Menu
Custom developed Dripion backdoor used in highly targeted attacks in Asia, US

Custom developed Dripion backdoor used in highly targeted attacks in Asia, US

The malware may be linked to a known cyberespionage group that targets companies with interests in Taiwan

A new custom developed backdoor program has been used in highly targeted attacks against organizations from Taiwan, Japan, South Korea and the U.S. over the past year.

Malware researchers from Symantec first came across the program, which they've named Dripion, in August 2015. However, due to its custom nature and sparse use, it has managed to fly under the radar since as early as November 2013.

When their analysis began, the Symantec researchers believed Dripion was a local threat used against organizations in Taiwan, where most of its victims were found. However, since then, they have found computers infected with the backdoor in other countries as well.

The program's creators went to great lengths to disguise the malware's activities. It is installed on computers by another malicious program known as Blugger, which uses encryption to hide its communications.

Blugger downloads the Dripion backdoor from what appear to be English-language blogs. It's not clear if these are legitimate blogs that have been compromised, or if the attackers intentionally created the sites.

After it's installed on a computer, Dripion connects to command-and-control domains with names similar to those of several antivirus companies in an attempt to further hide the malicious traffic in victims' network logs.

Dripion allows attackers to steal information and files from infected computers, as well as upload new files and execute them.

Symantec has also found links between Dripion and a cyberespionage group known as Budminer that, until 2014, has used a different backdoor program called Taidoor. Budminer is known for launching targeted attacks since 2009 against international think tanks, manufacturers and defense contractors with interests in Taiwan.

It's possible that Dripion is Budminer's new malware tool, created after Taidoor was exposed and documented by security researchers. There are no code similarities between the two programs, though, suggesting that Dripion was developed from scratch.

The Dripion case shows that custom developed backdoors used in a small number of highly targeted attacks can easily bypass traditional anti-malware defenses and remain undetected for a long time. Defending against them requires a multi-layered security approach.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments