Cybersecurity experts from ESET Research have recently identified an advanced backdoor, Deadglyph, used by the Stealth Falcon APT group. This backdoor, targeting entities in the Middle East, demonstrates unique features and tactics, highlighting the evolving sophistication of cyber threats.

Overview of Deadglyph

Deadglyph is a sophisticated backdoor linked to the Stealth Falcon Advanced Persistent Threat (APT) group. Distinct in its architecture, it combines a native x64 binary with a .NET assembly, encrypted using a machine-specific key. This complex composition makes it challenging to analyze and sets it apart from conventional malware.

Technical Insights into Deadglyph

Researchers at ESET have attributed Deadglyph to the Stealth Falcon group based on targeting data and supplementary evidence. Deadglyph’s architecture stands out in the malware landscape due to its blend of programming languages, hinting at separate development and obfuscation efforts. Unlike traditional backdoors, Deadglyph dynamically receives commands from a Command and Control (C&C) server, allowing remote enhancement of its capabilities.

The Deadglyph backdoor comprises several modules with distinct functions:

  1. Process Creator: Enables the creation of new processes on compromised systems.
  2. File Reader: Allows reading files on the target system.
  3. Info Collector: Gathers essential system information.

Deadglyph’s modular design equips it with versatility, suitable for various espionage tasks. The initiation of Deadglyph involves a shellcode loader that activates the native x64 module, named Executor. This Executor then loads the Orchestrator, a .NET component that establishes communication with the C&C server.

Deadglyph is capable of executing tasks in three categories:

  • Orchestrator tasks
  • Executor tasks
  • Upload tasks

It also employs counter-detection measures, including system process monitoring and randomized network patterns, and can self-uninstall to avoid detection.

The Stealth Falcon Connection

Deadglyph’s naming is derived from unique identifiers found within the backdoor, including hexadecimal IDs and a homoglyph attack mimicking “Microsoft Corporation.” The Stealth Falcon group, known for exploiting zero-day Windows vulnerabilities, uses Deadglyph to establish persistence and communicate with C&C servers using HTTPS POST requests, complicating detection efforts.

Recommendations for Protection

  1. Awareness: Stay informed about threats like Stealth Falcon and Deadglyph.
  2. Security Measures: Implement comprehensive cybersecurity solutions.
  3. Patch Management: Regularly update software and systems.
  4. Employee Training: Educate staff on recognizing phishing and suspicious activities.
  5. Access Control: Restrict user privileges and enforce strong authentication.
  6. Network Monitoring: Vigilantly monitor network traffic.
  7. Threat Intelligence: Utilize threat intelligence feeds for the latest updates.
  8. Data Backup: Regularly back up critical data to secure locations.

Conclusion

Deadglyph exemplifies the complex nature of modern cyber threats, particularly in the realm of espionage. The Stealth Falcon APT group’s use of this advanced backdoor underscores the need for robust cybersecurity practices. Organizations must remain alert, continually update their security protocols, and engage in collaborative efforts to share threat intelligence. By understanding the tactics of groups like Stealth Falcon, we can better protect against and respond to these sophisticated threats.

Also Read: