Netskope nombrado Líder en el Cuadrante Mágico de Gartner® 2024™ para Security Service Edge. Obtenga el informe

cerrar
cerrar
  • Por qué Netskope chevron

    Cambiar la forma en que las redes y la seguridad trabajan juntas.

  • Nuestros clientes chevron

    Netskope atiende a más de 3.000 clientes en todo el mundo, entre ellos más de 25 de las 100 empresas de Fortune

  • Nuestros Partners chevron

    Nos asociamos con líderes en seguridad para ayudarlo a asegurar su viaje a la nube.

Aún más alto en ejecución.
Aún más lejos en visión.

Sepa por qué 2024 Gartner® Cuadrante Mágico™ nombró a Netskope Líder para Security Service Edge por tercer año consecutivo.

Obtenga el informe
Netskope Named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge graphic for menu
Ayudamos a nuestros clientes a estar preparados para cualquier situación

Ver nuestros clientes
Woman smiling with glasses looking out window
La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.

Más información sobre los socios de Netskope
Group of diverse young professionals smiling
Tu red del mañana

Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.

Obtenga el whitepaper
Tu red del mañana
Presentamos la Netskope One Plataforma

Netskope One es una Plataforma nativa en la nube que ofrece servicios convergentes de seguridad y redes para hacer posible su transformación SASE y de confianza cero.

Learn about Netskope One
Abstracto con iluminación azul
Adopte una arquitectura de borde de servicio de acceso seguro (SASE)

Netskope NewEdge es la nube privada de seguridad más grande y de mayor rendimiento del mundo y ofrece a los clientes una cobertura de servicio, un rendimiento y una resiliencia incomparables.

Más información sobre NewEdge
NewEdge
Netskope Cloud Exchange

Cloud Exchange (CE) de Netskope ofrece a sus clientes herramientas de integración eficaces para que saquen partido a su inversión en estrategias de seguridad.

Más información sobre Cloud Exchange
Vídeo de Netskope
  • Servicio de seguridad Productos Edge chevron

    Protéjase contra las amenazas avanzadas y en la nube y salvaguarde los datos en todos los vectores.

  • Borderless SD-WAN chevron

    Proporcione con confianza un acceso seguro y de alto rendimiento a cada usuario remoto, dispositivo, sitio y nube.

  • Secure Access Service Edge chevron

    Netskope One SASE proporciona una solución SASE nativa en la nube, totalmente convergente y de un único proveedor.

La plataforma del futuro es Netskope

Intelligent Security Service Edge (SSE), Cloud Access Security Broker (CASB), Cloud Firewall, Next Generation Secure Web Gateway (SWG) y Private Access for ZTNA integrados de forma nativa en una única solución para ayudar a todas las empresas en su camino hacia el Servicio de acceso seguro Arquitectura perimetral (SASE).

Todos los productos
Vídeo de Netskope
Next Gen SASE Branch es híbrida: conectada, segura y automatizada

Netskope Next Gen SASE Branch converge Context-Aware SASE Fabric, Zero-Trust Hybrid Security y SkopeAI-Powered Cloud Orchestrator en una oferta de nube unificada, marcando el comienzo de una experiencia de sucursal completamente modernizada para la empresa sin fronteras.

Obtenga más información sobre Next Gen SASE Branch
Personas en la oficina de espacios abiertos.
Diseño de una arquitectura SASE para Dummies

Obtenga un ejemplar gratuito del único manual que necesitará sobre diseño de una arquitectura SASE.

Obtenga el eBook
Cambie a los servicios de seguridad en la nube líderes del mercado con una latencia mínima y una alta fiabilidad.

Más información sobre NewEdge
Lighted highway through mountainside switchbacks
Habilite de forma segura el uso de aplicaciones de IA generativa con control de acceso a aplicaciones, capacitación de usuarios en tiempo real y la mejor protección de datos de su clase.

