From a646a835fe2db85071b8ec7a7baa03cc2b38a823 Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Tue, 14 Aug 2018 10:09:26 +0200 Subject: [PATCH] add Rosenbridge backdoor --- clusters/backdoor.json | 15 ++++++++++++++- clusters/ransomware.json | 3 +++ 2 files changed, 17 insertions(+), 1 deletion(-) diff --git a/clusters/backdoor.json b/clusters/backdoor.json index c0d2adb..e232d52 100644 --- a/clusters/backdoor.json +++ b/clusters/backdoor.json @@ -2,7 +2,7 @@ "uuid": "75436e27-cb57-4f32-bf1d-9636dd78a2bf", "description": "A list of backdoor malware.", "source": "Open Sources", - "version": 1, + "version": 2, "values": [ { "meta": { @@ -14,6 +14,19 @@ "description": "Cross-platform malware written in Golang, compatible with Linux and Windows. Although there are some minor differences, both variants have the same functionality. The malware communicates with a CnC server using HTTP requests and performs functions based on the received commands. Results of command execution are sent in HTTP POST requests data (RSA-encrypted). Main functionalities are: (1) Execute arbitrary shell commands, (2) Upload/Download files. The PE variant of the infection, in addition, executes PowerShell scripts. A .Net version was also observed in the wild.", "value": "WellMess", "uuid": "e0e79fab-0f1d-4fc2-b424-208cb019a9cd" + }, + { + "value": "Rosenbridge", + "description": "The rosenbridge backdoor is a small, non-x86 core embedded alongside the main x86 core in the CPU. It is enabled by a model-specific-register control bit, and then toggled with a launch-instruction. The embedded core is then fed commands, wrapped in a specially formatted x86 instruction. The core executes these commands (which we call the 'deeply embedded instruction set'), bypassing all memory protections and privilege checks.\n\nWhile the backdoor should require kernel level access to activate, it has been observed to be enabled by default on some systems, allowing any unprivileged code to modify the kernel.\n\nThe rosenbridge backdoor is entirely distinct from other publicly known coprocessors on x86 CPUs, such as the Management Engine or Platform Security Processor; it is more deeply embedded than any known coprocessor, having access to not only all of the CPU's memory, but its register file and execution pipeline as well.", + "meta": { + "date": "August 2018", + "refs": [ + "https://www.bleepingcomputer.com/news/security/backdoor-mechanism-discovered-in-via-c3-x86-processors/", + "https://github.com/xoreaxeaxeax/rosenbridge", + "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Christopher%20Domas/DEFCON-26-Christopher-Domas-GOD-MODE-%20UNLOCKED-hardware-backdoors-in-x86-CPUs.pdf" + ] + }, + "uuid": "2bb165dc-9f93-11e8-ae64-d3dbab0dd786" } ], "authors": [ diff --git a/clusters/ransomware.json b/clusters/ransomware.json index 5b384ca..4ff8a75 100644 --- a/clusters/ransomware.json +++ b/clusters/ransomware.json @@ -10090,6 +10090,9 @@ ] }, "uuid": "22b4070e-9efe-11e8-b617-ab269f54596c" + }, + { + "value": "STOP Ransomware" } ], "source": "Various",