|
Targeted attacks are known as some of the most destructive cyber attacks in that they zoom in on organizations that either provide critical services or have massive user bases. A report revealed that at the end of 2019, 67% of the cyber attacks recorded were targeted. Another report revealed that these attacks trailed their sights most on companies in the entertainment/media, financial, and government sectors.
We sought to look at one targeted attack dubbed “Dark Caracal,” in particular, to see if seemingly old attacks can still pose risks due to yet undisclosed indicators of compromise (IoCs) using a variety of threat intelligence gathering tools.
Dark Caracal is a threat group that has been cited for ties to attacks targeting the Lebanese General Directorate of General Security (GDGS). It has been operating since at least 2012. It has also been identified for its use of malicious tools such as:
While it has been some time since Dark Caracal figured in the news, a report from Amnesty International in September of this year brought FinSpy back into the spotlight. One possible reason for its seeming comeback could be that not all of the Dark Caracal IoCs have yet been publicly reported and so could still be wreaking havoc.
We obtained a list of the publicly available Dark Caracal-related IoCs from an in-depth Lookout report published in January 2018. From it, we obtained a list of:
We used two threat intelligence gathering tools to identify other possible IoCs that aren’t included in Lookout’s list, namely:
Using the 36 domain names from the Lookout report as search terms for DNS lookups, we obtained 12 IP addresses, none of which have been publicly disclosed as Dark Caracal IoCs. These include:
IP Address | Malicious? (According to VirusTotal) | |
---|---|---|
1 | 34[.]102[.]136[.]180 | Yes |
2 | 159[.]89[.]221[.]0 | No |
3 | 173[.]239[.]8[.]164 | Yes |
4 | 173[.]239[.]5[.]6 | Yes |
5 | 213[.]247[.]47[.]190 | Yes |
6 | 52[.]58[.]78[.]16 | Yes |
7 | 209[.]141[.]38[.]71 | Yes |
8 | 192[.]161[.]187[.]200 | Yes |
9 | 204[.]11[.]56[.]48 | Yes |
10 | 45[.]32[.]72[.]190 | No |
11 | 185[.]196[.]8[.]122 | Yes |
12 | 91[.]195[.]241[.]137 | No |
As shown, nine of the additional IP addresses are at the very least worth looking into although it may be safer for organizations to include them in their blacklists.
Using IP Geolocation Bulk GUI, we found that the majority of IP addresses in the combined IoC (publicly disclosed and not yet reported) list originated from the U.S.
Using the six email addresses from the Lookout report as search terms for advanced reverse WHOIS searches, we obtained a list of 11 domain names, five of which are identified in the said report. The six undisclosed domain names include:
Domain Name | Malicious? (According to VirusTotal) | |
---|---|---|
1 | nancyrazzouk[.]com | Yes |
2 | twiterservices[.]org | Yes |
3 | gmailservices[.]org | Yes |
4 | facebookservices[.]org | Yes |
5 | analytics-lb[.]com | No |
6 | arabpublishers[.]net | No |
As shown, four of the additional domain names are at the very least worth digging deeper into although they may also warrant inclusion in company blacklists.
Using Bulk WHOIS Lookup, we found that most of the domains in the combined list (totaling 39 domain names) were registered in the U.S., consistent with our IP geolocation findings. But contrary to IP geolocation information, all other registrant countries did not match the IP geolocation information.
We also found that a vast majority of the domain registrants did not disclose their WHOIS information either through redaction or privacy protection. Only 12 had publicly identifiable registrant details.
As this short study showed, not all possible IoCs for a cyber attack may be found in public records or incident reports. For organizations that wish to ensure utmost protection, domain research and monitoring using a variety of WHOIS, DNS, and IP intelligence tools may be necessary, especially since most undisclosed IoCs can be confirmed malware sources.
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC