Named a CRN® Channel Chief for Third Year in a Row

 

SAN DIEGO, Calif., Feb. 19, 2025ESET, a global leader in cybersecurity, today announced that CRN®, a brand of The Channel Company, has named Ryan Grant, Senior Vice President of Sales and Marketing, to its 2025 CRN® Channel Chiefs list. This list recognizes the executives who are driving strategy, setting the channel agenda for their companies and working tirelessly to ensure mutual success with their partners and customers. 2025 marks the third year in a row that Grant has been named a Channel Chief.

Since joining ESET North America in 2021, Grant has been instrumental to the transformation and success of the company’s channel business. Grant oversees ESET’s U.S. & Canada sales and marketing teams, including enterprise, distribution, managed service provider (MSP), national service provider (NSP), value added reseller (VAR), and retailer segments.  He is also committed to providing more dynamic opportunities for ESET’s channel partners through innovative campaigns and go-to-market programs by working closely with the company’s events, marketing and public relations teams.

“I’m honored to be recognized by CRN alongside so many outstanding leaders from the channel community,” said Grant. “At ESET, we remain committed to empowering our partners with cutting-edge cybersecurity solutions, technical expertise, and tailored support to help them navigate an increasingly complex threat and regulatory landscape. As a channel-first company, we view partner success as our success, so it’s critical that we empower partners with threat intelligence, resources and support that ensures they can quickly capitalize on new market opportunities and deliver exceptional protection to customers.”

The 2025 CRN Channel Chiefs were selected by CRN’s editorial staff based on their proven record of strategic innovation and dedication to the channel community. Under Grant’s direction, ESET has continued to refine its partner program and develop innovative technologies, processes and merchandising strategies. In 2024, the company focused on streamlining order processing, expanding its presence in the cyber risk insurance market and developing a unified API gateway, ESET Connect to empower partners with a catalogue of best-in-class integration partners. ESET also launched AI Advisor, which provides businesses with SOC-level advisory and enabling enhanced security analyst workflows. Unlike other vendor offerings and typical generative AI assistants that focus on soft features like administration or device management, ESET AI Advisor seamlessly integrates into the day-to-day operations of security analysts. This is a gamechanger for companies with limited IT resources who want to utilize the advantages of advanced XDR solutions and threat intelligence feeds.

Grant added, “As cyber threats grow more advanced and adversaries exploit generative AI, it’s crucial for our channel partners to adopt a robust security portfolio that reduces risk for their business customers. ESET stands out with a prevention-first strategy, leveraging AI and human expertise—backed by a world-class R&D team and industry-renowned researchers.”

“This year’s honorees exemplify dedication, innovation, and leadership that supports solution provider success and fosters growth across the channel,” said Jennifer Follett, VP, U.S. Content, and Executive Editor, CRN, at The Channel Company. “Each of these exceptional leaders has made a lasting channel impact by championing partnerships and designing creative strategies that get results. They’ve set a high bar in the channel, and we’re thrilled to recognize their standout achievements.”

CRN’s 2025 Channel Chiefs list is featured in the February 2025 print issue of CRN® Magazine and online at www.CRN.com/ChannelChiefs.

To learn more about ESET’s partner program, visit https://www.eset.com/us/partnernow/.

ESET Corporate Solutions brings new CCSO leadership

 

Bratislava – February 4, 2025 ESET, a global leader in cybersecurity, today announces its new chief corporate solutions officer (CCSO), Martin Talian, whose mandate is to drive growth in delivering bespoke ESET solutions and customer success.

Mr. Talian moves from his position as VP of corporate solutions at ESET, bringing 18 years of leadership experience across diverse industry verticals to his new role. With an enduring focus on delivering value to large organizations and leadership roles with utilities, large infrastructure companies, telecommunications, digitalization, banking, and now cybersecurity, Mr. Talian is well-positioned to accelerate growth in the ESET Corporate Solutions Division.

With globally relevant expertise and demonstrable project completion, Martin Talian is set to draw from the expansive ESET portfolio of technologies, products, and services. Utilizing his rich experiences, he is poised both to create and to deliver new custom security offerings.

“Martin has been a key engine for both success and growth in the Corporate Solutions Division at ESET since its launch in 2022. He brings a passion to closing deals and delivering value to high-touch customers, and his aptitude aligns with our need both to showcase our talents and to scale our offerings. I look forward to the continued success and the fresh perspective our new C-Level manager will bring to ESET,” said Richard Marko, chief executive officer at ESET.
With large deals closing in connection with ESET NetProtect in both the EU and the Asia Pacific region, Talian’s leadership has already been recognized. These successes reflect his achievements in building and managing Solution Delivery teams, his oversight of critical sales team maturation and management processes, and his command of both the go-to-market strategy and accounts management protocols needed to succeed globally, including in North America, Latin America the Middle East and Africa.

“I am grateful for the opportunity to lead this unique team, one that I had a direct hand in building, and one which can support the wider organization in its bid to raise the prominence of ESET globally,” said Talian.

Martin Talian joins ESET’s other C-Level business leaders: CEO Richard Marko, CBO Pavol Balaj, CMO Mária Trnková, and CSO Miroslav Mikuš.

 

 

ESET Launches New Series of Speakeasy Security, a Tech and Cybersecurity Podcast

 

Tony Anscombe, ESET Chief Evangelist Adds Kirsten Bay, Cysurance CEO as Co-Host

SAN DIEGO, Calif., January 28, 2024ESET, a global leader in cybersecurity and threat detection, today announced a new series of its cybersecurity podcast, Speakeasy Security. As part of a 10-episode series, Speakeasy Security will be co-hosted by ESET Chief Security Evangelist Tony Anscombe and Co-Founder and CEO of Cysurance Kirsten Bay – providing lively commentary on the latest tech, privacy and cybersecurity headlines and offering listeners tips to protect themselves from cybercriminals.

Available on a range of popular podcast platforms, including Apple Podcasts, Spotify, Amazon Music, Podcast Index, iHeart Radio, Pocket Casts, Deezer, Podcast Addict, Listen Notes and Podchaser, the first episode will air on “Trust in Technology—AI and Driverless Cars” where Anscombe and Bay discuss the public’s embrace and skepticism towards the technology.

“I’m excited to have Kirsten join me at Speakeasy Security – delivering a fresh perspective from her years working to help consumers, SMBs and enterprises manage cybersecurity risk,” said Tony Anscombe. “Each episode, Kirsten and I will explore how new technologies and AI advancements are impacting our personal and professional lives, and the cybersecurity and privacy implications. We will aim to make complex tech issues understandable and enjoyable, while offering practical tips and advice for both businesses and consumers.”

Bay, Co-Founder and CEO of Cysurance, is a sought-after public speaker and respected leader in the cyber insurance industry. She brings 25 years of expertise in financial services, risk intelligence and cybersecurity to the podcast in her role as co-host. Anscombe is a 30-plus year security industry expert and established author, blogger and speaker on new policies, regulations and the cybersecurity threat landscape. Speakeasy Security will also continue to feature ESET’s leading researchers and threat detection experts, as well as recognized cybersecurity influencers and guests from across the tech universe.

“I am thrilled to join Speakeasy Security as a co-host and to explore how new technologies, smart devices and privacy-focused legislations will impact society and everyday users,” said Kirsten Bay, Co-Founder and CEO of Cysurance. “My goal with Tony is to offer thought-provoking insights and practical advice to help our audience navigate and stay secure in an ever-evolving digital landscape.”

Speakeasy Security adds to ESET’s body of original content, which includes its award-winning blog WeLiveSecurity. Featuring commentary from ESET’s global security researchers, WeLiveSecurity offers in-depth knowledge of the latest threats and security trends, views and insights, video tutorials and advice for everyday internet users on how to secure data effectively. Follow the blog on Twitter at @welivesecurity and follow Anscombe at @TonyAtESET and Bay at @cyberkbay.

For more information on Speakeasy Security, visit https://www.eset.com/us/about/newsroom/podcast-list/

Dangerous liaisons in cybersecurity: Attackers improve their phishing methods

 

The latest ESET APT Activity Report shows improved phishing techniques that threat actors currently utilize, highlighting the need for high-quality cybersecurity awareness training.

A general recommendation about phishing attacks is not to click on anything that looks suspicious. That’s easy to follow when employees receive an email full of grammatical errors and typos from an unknown source.

However, adversaries have been improving their tactics and experimenting with new ways to make their potential victims fall for phishing — tactics that may not be so easy to spot. And it’s not only about using AI to create grammatically correct or more convincing emails. Recently, ESET researchers noticed a new trend among North Korea-aligned groups trying to build relationships with their targets before sending them malicious content.

Statistically speaking, since human error is involved in most data breaches, it is logical that threat actors don’t hesitate to leverage this major attack vector. To address this, ESET created ESET Cybersecurity Awareness Training, a story-driven course available in English, French, Spanish, and Chinese languages informing employees about current cyber threats and helping businesses with compliance and insurance issues.

A costly mistake

Verizon’s 2024 Data Breach Investigations Report shows that 68% of breaches involved a non-malicious human element, like a person falling victim to a social engineering attack or making an error.

Most of those attacks started with phishing (tricking a user into giving sensitive information or downloading malicious content) and pretexting (use of a fabricated story, or pretext, to gain a victim’s trust) via email, accounting for 73% of breaches.

In 2024, the number of detected breaches involving pretexting surpassed the number of breaches involving traditional phishing attacks, according to Verizon’s data. This could be one indicator that threat actors feel the need to use more sophisticated techniques against their targets, according to the report.

Breaches involving a human element are not only prevalent but also costly, according to IBM’s Cost of a Data Breach Report 2024 conducted by Ponemon Institute. Ponemon’s researchers looked at 604 organizations in 16 countries and regions, finding that an average business loss due to phishing has now reached USD4.88 million per breach. This makes phishing attacks the second costliest type of attack, right after impacts from malicious insiders, which account for an average of USD4.99 million.

I have a proposal for you

Recent ESET findings confirm this trend of threat actors utilizing improved social engineering techniques.

In Q2 2024–Q3 2024, ESET researchers saw the North Korea-aligned activity cluster Deceptive Development and North Korea-aligned group Kimsuky enhancing their phishing attacks with pretexting methods. For example, both tried to use fake job offers to approach the targeted individuals, and only after the victim responded and a relationship was established did threat actors send a malicious package to the victim.

Another group, Lazarus, distributed fake job offers for desirable positions at large companies like Airbus or BAE Systems and delivered trojanized PDF viewers along with decoy PDF documents. This group also impersonated recruiters on professional networks and work platforms, distributing trojanized codebases under the guise of job assignments and hiring challenges with the aim of cryptocurrency theft.

Kimsuky targeted North Korea experts working for NGOs and researchers in academic circles with fake requests to grant a media interview or give a presentation. They tried to establish a relationship with a good old apple-polishing ― sending amiable emails that praised the target’s expertise and asked for help. Once the attackers gained the trust of their victim, Kimsuky delivered a malicious package, usually disguised as a list of questions that should be answered before the event.

The BlackBasta ransomware gang also adopted this relationship-oriented method when targeting businesses, according to the recent discovery of the ReliaQuest threat research team.

First, they send mass email spam targeting employees, provoking them to create a legitimate help-desk ticket to resolve the issue. Then, attackers posing as IT support or help desk staff contact employees via Microsoft Teams chat and send them a malicious QR code, likely for downloading a remote monitoring and management (RMM) tool that BlackBasta can exploit.

How to avoid a toxic relationship

Seeing the above-mentioned cases, it is clear that employees are a critical component of any business’s security that needs to be taken care of. In general, cybersecurity awareness training not only helps businesses to deflect user-oriented cyberattacks and fulfill compliance/insurance requirements but also decreases losses in case of a successful breach by around 5.2%.

ESET acknowledges this threat vector with the global launch of ESET Cybersecurity Awareness Training, which complements ESET PROTECT, a multilayered AI-powered solution for businesses.

Both employee training and multilayered security are integral parts of what ESET calls a prevention-first approach designed to completely evade cyber threats or mitigate them with no or only minimal disruptions in the business flow. It is a complex strategy of shrinking the attack surface while effectively reducing the complexity of cyber defense.

