Woburn, MA – January 13, 2022 – Kaspersky experts have uncovered a series of attacks by advanced persistent threat (APT) actor BlueNoroff against small and medium-sized companies worldwide resulting in major cryptocurrency losses for the victims. The campaign, dubbed SnatchCrypto, is aimed at various companies that, by the nature of their work, deal with cryptocurrencies and smart contracts, DeFi, Blockchain, and the FinTech industry.
In BlueNoroff’s most recent campaign, the attackers have been subtly abusing the trust of the employees working at targeted companies by sending them a full-featured Windows backdoor with surveillance functions, disguised as a contract or another business file. In order to eventually empty the victim’s crypto wallet, the actor has developed extensive and dangerous resources: complex infrastructure, exploits and malware implants.
BlueNoroff is part of the larger Lazarus group and uses that group’s diversified structure and sophisticated attack technologies. The Lazarus APT is known for attacks on banks and servers connected to SWIFT, and has even engaged in the creation of fake crypto-related companies. The deceived clients subsequently installed legitimate-looking apps and, after a while, received backdoored updates.
Now, this Lazarus branch has switched to attacking cryptocurrency startups. As most cryptocurrency businesses are small or medium-sized startups, they cannot invest lots of money into their internal security system. The actor understands this and takes advantage by using elaborate social engineering schemes.
To gain the victim’s trust, BlueNoroff pretends to be an existing venture capital company. Kaspersky researchers found more than 15 venture businesses whose brand names and employee names were abused during the SnatchCrypto campaign. The researchers believe that the real companies have nothing to do with this attack or the emails.
The start-up crypto sphere was chosen by cybercriminals for a reason: startups often receive letters or files from unfamiliar sources. For example, a venture company may send them a contract or other business-related files. The APT actor uses this as bait to make victims open the macro-enabled document.
An attentive user may spot that something fishy is happening while MS Word shows a standard loading popup window
If the document was to be opened offline, the file would not represent anything dangerous – most likely, it would look like a copy of some kind of contract or another harmless document. But if the computer is connected to the Internet at the time of opening the file, another macro-enabled document is fetched to the victim’s device, deploying malware.
This APT group has various methods in its infection arsenal and assembles the infection chain depending on the situation. Besides weaponized Word documents, the actor also spreads malware disguised as zipped Windows shortcut files. It sends back the victim’s general information and Powershell agent, which then creates a full-featured backdoor. Using this, BlueNoroff deploys other malicious tools to monitor the victim: a keylogger and screenshot taker.
Then the attackers track victims for weeks and months: they collect keystrokes and monitor the user’s daily operations, while planning a strategy for financial theft. Having found a prominent target that uses a popular browser extension to manage crypto wallets (for example, the Metamask extension), they replace the main component of the extension with a fake version.
According to the researchers, the attackers receive a notification upon discovering large transfers. When the compromised user attempts to transfer funds to another account, the attackers intercept the transaction process and inject their own logic. To complete the initiated payment, the user then clicks the “approve” button. At this moment, cybercriminals are changing the recipient’s address and maximizing the transaction amount, essentially draining the account in one move.
The group is currently active and attacks users regardless of which country they are from
“As attackers continuously come up with a lot of new ways to trick and abuse, even small businesses should educate their employees on basic cybersecurity practices,” said Seongsu Park, senior security researcher at Kaspersky’s Global Research and Analysis Team (GReAT). “It is especially essential if the company works with crypto wallets. There is nothing wrong with using cryptocurrency services and extensions, but note that it is also an attractive target for APT and cybercriminals alike. Therefore, this sector needs to be well protected.”
Read the full report about BlueNoroff on Securelist.
For organizations’ protection, Kaspersky suggests the following:
- Provide your staff with basic cybersecurity hygiene training, since many targeted attacks start with phishing or other social engineering techniques.
- Carry out a cybersecurity audit of your networks and remediate any weaknesses discovered in the perimeter or inside the network.
- The injection of the extension is hard to find manually, unless you are very familiar with the Metamask codebase. However, a modification of the Chrome extension leaves a trace. The browser has to be switched to Developer Mode and the Metamask extension is installed from a local directory instead of the online store. If the plugin comes from the store, Chrome enforces digital signature validation for the code and guarantees code integrity. So, if you are in doubt, check your Metamask extension and Chrome settings right now.
- Install anti-APT and EDR solutions, enabling threat discovery and detection, investigation and timely remediation of incidents capabilities. Provide your SOC team with access to the latest threat intelligence and regularly upskill them with professional training. All of the above is available within theKaspersky Expert Security framework.
- Along with proper endpoint protection, dedicated services can help guard against high-profile attacks. TheKaspersky Managed Detection and Response service can help identify and stop attacks in their early stages, before the attackers achieve their goals.