Threat Management, Threat Intelligence, Malware, Phishing

New Hawkball backdoor attacks government sector in Central Asia

A newly discovered malicious backdoor by the name of Hawkball was recently observed in a campaign apparently targeting one or more Russian-speaking government entities in Central Asia, according to a blog post this week from FireEye Labs.

Upon successful infection, Hawkball offers the unidentified attackers a range of malicious capabilities, writes FireEye blog post author and malware researcher Swapnil Patil. These include surveying the host and collecting victim information; delivering additional payloads; creating a named pipe to execute native Windows commands; terminating processes; creating, deleting and uploading files; and enumerating drives.

To deliver the backdoor, the attackers used a malicious decoy file that purports to come from anti-terrorist organization with a focus on the post-Soviet republics making up the Commonwealth of Independent States. The decoy document's title is roughly translated from Russian to English as "Collection of the Guiding Composition of Anti-terroristic Security Units and Special Services of the CIS States."

Benjamin Read, senior manager of cyber espionage analysis, said FireEye researchers believe the malicious file was likely used in February 2019. "We don't have specific insight into the entity targeted, but assessed that the lure content would be appealing to a government." said Read.

Opening the malicious file commences an infection chain that delivers the payload via two previously patched Microsoft Office memory corruption vulnerabilities – CVE-2017-11882 (found in Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1 and Microsoft Office 2016 ) and CVE-2018-0802 (found in the Equation Editor in Microsoft Office 2007, 2010, 2013 and 2016).

Hawkball communicates with a hard-coded C2 server over HTTP, exfiltrating the victim's information, including the computer name, user name, IP address, OEM page, OS version, architecture details and more. It also performs at least two techniques to check if it is being debugged.

SC Media has reached out to FireEye for additional details on the Hawkball attack.

Bradley Barth

As director of multimedia content strategy at CyberRisk Alliance, Bradley Barth develops content for online conferences, webcasts, podcasts video/multimedia projects — often serving as moderator or host. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.