ESET Cybersecurity Awareness Training aims for both of these goals. First, it helps employees to recognize standard and novel cybersecurity threats abusing human factors. Second, it is easy to deploy and operate thanks to deep integration possibilities with various systems, a customizable training portal, and an easy-to-use dashboard. Thus, businesses don’t need to spend more precious IT staff time on it than necessary.

Let’s make it interesting!

ESET Cybersecurity Awareness Training offers an engaging and story-driven experience that helps employees understand which common bad user habits of can endanger the whole company. It also explains how threat actors think — for example, how they search potential victims’ social network profiles to guess their passwords or impersonate them.

The training is based on three decades of ESET expertise in this area and is designed to change employee behavior, rather than merely to check a box for compliance or cyber insurance.

To keep employees vigilant in the long term, ESET Cybersecurity Awareness Training comes with phishing test simulations that businesses can run an unlimited number of times.

Benefits of Premium Cybersecurity Awareness Training

  • Comprehensive online cybersecurity awareness training courses
  • Multiple course options ranging from full 90-minute-long training to short courses taking from 5 to 15 minutes
  • Best practices for remote employees
  • Gamification that engages and changes behavior
  • Helps meet HIPAA, PCI, SOX, GDPR, CCPA compliance requirements
  • Helps meet cyber insurance requirements
  • Certification & LinkedIn badge
  • Unlimited phishing test simulations to test employees
  • Admin console allowing users to manage customizable groups of employees, track learners’ status, and run phishing simulation campaigns
  • School platform where employees can take their enrolled training
  • Automatic email reminders to learners
  • Deep integration with various popular third-party cloud-based services

Fruitful relationship with ESET

Even the best and most expensive cybersecurity solution in the world can be powerless against one fooled employee who shares their password or downloads a malicious file.

Help your employees to navigate through a maze of the evolving world of cyber threats and improve your defenses with ESET Cybersecurity Awareness Training.

 

Why AV-Comparatives named ESET HOME Security Essential its Product of the Year and what it means for home users

 

ESET HOME Security Essential delivers not only outstanding protection of digital life, but also is recognized as the perfect blend of simplicity, advanced customization for tech-savvy users, and low impact on device performance. 

What makes software perfect? Be it an email service, a video editor, a shopping app, or even a video game… First and foremost, it should be outstanding in doing what it is designed to do, right? That’s true, but not the whole story.

On 20 February, ESET was honored with AV-Comparatives’ Product of the Year 2024 Award for ESET HOME Security Essential at AV-Comparatives’ Awards Ceremony. This award is a result of more than 30 years of ESET experience and its efforts to deliver the best cyber protection for home users.

What makes the AV-Comparatives award particularly intriguing is the reviewers’ broad focus on multiple aspects of the assessed cybersecurity solutions. Leaving no stone unturned, they checked anti-malware capabilities, performance, overall user experience, and support across a series of tests in 2024.

Let’s take a look at how ESET HOME Security protects users against both laboratory and real-life scenarios, how it affects the protected device, and why it is so user-friendly.

 

Prevention trumps apprehension

ESET HOME Security Essential excelled across several protection tests, including AV-Comparatives’ Real-World Protection Test, Malware Protection Test, and Advanced Threat Protection Test. What does this mean for users? It proves that ESET can protect them from hundreds of thousands of threats trying to compromise their devices from a variety of entry points.

See for yourself:

Real-World Protection Test – This test aims to simulate real-world conditions users experience every day while browsing the Internet. Antivirus products are tested against hundreds of malicious URLs. Testers also note any required human interactions, i.e. blocking/allowing detected samples to execute.

Malware Protection Test – While in the Real-World Protection Test the gateway to a tested device is the web, in the Malware Protection Test the vectors can be, for example, network drives or USBs – or they cover scenarios in which the malware is already on the disk.

Advanced Threat Protection (ATP) Test – Also known as the Enhanced Real-World Test, this examination uses penetration techniques that allow attackers to target specific external computer systems, and it evaluates how well security products protect against such attacks. This test also evaluates protection against targeted advanced threats such as exploits and fileless attacks.

The Advanced Threat Protection Test also acknowledges the ESET prevention-first approach, where our technology is configured to stop attacks before they happen. To that end, half of the blocked malware samples (7 of 15) were stopped in their pre-execution phase, i.e. before the threat had run and was still inactive on the system.

This protection is not theoretical. ESET detection engines have discovered and stopped many advanced threats such as Lumma Stealer. Sold on the dark web, this infostealer malware mostly targets cryptocurrency wallets, user credentials, and two-factor authentication browser extensions. It also tries to exfiltrate other data from compromised machines and can spread in multiple ways, including cracked installations of popular open-source and paid apps such as ChatGPT or Vegas Pro.

 

Great performance

The real magic behind this “product of the year” is not only making it effective, but ensuring those capabilities don’t significantly slow down the protected device or overwhelm users with false alarms.

Creating security capable of catching malware at every step of its deployment process is one thing (and there can be hundreds of those steps), but it takes a number of real experts to finetune it to effectively block malware without impacting the processes of legitimate software or triggering false alarms. To ensure that the products tested didn’t suffer from these issues, AV-Comparatives’ reviewers also checked for false positives while  products are in their default settings. “False positives can cause as much trouble as a real infection” reads the AV-Comparatives summary report.

ESET HOME Security Essential won the silver medal in the False Positives category as testers detected altogether only 15 false positives during all tests run in 2024. To compare, some other tested solutions produced around 30 false positives in a single test.

On top of that, ESET was also awarded for low system-impact while testers performed usual user procedures such as file copying, installing applications, or browsing websites.

AV-Comparatives’ awards for ESET HOME Security Essential

• Product of the Year 2024, having received the highest Advanced+ Award in all seven tests this year

• Gold Award for the Advanced Threat Protection Test

• Silver Award for Low False Positives

• Bronze Award for the Real-World Protection Test

• Bronze Award for Performance Test

User experience

When considering what the best software should look like, the critical part is user experience. And what did AV-Comparatives have to say about ESET HOME Security Essential?

“Reviewers were impressed by the clean, intuitive user interface designed for non-expert users, as well as extensive customization and scan options available for power users.”

They describe ESET HOME Security Essential as a well-designed and easy-to-use security product providing safe default settings and a clean, intuitive interface for non-expert users, where essential features like “help” and access-control are easily accessible. For power users, the settings dialog has plenty of advanced options, including excellent access-control.

In this way, ESET HOME Security Essential can perfectly serve both average Joes and tech-savvy home admins.

Learn more about ESET HOME Security solutions here.

The Product of the Year

So, what makes a software perfect? Perfect software seamlessly combines functionality, usability, and reliability. It addresses user needs effectively, providing intuitive and user-friendly interfaces that enhance the overall experience.

Having a cyber security solution with all these attributes is especially important when we are talking about protecting your data, identity, and finances. ESET HOME Security Essential is all-in-one protection for your digital life, and ESET is proud to say that it has triumphed as AV-Comparatives´ 2024 Product of the Year.

 

This real-life example shows why your Android should not connect to Wi-Fi automatically

The world of smartphones is full of automation and requires reputable Android protection.

Most smartphone users probably know that connecting to any random Wi-Fi hotspot available is not the best idea. But sometimes, an Android device can autonomously connect to a malicious Wi-Fi network without your awareness.

Imagine that you are at your favorite restaurant, your order is complete, and now you want to check your smartphone before the meal comes. However, without your knowledge, someone else is already monitoring everything you do on your device, including the websites you browse, the applications you use, and the credentials you enter.

An attack like this is possible. For example, if ESET malware researcher Lukáš Štefanko used his Cheap Yellow Display (CYD) tool running Evil M5 firmware for malicious purposes. Luckily, acting as an ethical pen tester, he just published a video showing how easy it can be to obtain Wi-Fi networks that smartphones want to reconnect to automatically. With this information, he could create a fake Wi-Fi access point, or an “evil twin” network, to gather sensitive data from a victim’s device.

Let’s dive a little deeper into these kinds of attacks, and what lessons we can learn from them.

 

Dangers of comfort zones

When creating software, developers always think about usability, user comfort, and user experience. So, it’s only natural that smartphones have an incorporated function to reconnect automatically to previously used and trusted networks.

However, cybercriminals love to exploit situations in which users feel safe and enjoy ever-present automation. The attack displayed by Lukáš Štefanko does the same — this technique preys on the fact that Android smartphones constantly and transparently tell nearby devices which Wi-Fi networks they have connected to, and want to reconnect to, automatically.

Luckily, attacks that require the malicious actor to be physically present at the location aren’t common, but that doesn’t mean that they can’t happen. For example, Australia’s Federal Police (AFP) charged one of its citizens over an alleged evil twin attack on multiple domestic flights and airports in June 2024. His seized devices allegedly contained dozens of stolen personal credentials.

Other times, it can be a state-sponsored operation such as the plot of a UK-based spy ring, as described by a prosecutor during a recent trial. The spy ring, among other things, also operated in Germany, where its members allegedly used an International Mobile Subscriber Identity Catcher or IMSI catcher to intercept mobile phone traffic from a military base where Ukrainian soldiers were training.

 

Other threats

As you can see, connecting and reconnecting to publicly available Wi-Fi networks can pose a danger. And the list of possible threats doesn’t end with rogue hotspots:

Man-In-The-Middle (MITM) attack — In such attacks, cybercriminals intercept communications between a device and the Wi-Fi network, allowing them to access sensitive unencrypted information like passwords, credit card numbers, and personal messages.

Exploitation of vulnerabilities — Cybercriminals can exploit vulnerabilities in less-secure public networks, or vulnerabilities of a targeted mobile device (especially if it doesn’t have updated software), to distribute malware to connected devices. This malware can then be used to steal data, monitor users’ activities, or even take control of users’ devices.

Packet Sniffing — Public Wi-Fi networks often lack proper encryption, making it easier for hackers to eavesdrop on users’ online activities.

How to stay safe

Obviously, the basic security recommendation for Wi-Fi users is to disable automatic connections to Wi-Fi networks, and not use free publicly accessible Wi-Fi networks at all. If this is not possible for any reason, here are a few more tips:

Use a Virtual Private Network (VPN) —VPN creates a secure and encrypted connection between a user’s device and the internet.

Do not share sensitive data — Avoid websites and applications requesting sensitive information such as online banking or shopping sites while on public Wi-Fi.

Stay on top of updates — Keep your software and apps updated. Regular updates often include security patches that protect against known vulnerabilities.

ESET Mobile Security

When it comes to cybersecurity, ESET goes far beyond just simple antivirus — and this also applies to smartphones and mobile devices. ESET Mobile Security is built around the ESET prevention-first approach, stopping attacks before they can do any harm. This goal can be met by securing cybercriminals’ most common points of entry to devices while keeping the security solution simple to use.

ESET Mobile Security is well-prepared for attacks coming from malicious websites, thanks to multilayered protection against phishing, smishing, and scams. For example, Anti-Phishing enhanced by Link Scanner protects users against malicious websites, and Payment Protection delivers a new layer of security for sensitive payment and financial applications.

And the best part? The premium version of ESET Mobile Security utilizing all these features and more is 50% off between March 3 and March 9, 2025!

Enjoy technology with peace of mind

Most would agree that people love comfort, and, in fact, the entire technology industry is driven by users pursuing faster, easier, and more user-friendly solutions for their daily activities. And there is nothing bad about living in the lap of technological luxury; but don’t ignore the threats out there.

Luckily, with a pinch of cybersecurity awareness and a reputable security solution installed on your Android smartphone, you should be fine. Wi-Fi network attacks are well-known, and acclaimed cybersecurity companies such as ESET taking advantage of more than 30 years of experience have you covered.

 

North Korea-aligned DeceptiveDevelopment targets freelance developers with infostealers, ESET Research discovers

  • DeceptiveDevelopment targets freelance software developers through spearphishing on job-hunting and freelancing sites, aiming to steal cryptocurrency wallets and login information from browsers and password managers.
  • This operation primarily uses two malware families – BeaverTail (infostealer, downloader) and InvisibleFerret (infostealer, Remote Access Trojan – RAT).
  • DeceptiveDevelopment’s techniques are similar to several other known North Korea-aligned operations.