Descubra cómo aseguramos el uso generativo de IA
Habilite de forma segura ChatGPT y IA generativa
Soluciones de confianza cero para implementaciones de SSE y SASE

Más información sobre Confianza Cero
Boat driving through open sea
Netskope logra la alta autorización FedRAMP

Elija Netskope GovCloud para acelerar la transformación de su agencia.

Más información sobre Netskope GovCloud
Netskope GovCloud
  • Recursos chevron

    Obtenga más información sobre cómo Netskope puede ayudarle a proteger su viaje hacia la nube.

  • Blog chevron

    Descubra cómo Netskope permite la transformación de la seguridad y las redes a través del borde de servicio de seguridad (SSE)

  • Eventos y Talleres chevron

    Manténgase a la vanguardia de las últimas tendencias de seguridad y conéctese con sus pares.

  • Seguridad definida chevron

    Todo lo que necesitas saber en nuestra enciclopedia de ciberseguridad.

Podcast Security Visionaries

How to Use a Magic Quadrant and Other Industry Research
En este episodio, Max Havey, Steve Riley y Mona Faulkner diseccionan el intrincado proceso de creación de un Cuadrante Mágico y por qué es mucho más que un gráfico.

Reproducir el pódcast
Cómo utilizar un podcast de Cuadrante Mágico y otras investigaciones sectoriales
Últimos blogs

Lea cómo Netskope puede hacer posible el viaje hacia la Confianza Cero y SASE a través de las capacidades del borde de servicio de seguridad (SSE).

Lea el blog
Sunrise and cloudy sky
SASE Week 2023: ¡Su viaje SASE comienza ahora!

Sesiones de repetición de la cuarta SASE Week.

Explorar sesiones
SASE Week 2023
¿Qué es Security Service Edge (SSE)?

Explore el lado de la seguridad de SASE, el futuro de la red y la protección en la nube.

Más información sobre el servicio de seguridad perimetral
Four-way roundabout
  • Empresa chevron

    Le ayudamos a mantenerse a la vanguardia de los desafíos de seguridad de la nube, los datos y la red.

  • Liderazgo chevron

    Nuestro equipo de liderazgo está firmemente comprometido a hacer todo lo necesario para que nuestros clientes tengan éxito.

  • Soluciones para clientes chevron

    Le apoyamos en cada paso del camino, garantizando su éxito con Netskope.

  • Formación y certificación chevron

    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube.

Apoyar la sostenibilidad a través de la seguridad de los datos

Netskope se enorgullece de participar en Vision 2045: una iniciativa destinada a crear conciencia sobre el papel de la industria privada en la sostenibilidad.

Descubra más
Apoyando la sustentabilidad a través de la seguridad de los datos
Pensadores, constructores, soñadores, innovadores. Juntos, ofrecemos soluciones de seguridad en la nube de vanguardia para ayudar a nuestros clientes a proteger sus datos y usuarios.

Conozca a nuestro equipo
Group of hikers scaling a snowy mountain
El talentoso y experimentado equipo de servicios profesionales de Netskope proporciona un enfoque prescriptivo para su exitosa implementación.

Más información sobre servicios profesionales
Servicios profesionales de Netskope
Asegure su viaje de transformación digital y aproveche al máximo sus aplicaciones en la nube, web y privadas con la capacitación de Netskope.

Infórmese sobre Capacitaciones y Certificaciones
Group of young professionals working

CapitalInstall hosted and served via IaaS

Dec 11 2018
Etiquetas
azure
CapitalInstall
IaaS
Linkury
Malware
microsoft azure
Microsoft Azure Security
Netskope Threat Protection

Netskope Threat Research Labs detected an Adware family named, ‘CapitalInstall’ delivered from Microsoft Azure blob storage whose IP range was allow listed by the multiple customers. The malware was identified via telemetry that recently alerted us on a high number of detections. These detections were related to multiple customers in the health and retail sector that recently deployed Netskope Advanced Threat Protection. Before this deployment, the binaries were shared in multiple apps internally across several enterprise users, external users, public, and anyone with a cloud share link. These binaries, which claimed to provide keys and licenses related to popular software, were downloaded in the victims’ machines and synced to cloud storage apps. These files were in turn shared across several users who needed the keys and licenses of that software. Using our clustering mechanism, we also identified similar strains of CapitalInstall across several other customer instances which we detected in the past. This particular variant of CapitalInstall installers were delivered from the same Microsoft Azure blob storage URL and packaged with a bundled adware named ‘Linkury’.

