Hackers Target Windows and Linux with FINALDRAFT Malware

Article Highlights
Off On

A sophisticated hacking campaign has been unveiled recently by Elastic Security Labs, dubbed “REF7707,” which has been targeting both Windows and Linux systems using novel malware families, including FINALDRAFT, GUIDLOADER, and PATHLOADER. This campaign has been notable for its advanced tactics and poor operational security, leading to the exposure of additional adversary-owned infrastructure. The REF7707 campaign was first identified in late November 2024, when Elastic Security Labs observed a cluster of endpoint behavioral alerts at the Foreign Ministry of a South American country. The investigation uncovered a sprawling campaign with novel malware, sophisticated targeting, and a mature operating cadence. While the security experts at Elastic Security Labs noted that despite showing high technical competence in some areas, the attackers made tactical oversights that exposed pre-production malware samples and infrastructure.

Execution Flow

The primary execution chain began with the use of Microsoft’s certutil application to download files from a remote server. FINALDRAFT is a key component of the REF7707 intrusion set. FINALDRAFT has both Windows and Linux variants and uses an uncommon LOLBin (Living Off The Land Binary) tactic by abusing the Windows-signed debugger CDB.exe, renamed as fontdrvhost.exe. This binary executes malicious shellcode delivered via a weaponized config.ini file. Behavioral analysis revealed that FINALDRAFT injects shellcode into processes like mspaint.exe or conhost.exe if no target parameter is provided. Persistence was achieved using a Scheduled Task that invoked fontdrvhost.exe every minute as SYSTEM with the following command: schtasks /create /RL HIGHEST /F /tn “MicrosoftWindowsAppIDEPolicyManager” /tr “C:ProgramDatafontdrvhost.exe -cf C:ProgramDataconfig.ini -o C:ProgramData” /sc MINUTE /mo 1 /RU SYSTEM. FINALDRAFT establishes command and control using Microsoft’s Graph API, blending in with legitimate organizational traffic and evading network-based detection. The campaign heavily utilizes cloud and third-party services for command and control, with domains like support.vmphere[.]com and update.hobiter[.]com identified in the malware samples.

Security Implications and Countermeasures

The use of FINALDRAFT across both Windows and Linux platforms illustrates the need for robust cross-platform security measures. This tactic of exploiting legitimate software to cloak malicious activities shows that traditional network security measures are not sufficient on their own. Organizations must adopt advanced endpoint detection and response (EDR) solutions that can detect and mitigate such sophisticated threats. Furthermore, regular updates to threat intelligence databases and continuous monitoring of network traffic are crucial to identify and block malicious communications promptly.

In addition, companies need to implement strict access controls and ensure that only essential personnel have elevated privileges within their networks. Even sophisticated attacks like REF7707 can be thwarted if attackers are deprived of the ability to move laterally within a network. Regular security training for employees can also help in identifying phishing attempts and other common attack vectors. As attackers continue to develop new techniques, the collaboration between cybersecurity firms and organizations becomes even more vital. By sharing threat intelligence and best practices, the collective defense against such advanced threats can be strengthened.

Conclusion

FINALDRAFT’s deployment on both Windows and Linux highlights the necessity of strong cross-platform security. The practice of using legitimate software to mask harmful activities proves that traditional network security measures are insufficient alone. Organizations need to adopt advanced endpoint detection and response (EDR) solutions capable of detecting and countering such advanced threats. Additionally, it’s vital to keep threat intelligence databases updated and consistently monitor network traffic to quickly identify and block malicious communications.

Firms must also enforce strict access controls, ensuring that only crucial personnel have elevated network privileges. Even advanced attacks like REF7707 can be prevented if attackers can’t move freely within the network. Continuous security training for employees can aid in recognizing phishing attempts and other frequent attack methods. As cybercriminals evolve, collaboration between cybersecurity firms and organizations becomes even more critical. By sharing threat intelligence and best practices, we can collectively strengthen our defense against these sophisticated threats.

Explore more

ServiceNow Transforms B2B Marketing with Human-Centric Approach

What if the often sterile and transactional realm of B2B marketing could captivate audiences with the same emotional pull as a viral consumer campaign? In an era where business decisions are made by people craving connection, ServiceNow, a titan in digital workflow solutions, is rewriting the rules. Under the visionary leadership of Chief Marketing Officer Colin Fleming, this company is

Why Are Prepaid Cards the Future of Payroll Management?

Welcome to an insightful conversation with Ling-Yi Tsai, a renowned HRTech expert with decades of experience in transforming organizational processes through innovative technology. With a deep focus on HR analytics and the seamless integration of tech solutions in recruitment, onboarding, and talent management, Ling-Yi has a unique perspective on how payroll systems are evolving to meet modern workforce needs. Today,

Can 5G Traffic Be Sniffed Without Rogue Base Stations?

Introduction Imagine stepping out of an elevator or turning off airplane mode after a long flight, unaware that in those fleeting moments, your 5G connection could be vulnerable to interception. As 5G networks become the backbone of global communication, ensuring their security is paramount, especially during the initial connection phases where data might be exposed. This pressing issue raises critical

Trend Analysis: Embedded Finance for Credit Access

Imagine scrolling through a favorite e-commerce app to buy a much-needed gadget, only to be offered an instant loan at checkout with just a few clicks—no bank visits, no lengthy paperwork. This seamless integration of financial services into everyday digital platforms is the essence of embedded finance, a transformative trend that is reshaping how credit is accessed in unexpected places

Embedded Finance: Driving Global Business Growth with Payments

What if the secret to skyrocketing business success in a hyper-connected world lies not in groundbreaking products, but in the invisible threads of financial transactions woven into every customer interaction? Picture a small online retailer in Texas effortlessly selling to customers in Tokyo, with payments processed instantly in yen, without ever touching a bank portal. This is the power of