Press ReleaseCyber Crime & ForensicCyber SafetyThreat Detection & Defense

MysterySnail Gets a Boost: Kaspersky Warns of Modified Remote Access Attacks on Organisations in Russia and Mongolia

Kaspersky warns of a revamped MysterySnail Remote Access Trojan targeting organisations in Russia and Mongolia, highlighting the risks of underestimating older malware strains.

Kaspersky GReAT has detected a new wave of attacks with MysterySnail, a Remote Access Trojan, on organisations in Mongolia and Russia. In 2021 Kaspersky discovered the actor behind the original MysterySnail RAT was IronHusky, a Chinese-speaking threat actor. In recent years the attack sequence and the malware itself was modified and targeted new victims, with the same group likely behind it.

One of the recent infections Kaspersky detected was delivered through a malicious script for Microsoft Management Console (MMC, a component of Windows OS that provides system administrators and users with an interface for configuring and monitoring the system). This script is disguised as an MS Word document from the National Land Agency of Mongolia (ALAMGAC).

A malicious MMC script, as displayed in Windows Explorer. It has the icon of a Microsoft Word document.

After a user opens the file and inadvertently runs the script, other malicious files are downloaded and run, including a malicious library named CiscoSparkLauncher.dll, which is a backdoor that then downloads and runs the MysterySnail RAT malware. It then communicates with attacker-created servers via the HTTP protocol.

The new MysterySnail RAT is able to run about 40 commands, and their implementation is different compared to the older MysterySnail RAT discovered in 2021. It can read, write and delete files, manage operating system processes and connect to network resources.

Notably, a short time after Kaspersky blocked the recent intrusions related to the new MysterySnail RAT, there were continued attacks with a more lightweight version of the malware. It consists of a single component which Kaspersky dubbed MysteryMonoSnail. It communicates with the attackers’ servers using the WebSocket protocol instead of HTTP and has only 13 basic commands as opposed to 40.

Seemingly old malware families, even those dormant or unreported for years, can remain active and resurface unexpectedly, posing significant risks. Retiring security tool signatures designed to detect historical malware simply because of their age is a dangerous oversight that could leave systems vulnerable. At Kaspersky, we proactively address this by providing customers of our Threat Intelligence portal with comprehensive sets of Indicators of Compromise covering both legacy and emerging malware, ensuring robust defense against evolving threats,” comments Georgy Kucherin, Security Researcher with Kaspersky GReAT. “In the future, cybercriminals may leverage these older, overlooked malware strains, blending them with modern techniques to exploit gaps in outdated defenses. To stay ahead, organisations must integrate continuous threat intelligence into their security strategies, combining historical data with real-time insights to anticipate and neutralise threats before they strike.

To help organisations protect against attacks, Kaspersky recommends the following measures:

  • Deploy multi-layered security solutions with real-time threat detection capabilities. Kaspersky Next XDR Expert aggregates and correlates data from multiple sources using machine-learning technologies for effective threat detection and automated response to sophisticated attacks.
  • Conduct regular cybersecurity awareness training for employees, with a special focus on recognising sophisticated spear-phishing attempts.
  • Use the latest Threat Intelligence information to stay aware of actual TTPs used by threat actors.
  • Back up the corporate data regularly.

 

 

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *