October 8th, 2024

European govt air-gapped systems breached using custom malware

ESET researchers reported that the GoldenJackal group has targeted air-gapped systems in a European government from May 2022 to March 2024, aiming to steal confidential information using sophisticated tools.

Read original articleLink Icon
European govt air-gapped systems breached using custom malware

ESET researchers have identified a series of cyberattacks attributed to the GoldenJackal group, targeting air-gapped systems within a European government organization from May 2022 to March 2024. This group, which has been active since at least 2019, is known for its espionage activities against government and diplomatic entities in Europe, the Middle East, and South Asia. The analysis revealed previously undocumented tools used by GoldenJackal, including a modular toolset that enhances their capabilities for compromising and persisting in targeted networks. The ultimate aim of these attacks appears to be the theft of confidential information from high-profile, isolated systems. The researchers detailed the group's tactics, including the use of a component named GoldenDealer, which facilitates the delivery of malicious executables to air-gapped systems via USB drives. The findings underscore the sophistication of GoldenJackal's operations, as they have developed multiple toolsets specifically designed for breaching air-gapped networks, a challenging task that typically requires significant resources. The report also highlights the group's history of targeting a South Asian embassy in Belarus, showcasing their ongoing interest in high-value governmental targets.

- GoldenJackal has been active since at least 2019, targeting government and diplomatic entities.

- The group has developed sophisticated tools for breaching air-gapped systems.

- Recent attacks against a European government organization occurred from May 2022 to March 2024.

- The primary goal of GoldenJackal is to steal confidential information from isolated networks.

- The group employs a modular toolset, enhancing their operational capabilities.

Link Icon 24 comments
By @EvanAnderson - 5 months
Given the discipline surrounding most "air gapped" machines I've seen I always find this quote appropriate:

"At best, an air gap is a high-latency connection" -Ed Skoudis - DerbyCon 3.0

By @lolc - 5 months
Reminds me of the time I was looking after a SECURE system: One of the tasks was the daily update of the antivirus. So I would grab the blessed stick, insert it into the Internet-PC, and using FTP would download the latest antivirus update. Then I'd walk over to the SECURE system, insert the stick, and run the exe from the stick. There, system SECURED for today!

Norton, trust no other!

By @benoau - 5 months
The weak-point is the shared USB device that copies from one machine to another which seems to defeat the whole purpose of being air-gapped - you could have printed-and-OCR'd data three decades ago so the air-gapped machine is never reading anything from outside at all, these days a video stream and AI could probably automate that?
By @firesteelrain - 5 months
This is an old attack vector. No one is learning from history. The organizations being hit have poor cybersecurity.

https://en.wikipedia.org/wiki/2008_malware_infection_of_the_...

By @_hl_ - 5 months
Why would you go through all the hassle of setting up an air-gapped system, only to stop at enforcing strict code signing for any executable delivered via USB?
By @ThinkBeat - 5 months
This does really not deserve a huge writeup.

Employees (unknowingly(?)) using infected USB drives caused security problems. Well imagine that.

As several others pointed out the USB ports on the secure serfver should all be fullly disabled

In addition I would suggest leaving one rewired seemingly availble USB port that will cause a giant alarm to blare if someone inserted anything into it.

Further all informatin being somehow fed into the secure machines should be based on simple text based files with no binary components. To be read by a bastion host with a drive and driver that will only read those specific files, that it is able to parse succefully and write it out to the destination target, that I would suggest be an optical worm device that can then be used to feed the airgapped system.

By @3np - 5 months
> As was the case in the Kaspersky report, we can’t attribute GoldenJackal’s activities to any specific nation-state. There is, however, one clue that might point towards the origin of the attacks: in the GoldenHowl malware, the C&C protocol is referred to as transport_http, which is an expression typically used by Turla (see our ComRat v4 report) and MoustachedBouncer. This may indicate that the developers of GoldenHowl are Russian speakers.

This is quite a stretch. So we have nothing so far.

By @amatecha - 5 months
As soon as the article started describing malware being installed upon insertion of a USB thumb drive, I had to Ctrl-F for "Windows", and indeed, of course that's the OS these machines are running.

I'd be really curious to hear of stories like this where the attacked OS is something a little less predicable/common.

By @userbinator - 5 months
Unless I'm missing something, this doesn't rely on something really advanced and low-level like USB drive firmware, but a classic flaw that's existed in Windows for almost 30 years:

It is probable that this unknown component finds the last modified directory on the USB drive, hides it, and renames itself with the name of this directory, which is done by JackalWorm. We also believe that the component uses a folder icon, to entice the user to run it when the USB drive is inserted in an air-gapped system, which again is done by JackalWorm.

It's just another variant of the classic .jpg.exe scam. Stop hiding files and file extensions and this hole can be easily closed.

By @anthk - 5 months
>Ctrl-f, Windows.

Ahem, "air-gapped'.

Any decent Unix system has either udev or hotplug based systems to disable every USB device not related to non-storage purposes. Any decent secure system woudln't allow to exec any software to the user beside of what's in their $PATH. Any decent system woudn't alllow the user to mount external storage at all, much less executing any software on it.

For air-gapped systems, NNCP under a secure Unix (OpenBSD with home mounted as noexec, sysctl security tweaks enforcing rules, and such) it's godsend.

Securelevel https://man.openbsd.org/securelevel.7

NNCP http://www.nncpgo.org/

http://www.nncpgo.org/

By @no-reply - 5 months
Isn't this how the stuxnet got into Iranian facilities?
By @Roark66 - 5 months
Am I the only one that finds it incredible an air gapped device has enabled USB ports? You want to bring data to it, use a freaking cd/dvd-rom. You may bring all sorts of crap in, but if let's say the air gapped machine is reimaged from cd/dvd every day and nothing ever leaves it, who cares?
By @gman83 - 5 months
I don't know anything about security, but why does an airgapped system even have a USB drive? Seems obvious to me that you want to disable all IO systems, not just internet? OK, sure people can still take photos of the screen or something, but that would require a willing collaborator.
By @blueredmodern - 5 months
You generally want to avoid getting malware into your network, but it is even more important to avoid allowing for exfiltration of data. So the "copy via USB-stick" serves a purpose and makes it MUCH harder to exfiltrate data.
By @binary_slinger - 5 months
I’m a bit disappointed the mechanism to exfiltrate data is based on sharing the USB between an internet-connected and air gapped devices. It would have been cool if it used some other side channel like acoustic signals.
By @snvzz - 5 months
Wouldn't have happened had they used seL4.

I'd hope there's some EU investment on it now.

By @notorandit - 5 months
I would bet that those air-gapped systems are running some version of MS windows.
By @amelius - 5 months
Let me guess. Someone installed a TCP-over-airgap utility.
By @lionkor - 5 months
> This may indicate that the developers of GoldenHowl are Russian speakers.

Journalists need to check their biases and ensure that everything they write is balanced. When mentioning that they might be Russian speakers, a good balancing sentence would be to point out countries which use the Russian language. Just throwing in "Russian speaker" after explicitly stating they're not sure which nation state did this is extremely unprofessional.

Sure, mention all the facts. Don't try to interpret them as "clues". If you have to, make sure you're not building a narrative without being absolutely sure.

Its not good journalism to go from `transport_http` to indicating that this is an attack by the Russian federation. That's not how you do good journalism. How many people will retain the fact that the author does NOT know which, if any, nation state did this?

By @sandworm101 - 5 months
I'm actually seeing some organizations deliberately forbidding air-gapped systems. The upsides no longer outweigh the downsides. While the speed at which attacks can be implemented is lower, they are more difficult to detect. An air-gapped system still needs to be updated and policed. So someone has to move data into it, for software updates at least. But the air-gap makes such systems very difficult to monitor remotely. Therefore, once an attack is ongoing it is harder to detect, mitigate and stop.
By @dackdel - 5 months
love it
By @GianFabien - 5 months
tldr: The breach relied on careless human(s) using USB key to and from the air-gapped systems. All the clever technology would have been for naught had the staff used robust physical security procedures.