PRAGUE, BRATISLAVAFebruary 20, 2025 — Since 2024, ESET researchers have observed a series of malicious North Korea-aligned activities, where the operators, posing as software development  recruiters, entice the victims with fake employment offers. Subsequently, they try to serve their targets with software projects that conceal infostealing malware. ESET Research calls this activity cluster DeceptiveDevelopment. This North Korea-aligned activity is currently not attributed by ESET to any known threat actor. It targets freelance software developers through spearphishing on job-hunting and freelancing sites, aiming to steal cryptocurrency wallets and login information from browsers and password managers.

“As part of a fake job interview process, the DeceptiveDevelopment operators ask their targets to take a coding test, such as adding a feature to an existing project, with the files necessary for the task usually hosted on private repositories on GitHub or other similar platforms. Unfortunately for the eager work candidate, these files are trojanized: Once they download and execute the project, the victim’s computer gets compromised,” explains ESET researcher Matěj Havránek, who made the discovery and analyzed DeceptiveDevelopment.

DeceptiveDevelopment’s tactics, techniques, and procedures are similar to several other known North Korea-aligned operations. Operators behind DeceptiveDevelopment target software developers on Windows, Linux, and macOS. They steal cryptocurrency primarily for financial gain, with a possible secondary objective of cyberespionage. To approach their targets, these operators use fake recruiter profiles on social media. The attackers don’t distinguish based on geographical location, instead aiming to compromise as many victims as possible to increase the likelihood of successfully extracting funds and information.

DeceptiveDevelopment primarily uses two malware families as part of its activities, delivered in two stages. In the first stage, BeaverTail (infostealer, downloader) acts as a simple login stealer, extracting browser databases containing saved logins, and as a downloader for the second stage, InvisibleFerret (infostealer, RAT), which includes spyware and backdoor components, and is also capable of downloading the legitimate AnyDesk remote management and monitoring software for post-compromise activities.

In order to pose as recruiters, the attackers copy profiles of existing people or even construct new personas. They then either directly approach their potential victims on job-hunting and freelancing platforms, or post fake job listings there. While some of these profiles are set up by the attackers themselves, others are potentially compromised profiles of real people on the platform, modified by the attackers.

Some of the platforms where these interactions occur are generic job-hunting ones, while others focus primarily on cryptocurrency and blockchain projects and are thus more in line with the attackers’ goals. The platforms include LinkedIn, Upwork, Freelancer.com, We Work Remotely, Moonlight, and Crypto Jobs List.

Victims receive the project files either directly via file transfer on the site, or through a link to a repository like GitHub, GitLab, or Bitbucket. They are asked to download the files, add features or fix bugs, and report back to the recruiter. Additionally, they are instructed to build and execute the project in order to test it, which is where the initial compromise happens. The attackers often use a clever trick to hide their malicious code: They place it in an otherwise benign component of the project, usually within backend code unrelated to the task given to the developer, where they append it as a single line behind a long comment. This way, it is moved off-screen and stays mostly hidden.

“The DeceptiveDevelopment cluster is an addition to an already large collection of money-making schemes employed by North Korea-aligned actors and conforms to an ongoing trend of shifting focus from traditional money to cryptocurrencies,” concludes Havránek.

For a more detailed analysis and technical breakdown of DeceptiveDevelopment, check out the latest ESET Research blogpost, “DeceptiveDevelopment targets freelance developers,” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

Heatmap of different victims of DeceptiveDevelopment

 

ESET Announces Participation Among Knowledgeable Respondents in Report on Threat Intelligence

  • ESET has been included among knowledgeable respondents in an independent Best Practice report: How To Measure The Effectiveness And Value Of Threat Intelligence.
  • ESET Threat Intelligence (ETI) offerings are ideally suited to meet the needs described in the report of the CART model.

BRATISLAVAFebruary 26, 2025ESET, a global leader in cybersecurity solutions, is proud to announce its participation among knowledgeable respondents whom Forrester surveyed in its Best Practice report: How To Measure The Effectiveness And Value Of Threat Intelligence. Forrester, a respected research firm, highlighted the essential characteristics of credible threat intelligence, summarized in the CART model: Complete, Accurate, Relevant, and Timely. ESET Threat Intelligence offerings align closely with these principles, empowering organizations to strengthen their security posture and stay ahead of advanced threats.

“For us, our inclusion in Forrester’s report reinforces our commitment to delivering actionable, high-quality threat intelligence that meets the evolving needs of today’s organizations,” said Juraj Knapec, Product Manager for ESET Threat Intelligence. “By focusing on clarity, accuracy, and timeliness, we enable our clients to make critical decisions faster, reduce exposure, and bolster their defenses against advanced threat actors.”

Forrester’s CART framework underscores the needs for threat intelligence that is:

  • Complete: Covering a wide range of sources and threat vectors.
  • Accurate: Offering curated and verified insights from practical experience.
  • Relevant: Delivering tailored, actionable information that aligns with organizational needs.
  • Timely: Enabling proactive decisions by anticipating emerging threats.

ESET Threat Intelligence solutions were designed with these principles in mind. By prioritizing quantitative metrics and providing clarity in threat analysis, ESET ensures its clients receive reliable, actionable data to help mitigate risks effectively.

The report also highlights a critical challenge. Many security and risk professionals struggle to measure the value and effectiveness of their threat intelligence, leading to wasted resources and missed opportunities. Forrester emphasizes the importance of using robust quantitative and qualitative metrics to demonstrate the impact of threat intelligence within an organization, which ESET addresses by providing clear threat intelligence metrics to simplify decision-making, as well as quantitative insights that showcase measurable value and drive strategic outcomes.

As further stated in Forrester´s Best Practice report: How To Measure The Effectiveness And Value Of Threat Intelligence: “Metrics are essential for you to demonstrate the effectiveness of threat intelligence, but resist the temptation to rely solely on consumption-based metrics… more does not necessarily mean better. The right target value for a given metric is unique to each organization’s cybersecurity maturity and risk profile.” Built on the robust CART framework, ETI allows us to customize each threat intelligence solution to meet the unique needs of our clients, ensuring they receive the most targeted and relevant information.