This post describes our discovery and analysis of CapitalInstall and concludes with some recommendations to help protect and remediate such threats.

Netskope Detection

Netskope Advanced Threat Protection detects CapitalInstall samples we identified as SilentInstall.Gen.

Disclosure

The Azure blob storage URL delivering CapitalInstall was reported to Microsoft on 19 November 2018.

Descubrimiento

As mentioned earlier, since the detections were considerably high in number, our Outbreak Detection System triggered malware alerts as shown in Figure 1.

Figure 1: Malware alerts from telemetry

Figure 1 illustrates a surge in the malware alerts from telemetry across several customer instances. The spikes above 100 were caused by the customers that recently deployed Netskope Threat Protection.

After analysis, we confirmed that the detections were related to several known malware, including potentially harmful and unwanted applications. A specific strain,’CapitalInstall’ packaged with an Adware family named ‘Linkury’ with a considerably high number of detections caught our attention. Several samples related to this malware family resident in cloud storage apps were shared across internal and external users and any user with the cloud share link.

Since the detections were high in number and shared across several users, we performed a deeper investigation leading us to the discovery of the Microsoft Azure blob storage link IP range allow listed by the customers that was delivering CapitalInstall binaries.

Delivery

After analyzing all the CapitalInstall binaries related to Linkury, we identified the delivery mechanism to be drive-by-download links from a website that claim to provide keys and licenses related to popular softwares. The drive-by-download links were attributed to several TLDs, which all proceed to fetch the Linkury binary from the same Azure blob storage link, intie[.]blob.core.windows.net.

CapitalInstall – Linkury

CapitalInstall is associated to a family of potentially unwanted applications (PUPs) that the victim might have inadvertently installed in the machine. The application’s network traffic can be easily identified by the User-Agent, ‘InstallCapital’ that is most commonly used by the installers. An example of the packet capture is shown in Figure 2.

Figure 2: User-Agent: InstallCapital

The potentially unwanted applications are packaged with bundlewares like Linkury. These applications plague the machine with annoying advertisements and download additional unwanted applications.

Malware Analysis

For the analysis, we have taken a software sample that has been downloaded several times by our customer. The sample is an ISO image file named Adobe+CC+2019+Crack.iso delivered from the Azure blob storage link, https://intie[.]blob.core.windows.net/54148/a350ab7c93a511322f4fd0/Adobe+CC+2019+Crack.iso

The iso file, Adobe+CC+2019+Crack.iso contained an executable named Adobe+CC+2019+Crack.exe as shown in Figure 3.

Figure 3: Adobe+CC+2019+Crack.iso embedded with CapitalInstall

The usage of iso image for embedding the CapitalInstall binary was something uncommon for traditional Adware related families.

The embedded binary, Adobe+CC+2019+Crack.exe was compiled with Microsoft Visual C++ 6.0 with an entry point function pointing to WinMain() in Olly debugger is as shown in Figure 4.

Figure 4: WinMain() of Adobe+CC+2019+Crack.exe in Olly debugger

After stepping in WinMain(), we found the presence of runtime packer code. As the name suggests, runtime packers is a packer that uses executable compression to unpack the executable during execution. Malware authors tend to use this compression in an attempt to thwart traditional Antivirus engines that scan for identifying the malicious code in the executable.

On execution, the installer displays a message to the victim as shown in Figure 5.

Figure 5:  Message displayed on execution

After clicking Next, the victim is then presented with the message from Linkury as shown in Figure 6.

Figure 6: Linkury install message

After clicking on Next, the victim is presented with a message that the installation of the Adobe CC 2019 crack is in progress and then directed to a webpage, http://ic-dc[.]bundlessafevault[.]com/pr/3e07b12e-e7d1-11e6-836f-02e33f60d095/typ_1.html, thanking the download/install of the binary.

