Python Backdoor Talking to a C2 Through Ngrok, (Thu, Dec 10th)

SANS Internet Storm Center, InfoCON: green 2020-12-10

Summary:

I spotted a malicious Python script that implements a backdoor. The interesting behavior is the use of Ngrok to connect to the C2 server. Ngrok has been used for a while by attackers. Like most services available on the Internet, it has been abused by attackers for a long time. If you&#;x26;#;39;re not familiar with Ngrok[1], here is the principle: You download the Ngrok client and publish your services (ex: a web server) in the wild. Ngrok acts like a reverse-proxy and allows access to your published services. Because Ngrok is very popular, it&#;x26;#;39;s often not considered as harmful and is allowed to bypass firewalls, NAT, etc... By default, the host assigned to your published service is random but, if you create an account, you can force the host to be used (and use it in your malicious code). Example:

Link:

https://isc.sans.edu/diary/rss/26866

From feeds:

Intel Hub ยป T01 - SANS Internet Storm Center, InfoCON: green

Tags:

Date tagged:

12/10/2020, 03:07

Date published:

12/10/2020, 02:41