ESET Threat Intelligence provides real-time data on malicious files, domains, IPs, URLs, botnets, and APT activity to help organizations act swiftly. Its Advanced Persistent Threat (APT) Reports offer in-depth analyses of advanced threats, with the PREMIUM packages including direct analyst consultations. Curated, actionable insights enhance detection and response, while seamless SIEM and TIP integration maximizes efficiency. With these offerings, ESET empowers clients to automate threat searches, stay ahead of emerging risks, and reduce incident response times, ultimately strengthening their cybersecurity architecture.

For more information about ESET Threat Intelligence, please visit our website.

 

ESET研究人員分析了Linux系統上的首個UEFI惡意引導程式

過去幾年,UEFI 防病毒領域發生了顯著的變化,其中尤以 UEFI 惡意引導程式的進化最為突出。此類惡意程式最早可追溯至 2012 年,當時 Andrea Allievi 提出了首個 UEFI 惡意引導程式的概念驗證(PoC),開創了在現代 Windows 系統上部署 UEFI 惡意引導程式的先河。此後,許多其他概念驗證(例如 EfiGuard、Boot Backdoor、UEFI 惡意引導程式)陸續出現。然而,真正意義上的 UEFI 惡意引導程式在現實世界中浮現,卻是多年以後的事(可參考 2021 年 ESET 關於 ESPecter 的部落格文章,以及同年卡巴斯基關於 FinSpy 惡意引導程式的部落格文章)。又過了兩年,臭名昭著的 BlackLotus(首款能夠在最新系統上繞過 UEFI 安全引導機制的 UEFI 惡意引導程式)才正式現身。

上述已公開的惡意引導程式有一個共同點,即僅對 Windows 系統有效。然而,今天我們率先公布一項最新發現:首款專為 Linux 系統設計的 UEFI 惡意引導程式已經問世,其開發者將其命名為 Bootkitty。我們認為,該惡意引導程式僅是一個初步的概念驗證。根據我司遙測系統的回饋,它尚未在現實世界中被部署。然而,它的出現傳遞了一個重要訊息:UEFI 惡意引導程式已不再局限於 Windows 系統。

此惡意引導程式的主要目的是禁用內核的簽名驗證功能,並通過 Linux 的 init 進程(即系統啟動期間由 Linux 核心執行的第一個進程)預加載兩個目前尚未知的 ELF 二進制檔案。在分析過程中,我們發現了一個可能與此有關的未簽名內核模組–有跡象表明,它可能是由同一群引導程式的開發者編寫的。該模組部署了一個 ELF 二進制檔案,負責載入我們在分析時尚未識別的另一個內核模組。

本文要點:

  • 2024年11月,一個不為人知的UEFI應用程式 bootkit.efi 被上傳到 VirusTotal。
  • 經初步分析後,我們確認這是一款名為 Bootkitty 的UEFI惡意引導程式。令人驚訝的是,這是首款針對 Linux,尤其是某些 Ubuntu 版本的UEFI惡意引導程式。
  • Bootkitty 使用自簽名憑證進行簽名,因此除非攻擊者的憑證已被安裝,否則無法在啟用了UEFI安全啟動的系統上運行。
  • Bootkitty 的目的是無縫引導 Linux 核心,無論系統是否啟用了UEFI安全啟動,因為它會在 GRUB 執行之前,修改記憶體中不具防篡改驗證功能的關鍵數據。
  • bootkit.efi 包含多個工件,這表明它更像是一個概念驗證(Proof of Concept),而非威脅行為者的實際工具。
  • 我們還發現可能與其相關的一個核心模組,並將其命名為 BCDropper。該模組會部署一個ELF程式,該程式負責加載另一個核心模組。

Bootkitty 概況
正如前文所述,Bootkitty 包含多個工件。這表明我們正在處理的是一個概念驗證(Proof of Concept),而非現實世界中活躍的惡意程式。在本節中,我們將深入探討這些工件,揭示該惡意引導程式的基本情況。

Bootkitty 包含兩個未使用的函數,能夠在執行過程中將特定字符串顯示於螢幕上。第一個函數的輸出如圖1所示,它可以打印ASCII圖像。我們認為該圖像代表引導工具包的名稱:Bootkitty。

圖1. 惡意引導程式中內建的ASCII圖像

第二個函數可以打印文字,如圖2所示。該文字中疑似包含引導程式的開發者名單,以及開發過程中可能的參與者名單。
圖片中提到的一個姓名可以在 GitHub 上找到,但其個人資料中並未提及任何與UEFI引導程式開發項目相關的公共資源庫。因此,我們無法確認或否認惡意引導程式中提及姓名的真實性。

圖2. 惡意引導程式中內建的人員名單(已編輯)

每次開機時,Bootkitty 都會在螢幕上打印如圖3所示的字符串。

圖3. Bootkitty 的歡迎辭

請注意,下文的「可加載核心模組」一節中也提到了 BlackCat。儘管名稱相同,但我們認為它與 ALPHV/BlackCat 勒索病毒團夥沒有任何關聯。這是因為 BlackCat 僅僅是研究人員使用的一個名稱,而 Bootkitty 是以 C 語言開發的;而同名團伙自稱 ALPHV,並且僅使用 Rust 開發惡意程式。

如前文所述,Bootkitty 目前支持的系統數量有限。其原因在於,為了在記憶體中找到需要修改的函數,該引導程式採用了硬編碼的字節模式。雖然字節模式匹配是引導程式的常用手法,但其作者並未使用可以覆蓋多種內核或 GRUB 版本的最佳模式;因此,該引導程式僅能在有限的配置環境下實現完整功能。
對該惡意引導程式的應用構成更大限制的是其給解壓後的 Linux 核心打補丁的方式:在內核映像解壓後,Bootkitty 只是簡單地將惡意補丁複製到內核映像中硬編碼的偏移量位置,如圖4所示。

