- The WicKed Web Weekly
- Posts
- Malware Masquerade
Malware Masquerade
As we wrap up another year, let's not forget that the world of cybersecurity never takes a holiday break.
Good Morning, Digital Defenders! As we wrap up another year, let's not forget that the world of cybersecurity never takes a holiday break. Today, we're diving into the digital deep end, where the currents of innovation flow alongside undercurrents of cyber threats.
First up, the PikaBot malware. It's like a digital chameleon, blending into seemingly innocent Google ads and redirecting users to its lair. It's a stark reminder that not all that glitters in our digital gold rush is gold. Speaking of gold, did anyone catch that golden nugget about Costco selling actual gold bars? Talk about a shiny distraction!
Next, we explore the bustling API economy, growing at a breakneck speed with a projected market size of USD 3,034 million by 2028. It's a world where data flows like currency, and the API-first approach is the new gold standard. But as APIs weave the digital fabric tighter, the threat of cyber scissors looms larger, ready to snip at any loose thread.
Lastly, we unmask the 8220 hacker group. These digital desperados have been exploiting server vulnerabilities faster than you can say "update your software." Their tactics are a stark reminder that in the vast web of digital information, spiders are always waiting.
So, grab your digital armor and let's step into the cyber battlefield, where the fight for security is as relentless as the quest for innovation. Stay safe, stay informed, and remember, in the world of cybersecurity, knowledge is your mightiest sword!

Malware Masquerade: PikaBot's Devious Disguise
In the ever-evolving world of cyber threats, a new player, PikaBot, is making waves. Initially distributed via malspam, akin to QakBot, PikaBot has now entered the realm of malvertising. This malware loader, first seen in early 2023, is cleverly disguised as popular software like AnyDesk, deceiving users into downloading it.
PikaBot, which operates as both a backdoor and a distributor for other payloads, allows attackers to remotely access and command compromised systems. TA577, a notorious cybercrime group, has been actively using PikaBot to distribute other malicious tools, including Cobalt Strike.
The recent discovery revealed that PikaBot, along with DarkGate, is propagated through malvertising campaigns, tricking users via a malicious Google ad. This ad redirects to a fake website, hosting a harmful MSI installer on Dropbox. The campaign smartly avoids detection by fingerprinting requests and ensuring they don't originate from virtual machines.
Malwarebytes notes this tactic resembles other malvertising chains, suggesting a 'malvertising-as-a-service' trend. The rise in malvertising highlights the growing use of browser-based attacks for network infiltration. Accompanying this is ParaSiteSnatcher, a Chrome extension targeting users in Latin America, designed to steal sensitive information.
Cybersecurity remains a cat-and-mouse game, with malvertising emerging as the latest tool in the arsenal of cybercriminals.

API Economy: The New Frontier in Cybersecurity and Innovation
The API (Application Programming Interface) economy, a vital cog in the digital transformation wheel, is witnessing unprecedented growth. By 2028, the global API security market is expected to balloon to USD 3,034 million from USD 744 million in 2023, growing at a Compound Annual Growth Rate of 32.5%.
APIs are the building blocks of the digital age, facilitating the flow of data and services and acting as the backbone of the API economy. This ecosystem is not just a technological concept but a symbiotic digital service exchange platform, fueling innovation and new market opportunities.
However, with great power comes great responsibility. The popularity of APIs also makes them prime targets for cybercriminals. Malicious API traffic soared by 681% in 2022, underlining the importance of robust API security measures.
Key API economy trends include:
Microservices Architecture: Transitioning from monolithic to microservices, increasing the need for sophisticated security strategies.
GraphQL: Offering flexibility in data fetching and modification but introducing unique vulnerabilities.
API Marketplaces: Spurring growth but necessitating thorough vetting of third-party integrations.
AI-Driven API Security: Enhancing detection capabilities while emphasizing the need for human-led assessments.
API-First Development: Prioritizing API design for user experience and scalability, necessitating a security-first approach.
Enhanced Rate Limiting and Throttling: Preventing misuse while maintaining performance.
OAuth 2.1: Simplifying and securing token-based authentication.
The API economy is a realm of innovation and connectivity. For businesses and cybersecurity professionals, staying abreast of these trends is critical for navigating this promising yet vulnerable digital landscape.

8220 Hacker Group: A Persistent Cyber Threat
The 8220 hacker group, identified by Cisco Talos in 2017, has been a persistent threat in the cyber world, exploiting vulnerabilities in both Windows and Linux web servers. Recently, they've leveraged flaws in Oracle WebLogic (CVE-2017-3506) and the notorious Log4Shell vulnerability (CVE-2021-44228).
This group's repertoire includes a range of exploited vulnerabilities, notably in Confluence, Log4j, Drupal, Hadoop YARN, and Apache Struts2 applications. Their tactics, techniques, and procedures (TTPs) have evolved, utilizing various publicly released exploits.
Exploitation Techniques
The group exploited a remote code execution vulnerability in Oracle WebLogic Server (CVE-2020-14883), combined with an authentication bypass vulnerability (CVE-2020-14882).
They've developed two distinct exploit chains. One involves loading an XML file for command execution on the operating system, while the other executes Java code directly.
Infection Chains
The first chain varies depending on the target OS. On Linux, it involves downloading files using cURL, wget, lwp-download, python urllib, and a custom bash function.
This method injects Java code to evaluate the OS and execute commands. Post-infection, hosts are compromised with AgentTesla, rhajk, and nasqa malware variants.
A comprehensive report details the group's exploitation methods, commands used, encoding strategies, and other critical information.
These activities underscore the ongoing and evolving threat posed by sophisticated hacker groups like 8220. Their ability to exploit known vulnerabilities highlights the crucial need for vigilant cybersecurity practices and timely patching of software vulnerabilities.