Cyber Attack Uses Google Drive To Deliver 9002 Trojan

Google Drive is being used by hackers to host malicious files as part of a malware campaign targeting a number of Asian countries including Myanmar and Taiwan.

This is the warning from Unit 42 researchers at Palo Alto Networks in a blog post, in which they said the 9002 Trojan is delivered onto a victim’s computer via a combination of shortened URL links and a shared file hosted on Google’s cloud storage service.

Poison Ivy RAT

According to the researchers, the attackers make use of a server that hosts a custom redirection script to track successful clicks by targeted email addresses. This 9002 Trojan carries the infamous Poison Ivy remote access Trojan (RAT) as its payload, the researchers warned.

“While we do not have specific telemetry on the attack at this time, we believe the attack relies on a shortened link (in this case using the URL shortening service TinyURL) to deliver the 9002 payload,” the researchers wrote.

“This shortened link redirects to an actor-controlled server that we refer to as a redirection server, which redirects the victim to a gmail address belonging to a ‘well-known politician and human rights activist in Myanmar’.”

From there the victim is redirected to a Zip file hosted on Google Drive, bearing the filename of “2nd Myanmar Industrial Human Resource Development”.

This zip file contains an executable that is disguised as a PowerPoint icon. What makes this Trojan so believable is that the decoy PowerPoint presentation contains details of a conference in Myanmar to be held on 30 July, entitled “Role of JMVTI Aung San and Building of Clean and Safe Automobile Society”.

The researchers said that Japan Myanmar Vocational Training Institute (JMVTI) Aung San is a training centre established by the Asia Environmental Technology Promotion Institute under Myanmar’s Ministry of Science and Technology.

According to the researchers, the 9002 Trojan communicates with a domain that acts as its command and control (C2) server, associated with Poison Ivy samples used for attacks on Myanmar and other Asian countries as revealed earlier this year by Arbor Networks.

“While we do not have complete targeting information associated with these samples, several of the decoy files were in Chinese and appear to be part of a recent and possibly ongoing campaign targeting organisations in Taiwan,” said the researchers.

“The use of Google Drive to host malicious files is not a new tactic in attacks,” they wrote. “However, using a well-known hosting platform may allow the downloading of a payload to blend into other legitimate traffic from the hosting provider. The actors still use spear phishing as their primary attack method, but because that technique has been so well publicised, intended victims are perhaps more cautious about opening suspicious email attachments or links.”

“As spear phishing becomes less successful, threat actors need to continue to adapt and find new methods to successfully deliver malware,” they warned. “The use of a URL shortening service and a redirection server further aids the chances of a successful attack, as it becomes more challenging to determine the validity of the link within an email due to the way link shorteners obfuscate link content.”

Asian Threats

At the moment it seems this new threat is limited to Asia, a region that is facing a growing number of security issues of late.

Last year Kaspersky Lab warned of a hacker collective called Naikon that was actively targeting a number of countries in the South China Sea area.

That hacker group had apparently infiltrated a number of government, civil and military organisations in countries such as the Philippines, Malaysia, Cambodia, Indonesia, Vietnam, Myanmar, Singapore, Thailand, Laos, China and Nepal.

Are you a security expert? Try our quiz!

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

Google Ordered To Pay $43m By Australian Court

Search engine Google fined $43 million by Australian court for tracking Android users location data…

1 day ago

Hacker Touts Data Sale Of 48.5m Users Of Covid App – Report

Personal data of 48.5 million Chinese citizens who used Shanghai's Covid App, is being offered…

1 day ago

Facebook Tests Default End-to-End Encryption For Messenger

Privacy move. Platform tests secure storage of people's chats on Messenger, in a move sure…

1 day ago

UK’s CMA Begins Probe Of Viasat Acquisition Of Inmarsat

British competition regulator the CMA, begins phase one investigation of $7.3 billion merger between Inmarsat…

2 days ago

Cisco Admits ‘Security Incident’ After Breach Of Corporate Network

Yanluowang ransomware hackers claim credit for compromise of Cisco's corporate network in May, while Cisco…

2 days ago

Google Seeks To Shame Apple Over RCS Refusal

Good luck convincing Tim. Google begins publicity campaign to pressure Aple into adopting the cross…

2 days ago