You are currently viewing Cybersecurity Breach: 360 Total Security Compromised

Cybersecurity Breach: 360 Total Security Compromised

Recent research by ANY.RUN cybersecurity experts has uncovered a cunning attack campaign leveraging a new loader called PhantomLoader to distribute the malicious SSLoad malware. This campaign is particularly concerning because PhantomLoader disguises itself as a legitimate module of the popular 360 Total Security antivirus software, allowing it to bypass traditional security defenses and deliver SSLoad undetected.

The Deceptive Disguise: PhantomLoader

The key element in this attack is PhantomLoader. This cleverly designed loader masquerades as “PatchUp.exe,” a genuine module used by 360 Total Security. This tactic grants it significant advantages:

  • Evasion of Detection: By mimicking a trusted program component, PhantomLoader avoids raising suspicion with both security software and the user.
  • Pre-execution Advantage: PhantomLoader injects its malicious code before the legitimate software’s main function executes. This suggests a modification of the original module, giving PhantomLoader a head start in the infection process.
  • Hidden Payload Extraction: PhantomLoader utilizes XOR decryption to unveil its malicious payload hidden within the legitimate software’s executable file.

SSLoad malware detection inside ANY.RUN’s sandbox

The Multi-Layered Attack Process

The attack unfolds in distinct stages, each designed for maximum stealth:

  • Stage 1: Phishing the Initial Infection
    • The attack typically begins with a phishing email containing a malicious Office document (often a Word document) as an attachment.
    • Once the user opens the document, a macro embedded within the document triggers the infection process. This highlights the importance of user awareness and caution regarding suspicious emails and attachments.
  • Stage 2: PhantomLoader Takes Over
    • Upon document execution, a new suspicious process named “app.com” launches, indicating the activation of the embedded macro and hinting at malicious activity.
    • PhantomLoader, disguised as “PatchUp.exe,” executes before the legitimate software, highlighting the potential vulnerability of compromised modules.
    • The loader utilizes XOR decryption to reveal its hidden payload within the legitimate software’s file.
    • The decrypted code, equipped with core system functions like memory allocation and DLL loading, facilitates the delivery of SSLoad directly into memory, further enhancing its ability to evade detection.
  • Stage 3: SSLoad – The Stealthy Payload
    • Once deployed, SSLoad, a Rust-based loader, takes center stage. It employs various techniques to maintain its invisibility:
      • Multi-layered String Decryption: SSLoad decrypts its strings in multiple steps, making it difficult for analysis tools to identify its true purpose.
      • Mutex Protection: SSLoad utilizes a mutex object to ensure only one instance runs on the infected system, preventing potential conflicts or reinfection attempts.
      • System Information Gathering: To adapt its actions to the specific environment, SSLoad gathers crucial details like the operating system version and system architecture.
      • Anti-analysis Techniques: SSLoad employs sophisticated measures, including anti-debugging checks, to detect and potentially terminate itself if it senses being monitored by security software.

SSLoad malware detected by Suricata rule in ANY.RUN’s sandbox

MITRE ATT&CK Tactics Employed

The ANY.RUN analysis revealed the attackers utilized several tactics outlined in the MITRE ATT&CK framework:

  • User Execution (Initial Access): The phishing email with the malicious document serves as the initial access vector, exploiting user interaction.
  • Deobfuscate/Decode Files or Information (Execution): PhantomLoader utilizes deobfuscation to reveal the hidden code used to load SSLoad into memory, keeping it concealed until the final stage.
  • Query Registry (Discovery): SSLoad queries the system registry to gather information about security settings and system configurations.
  • System Information Discovery (Discovery): SSLoad actively collects data about the system, including OS details, architecture, and user information, allowing it to tailor its behavior.
  • File and Directory Discovery (Discovery): Both PhantomLoader and SSLoad potentially search the system for specific files or directories that could aid in the infection process or help them hide within legitimate processes.
  • Data Manipulation (Persistence): SSLoad might modify system data or processes to maintain persistence on the infected system and potentially disrupt normal system functions.

The Importance of Vigilance and Multi-layered Security

This attack campaign highlights the evolving tactics of cybercriminals and underscores the importance of a layered security approach. Here are some key takeaways:

  • Phishing Awareness: Educate users about phishing tactics and the dangers of opening suspicious emails and attachments.
  • Software Updates: Ensure timely software updates for antivirus and other security applications to patch potential vulnerabilities.
  • System Monitoring: Utilize security solutions that monitor system activity and have the ability to detect unusual behavior.
  • User Caution: Encourage users to exercise caution when downloading files and visiting unknown websites.