圖4. Bootkitty 中負責在解壓縮內核執行前篡改其記憶體數據的代碼

我們將在下文的「Linux 核心映像解壓縮掛鉤」一節中,解釋該惡意引導程式如何實際篡改內核數據。現在請注意,由於圖4所示函數中缺少內核版本檢查,Bootkitty 可能會在這些硬編碼偏移量處,對完全隨機的代碼或數據進行篡改,從而導致系統崩潰,而無法成功入侵或掌控系統。這是支持其為概念驗證(Proof of Concept)的事實之一。

另一方面,這可能是由不法分子開發的惡意程式的初始版本,而非已準備好投入使用的生產版本。

最後需要說明的是,該惡意引導程式的二進制文件附帶了一個自簽名憑證,如圖5所示。

圖5. 惡意引導程式附帶的自簽名憑證

技術分析
從 Bootkitty 的執行步驟開始,如圖6所示。以下將簡要介紹其主要功能,並在後續部分進行更詳細的分析。

主要關注以下三個部分:
1. 惡意引導程式的執行及其對正規 GRUB 啟動加載器的篡改(圖6中第4點和第5點)
2. 篡改 Linux 核心的 EFI stub loader(圖6中第6點和第7點)
3. 篡改解壓後的 Linux 核心映像(圖6中第8點和第9點)

圖6. Bootkitty 執行步驟

初始化並與 GRUB 掛鉤
Bootkitty 由 shim 執行後,首先會檢查 SecureBoot 的 UEFI 變量值,以確定 UEFI 安全啟動機制是否已啟用。如果已啟用,它會繼續從 UEFI 認證協議中掛鉤兩個函數(此過程如圖7所示):

  • EFI_SECURITY2_ARCH_PROTOCOL.FileAuthentication:此函數被固件用於測量和驗證 UEFI PE 映像的完整性。Bootkitty 通過掛鉤函數篡改了此函數的輸出,使其始終返回 EFI_SUCCESS,即驗證成功。
  • EFI_SECURITY_ARCH_PROTOCOL.FileAuthenticationState:此函數被固件用於執行平台專用策略,以響應不同的身份驗證狀態值。同樣,惡意引導程式通過掛鉤篡改該函數,使其始終返回 EFI_SUCCESS,從而使固件可以使用該文件,而不考慮實際的身份驗證狀態。

 

圖7. 與 UEFI 安全認證協議掛鉤

加載 GRUB 並掛鉤內存代碼
檢查完 UEFI 安全啟動狀態後,Bootkitty 會通過 EFI 系統分區的硬編碼路徑 /EFI/ubuntu/grubx64-real.efi 加載官方 GRUB。該文件應是由攻擊者創建的 GRUB 官方文件的備份。在 GRUB 被加載後(尚未執行),惡意引導程式開始在 GRUB 的內存中篡改並掛鉤以下代碼:

  • Peimage GRUB 模組中的 start_image 函數

    – 此函數負責啟動已加載的 PE 映像,GRUB 使用它來啟動 Linux 核心的 EFI stub 二進制文件(如 vmlinuz.efi 或 vmlinuz)。

    – 掛鉤函數利用了在掛鉤執行時 vmlinuz 已載入內存但尚未執行的空檔,篡改了 vmlinuz 中負責解壓縮 Linux 實際內核映像的函數。

    – 根據分析,我們認為這裡被篡改的函數應該是 zstd_decompress_dctx,儘管由於 Linux 核心的特定編譯方式,確切名稱可能難以確定。詳情請參閱下文的「Linux 核心映像解壓縮掛鉤」一節。

  • shim_lock_verifier_init 函數

     

    – 此函數是 GRUB 內部 shim_lock 驗證機制的一部分,在啟用了 UEFI 安全啟動的狀態下會自動激活。

    – 該函數負責決定引導過程中是否需要驗證現有文件(如 GRUB 模組、Linux 核心、配置文件等)。

    – 掛鉤函數將該函數的輸出修改為 GRUB_VERIFY_FLAGS_SINGLE_CHUNK(值為 2),理論上這應增強安全性。但由於下一步的掛鉤會繞過此函數,因此該修改實際上毫無作用。

  • grub_verifiers_open 函數

     

    – GRUB 在打開文件時會隨時調用此函數,用於檢查是否需要對擬加載的文件進行完整性驗證。

    – 此函數被惡意引導程式掛鉤後,在不檢查任何簽名的情況下直接返回結果,甚至完全繞過了已掛鉤的 shim_lock_verifier_init 函數。

 

Linux 核心映像解壓縮掛鉤

該掛鉤負責篡改解壓縮的 Linux 核心映像數據。在核心映像解壓縮之前,掛鉤會:

  • 恢復原解壓縮函數的字節,並執行該函數解壓核心映像
  • 解壓完成後,篡改核心數據(僅限內存中的核心映像)

篡改過程中,掛鉤代碼在硬編碼偏移量處進行以下操作(如圖8所示):

  • 重寫核心版本和 Linux banner 字符串為 BoB13:這對系統影響不大,主要是標記痕跡。
  • 掛鉤 module_sig_check 函數:這可能用於繞過核心模組的簽名驗證。
  • 篡改指向 init 進程第一個環境變量的指針/地址:這可能是為了在系統初始化時注入惡意行為。

 

圖8. Vmlinuz 之中的 Bootkitty 內核解壓縮掛鉤

函數 module_sig_check 被篡改為始終返回 0。此函數負責檢查模組是否具有有效簽名。將該函數篡改為返回 0 後,內核將加載任何模組,而不再驗證其簽名。在已啟用 UEFI 安全啟動的 Linux 系統中,擬加載的內核模組必須具有簽名。當內核在啟用了 CONFIG_MODULE_SIG_FORCE 的情況下構建,或當內核命令行參數 module.sig_enforce=1 被傳遞時,這種情況也會發生,詳情請參見 Linux 內核文檔的說明。很可能發生的情況是,後續階段至少會加載一個惡意內核模組,如下文所分析的投放器等。

