The Evolving Threat of FreakOut: Unmasking the Logutil Backdoor and Combating Cyber Attacks

In recent times, cybercrime is one of the most significant threats all businesses in the digital age face, with global losses expected to reach $6 trillion annually by 2021, double the figure reported in 2015. Various types of malware and ransomware attacks can leave a devastating impact on businesses, costing millions in revenue, reputational damage, and loss of valuable assets. One of the most prolific and dangerous ransomware groups currently hacking companies globally is the DarkSide ransomware gang. In this article, we will investigate how the DarkSide group disbanded previously and has now resurfaced, rebuilding its infrastructure and recruiting affiliates to carry out new attacks.

The DarkSide ransomware group is rebuilding its infrastructure and recruiting affiliates

Earlier in May 2021, the DarkSide ransomware group announced that it was shutting down following the successful attack on Colonial Pipeline, which caused significant U.S. fuel shortages. The organizational shutdown was believed to be an attempt by the group to dispose of the notoriety that had developed after the Colonial Pipeline attack; however, this retreat was short-lived. Last month, the group was seen resurfacing, announcing that they were back in business and were recruiting new affiliates. Recent reports by cybercrime analysts indicate that the group is now actively building up their infrastructure, suggesting that it is only a matter of time before new attacks are launched.

The healthcare sector is a major target for cybercriminals due to valuable data and intellectual property

The healthcare sector has proven to be a lucrative target for cybercriminals, as it is a vast industry that holds a wealth of valuable data, including personal healthcare information, financial data, and intellectual property. The pandemic has made matters worse, as seeking medical attention has been restricted to telehealth appointments, making it easier for hackers to exploit vulnerabilities in the remote connectivity used by healthcare providers. Recent statistics from a cybersecurity survey indicate that the healthcare industry is the second most targeted industry, following the manufacturing sector.

Data theft and extortion are the primary goals of these campaigns

The primary goal of cybercriminals who target the healthcare sector is to steal valuable data, medical records, and intellectual property for extortion purposes. The black market for stolen healthcare data is fueling the growth of cybercrime. With the information stolen from healthcare providers, hackers can sell the data to criminals who then use it for identity theft, fraud, or blackmail. The stolen data may also be used to create fake insurance policies or prescriptions or to gain access to controlled substances. Data breaches can result in significant financial losses due to costs associated with notifications, regulatory fines, loss of trust, and possible litigation.

Logutil malware has been discovered as a backdoor for network control and data exfiltration

Recently, cybersecurity researchers have uncovered a new type of malware called Logutil, which targets healthcare providers. The Logutil malware is a backdoor that can enable hackers to control the victim’s network, exfiltrate data, and execute commands to gain a foothold in the victim’s system. The malware is known to exploit vulnerabilities in the network structure and take advantage of common locations, appearing genuine to avoid detection within the system.

Malware uses common locations to appear genuine and avoid detection

To remain undetected, the Logutil malware takes advantage of common locations such as %PROGRAM_FILES%, %PROGRAM_FILES_x86%, and C:WindowsSecurityDatabase. These locations make the malware appear genuine and avoid detection.

Logutil maintains persistence through DLL hijacking and takes advantage of the Winmgmt service

The Logutil malware is known to maintain its persistence by using DLL Hijacking and taking advantage of the Winmgmt service. The wmiprvsd.dll file requires the ncobjapi.dll file to function, which is mainly located in the c:windowssystem32 directory. Due to the way the DLL search order works, the %SYSTEM32%wbem folder is checked first, allowing the malicious loader to load.

Logutil’s command and control framework mentions ESXi and Linux, suggesting it has multiple platform capabilities

The Logutil malware comes with a command and control (C2) framework that mentions ESXi and Linux, suggesting that the hackers behind this malware are leveraging the flexibility of the Go programming language to develop a backdoor that can operate on multiple platforms. This feature makes it even more difficult for cybersecurity experts to prevent attacks on their networks.

Packages in Logutil include functions for data collection and staging

The packages found within the Logutil malware include cli, key, main, modules, and utils that implement different functions used for collecting and staging data for further exfiltration. The modules are known to be customized for specific healthcare providers’ structures, which further enhances the malware’s ability to avoid detection.

Remote desktop servers are being exploited with custom RDStealer malware, which utilizes the device redirection feature in Remote Desktop Protocol

Hackers behind the Logutil malware and DarkSide ransomware group are exploiting remote desktop servers using custom RDStealer malware. This malware takes advantage of a feature in the Remote Desktop Protocol called “device redirection,” which can be used to redirect files from the victim’s computer to the hacker’s command and control server.

Cybersecurity threats have become more sophisticated in recent years, and organizations must take proactive steps to stay ahead of the curve. Businesses should ensure they have robust cybersecurity protocols in place to prevent data breaches and ransomware attacks. The healthcare industry must also take measures to secure its systems as cyber attacks are on the rise, and the sensitive nature of the data they hold makes it a prime target for cybercriminals. The insights gained in this article demonstrate the evolving nature of cyber threats and the need for both organizations and individuals to take cybersecurity seriously.

Explore more

UK’s 5G Networks Lag Behind Europe in Quality and Coverage

In 2025, a digital challenge hovers over the UK as the nation grapples with underwhelming 5G network performance compared to its European counterparts. Recent analyses from MedUX, a firm specializing in mobile network assessment, have uncovered significant discrepancies between the UK’s target for 5G accessibility and real-world consumer experiences. While theoretical models predict widespread reach, everyday exchanges suggest a different

Shared 5G Standalone Spectrum – Review

The advent of 5G technology has revolutionized telecommunications by ushering in a new era of connectivity. Among these innovations, shared 5G Standalone (SA) spectrum emerges as a novel approach to address increasing data demands. With mobile data usage anticipated to rise to 54 GB per month by 2030, mainly due to indoor consumption, shared 5G SA spectrum represents a significant

How Does Magnati-RAKBANK Partnership Empower UAE SMEs?

The landscape for small and medium-sized enterprises (SMEs) in the UAE is witnessing a paradigm shift. Facing obstacles in accessing finance, SMEs now have a lifeline through the strategic alliance between Magnati and RAKBANK. This collaboration emerges as a pivotal force in transforming financial accessibility, employing advanced embedded finance services tailored to SMEs’ unique needs. It’s a partnership set to

How Does Azure Revolutionize Digital Transformation?

In today’s fast-paced digital era, businesses must swiftly adapt to remain competitive in the ever-evolving technological landscape. The concept of digital transformation has become essential for organizations seeking to integrate advanced technologies into their operations. One key player facilitating this transformation is Microsoft Azure, a cloud platform that’s enabling businesses across various sectors to modernize, scale, and innovate effectively. Through

Digital Transformation Boosts Efficiency in Water Utilities

In a world where water is increasingly scarce, the urgency for efficient water management has never been greater. The global water utilities sector, responsible for supplying this vital resource, is facing significant challenges. As demand is projected to surpass supply by 40% within the next decade, water utilities worldwide struggle with inefficiencies and high water loss, averaging losses of one-third