Iron Group Backdoor
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
At the time of publication it is not known how the backdoor is spread, but it is most likely to be via spam emails or malvertising. The Iron group is believed to be based in China.
When the malware is executed it installs a Windows service with the name helpsvc and an infected version of the Adblock Plus extension for the Chrome web browser. A scheduled task is created to launch Chrome as a background process whenever it is not running.
The malware attempts to obtain cryptocurrency by a range of means including mining, stealing wallet addresses and redirecting payments to the group's own wallet address. It also drops a version of the Maktub ransomware in an attempt to obtain cryptocurrency by extortion.
The group has developed anti-analysis features in the malware. It installs a fake root authority certificate to make the malware appear genuine, it obfuscates some function names and it refuses to install on some virtual machines.
Remediation advice
To prevent and detect an infection, ensure that:Remediation steps
Last edited: 17 February 2020 12:45 pm