Though the crack/key is not installed in the machine, the victim is instead displayed with a web page from swiftviz[.]net to install an unwanted browser search add-on named searchfort (http://www.searchfort[.]online/nlp/lp.html?source=912&clickid=w542O31BFM27RJ8IHON3L46E) as shown in Figure 7.

Figure 7: Victim displayed with a page to install searchfort browser add-on

Swiftviz[.]net is a service that lets one earn money for each visitor that visits the shortened links with adf.ly. There are several enticing messages displayed from swiftviz[.]net as shown in Figure 8, 9 and 10.

Figure 8: Message prompting to install CryptoTab

Figure 9: Message prompting to install Olymptrade

Figure 10: Message prompting to use adBTC

Several of these enticing messages invite the download and install of several unwanted software the victim’s machine.

All the metrics of the web pages displayed to the victim are sent to the website fuss.wavesfork[.]online with the User-Agent: InstallCapital as shown in Figure 11.

Figure 11: Metrics sent to the website fuss.wavesfork[.]online

Drive-by-download links, Similar strains, and Azure blob storage URL

As we continued to research the similar files using our clustering mechanism, we also identified similar strains of CapitalInstall in several customer instances which we detected in the past. Most of the files were initially delivered from URL’s with TLD’s club, fun, online, us, space, icu, pw, xyz, press, site, host, website, services, accountant, red. Nonetheless, all these were used as placeholders to download the binaries from the Azure blob storage URL, intie[.]blob.core.windows.net. An example of the HTTP traffic delivering the CapitalInstall from Azure blob storage as follows

 HTTP headers:

    GET /56181/JhdkWGnod56ahkspldunbRYdvpGaWemdFGaqG9Rm3dXRcXu/%5BPiratePCNet%5D%2BDrive%2BSnapShot%2B_%2B_%2BOnlyzip.exe HTTP/1.0

    Host: intie[.]blob.core.windows.net:443

    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)

    Referer: http://playground.hospitalcar[.]fun/JhdkWGnod56ahkspldunbRYdvpGaWemdFGaqG9Rm3dXRcXu/

    Accept-Encoding: gzip

Using Virustotal Passive DNS records for the domain intie[.]blob.core.windows.net and our clustering mechanism, we identified close to 2000 unique hashes downloaded from the domain, starting from April 2018.

Conclusión

The advent of new technologies like containers, serverless applications, and SaaS storage are now the new standards of the industry with companies building their entire infrastructure on IaaS providers like Amazon AWS, Google Cloud, and Microsoft Azure. With a major shift of services towards cloud, the dynamics of threats have changed and they have started adapting to this new playground.

The research on CapitalInstall is a classic example of malware being hosted over IaaS for delivering the payload using placeholder websites. We also observed the Azure blob IP was allow listed and the downloaded binaries were shared across several across internal and external users. Generally, allow listing is done to reduce the performance issues introduced by scanners that treat the entire cloud app space equivalently. Organizations that do not have a multi-layered cloud-aware solution for threat detection are particularly vulnerable to attackers hosting malicious files in IaaS object stores.  

Enterprises should educate users on the best practices and to refrain from installs, downloads and accessing any website promoting cracks, keys, and licenses of popular software. Enterprise Administrators and Users must also be educated on the implications of allow listing IP’s and sharing files across users.

Netskope Advanced Threat Protection with its unique cloud vantage point combined with multi-layered threat detection and remediation capabilities offers customers a cloud scale platform that understands, protects and responds such attacks

author image
Ashwin Vamshi
Ashwin Vamshi es un investigador de seguridad con un interés innato en los ataques dirigidos y el malware que utilizan servicios en la nube. Se centra principalmente en la identificación de nuevos vectores de ataque y malware, campañas y ciber-delincuentes que utilizan la "nube como vector de ataque".

Stay informed!

Subscribe for the latest from the Netskope Blog