Linux 內核執行的第一個進程是第一個有效硬編碼路徑的 init(啟動/init from initramfs),並附帶命令行參數和環境變量。掛鉤代碼將第一個環境變量替換為 LD_PRELOAD=/opt/injector.so /init。LD_PRELOAD 是一個環境變量,用於在加載其他對象之前加載 ELF 共享對象,並可用來覆蓋函數。這是攻擊者加載惡意二進制文件的常見手法。在本例中,當 init 進程啟動時,會加載 /opt/injector.so 和 /init ELF 共享對象。這裡有一點我們不太清楚作者的意圖,主要是為何要將第二個 /init 字符串納入 LD_PRELOAD。

我們目前尚未發現任何惡意的 ELF 共享對象。然而,在本文即將發表之際,一篇涉及我們報告中提到的缺失組件的說明性文章已經發表。現在看來,這些對象僅僅是用來加載下一階段的惡意程式。

後果及補救措施
除了加載未知的 ELF 共享對象外,Bootkitty 還會在系統中留下足跡。首先是刻意修改內核版本和 Linux banner 字符串(非必要步驟)。前者可以通過執行 uname -v 看到(圖 9),而後者可以通過執行 dmesg 看到(圖 10)。

圖9. 執行 uname 後出現的 BoB13 字符串

 

圖10. 執行 dmesg 後出現的 BoB13 字符串

我們分析過程中發現,在執行 dmesg 命令後,還可以看到有關 init 進程運行情況的詳細信息。該進程隨 LD_PRELOAD 環境變量運行,如圖 11 所示(最初是 HOME=/,現已被惡意引導程序替換為 LD_PRELOAD=/opt/injector.so /init)。

圖11. 執行 dmesg 後可看到的 init 進程參數和環境變量

請注意,圖11第一行中的 /init 對應 initramfs 中的官方程序,它最終會將控制權交給 Ubuntu 系統中默認的 systemd。是否存在 LD_PRELOAD 環境變量,還可以通過查看 /proc/1/environment 文件來驗證。

我們在測試環境下使用 Bootkitty 啟動系統後,注意到內核被標記為受污染(圖12中的命令可用於檢查污染值),而在沒有惡意引導程序的情況下則一切正常。對於已啟用 UEFI 安全啟動的系統,另一種判斷惡意引導程序是否存在的方法是,開機時嘗試加載一個無簽名的虛擬內核模組。如存在惡意引導程序,模組將被加載;如不存在,內核將拒絕加載該模組。

圖12. 系統感染 Bootkitty 後開機的污染狀態

去除惡意引導程序的一個簡單補救技巧是,將官方文件 /EFI/ubuntu/grubx64-real.efi 移回其原始位置,即 /EFI/ubuntu/grubx64.efi。這會使 shim 執行官方 GRUB,使系統在沒有惡意引導程序干預的情況下啟動(注意,這樣做只適用於惡意引導程序部署為 /EFI/ubuntu/grubx64.efi 的情況)。

BCDropper 和 BCObserver
在惡意引導程序之外,我們還發現了一個未簽名的內核模塊 BCDropper 可能與它有關。該模塊與惡意引導程序一起,在同一時間由同一帳號上傳到 VirusTotal,並且內含可能與惡意引導程序相同的多個跡象,這些跡象表明它們可能由同一夥作者開發,例子如下:

  • 執行 modinfo 命令後會顯示 BlackCat 字符串,如圖13所示。
  • 該模塊二進制文件的調試路徑中含有另一個 blackcat 字符串,如圖14所示。
  • 內含未使用的文件隱藏功能,可以從目錄列表中隱藏指定條目。在硬編碼的文件名字符串中,用於過濾這些條目的前綴之一是 injector,如圖15所示(注意,Bootkitty 試圖通過 /opt/injector.so 路徑預加載共享庫)。

即使掌握了上述證據,我們也無法確定該內核模塊是否與 Bootkitty 有關(或由同一夥開發人員開發)。此外,惡意引導程序
支持圖13中提到的內核版本(6.8.0-48 generic)。

圖13. 投放器模塊信息

圖14. 投放器調試符提到 blackcat

圖15. 投放器中的待隱藏文件列表

顧名思義,該內核模塊會將我們命名為 BCObserver 的 ELF 內建文件,釋放到 /opt/observer 目錄中,並使用 /bin/bash 來執行它(圖17)。不僅如此,該模塊還會從模塊列表中刪除自身條目來隱藏自己。它還實現了一系列與 rootkit 相關的其他功能,如隱藏文件(見圖15)、進程和開放端口等,但投放器不會直接使用這些功能。

圖16. Hex-Rays 反編譯的投放器代碼

BCObserver 是一個相當簡單的應用程序。它會首先等待顯示管理器 gdm3 運行,然後再通過 finit_module 系統調用指令,從 /opt/rootkit_loader.ko 載入一個未知的內核模塊。等待顯示管理器啟動的作用是,確保代碼在系統完全啟動後再加載內核模塊。

圖17. Hex-Rays 反編譯的監視器代碼

雖然我們無法確定,投放器是否與惡意引導程序有某種關聯,以及如果有的話,投放器是如何執行的,但我們非常確定,惡意引導程序篡改 module_sig_check 函數是有原因的,並且加載未簽名內核模塊(如這裡介紹的投放器)肯定也是有意義的。

結論
不管是不是概念驗證,Bootkitty 都標誌著 UEFI 病毒領域的一個有趣進化,打破了現代 UEFI 惡意引導程序是 Windows 專屬威脅的說法。儘管現階段 VirusTotal 上的最新樣本還沒有對大多數 Linux 系統構成真正威脅,但它凸顯了為未來潛在威脅做好準備的必要性。
為了使您的 Linux 系統遠離此類威脅,請確保啟用 UEFI 安全引導功能,將系統固件和操作系統更新至最新版本,UEFI 安全引導程序禁用簽名庫也一樣。

IOC
完整 IOC 和樣本列表,歡迎來我司 GitHub 資料庫查閱。

文件

MITRE ATT&CK 技術分析
本表使用 MITRE ATT&CK 框架第 16 版生成

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟體提供商,其 獲獎產品——NOD32防病毒軟體系統,能夠針對各種已知或未知病毒、間諜軟體 (spyware)、rootkits和其他惡意軟體為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲 得了更多的Virus Bulletin 100%獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳 能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布里斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事 處,代理機構覆蓋全球超過100個國家。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。