Analysing XeGroup’s Arsenal Of Cyberattack Methods

In an era when cybercrime is becoming increasingly unpredictable, it is hard to truly say what is coming around the corner. However, at the end of last year, we did make several key predictions for 2023.

After continuing to see an uptick in Highly Evasive Adaptive Threat (HEAT) techniques, a new class of cyber threats that have emerged - these have been tailored to evade protective tools such as firewalls, secure web gateways, and malware analysis technologies, and we expect to see more of this in the future. 

At the same time, we anticipated that basic security failures would continue to plague companies, with simple and proven methods such as social engineering techniques often providing open doors to attackers. We also identified browser-based attacks as a key area of concern, with attackers exploiting both new and old vulnerabilities.

Ultimately, the truth of the matter is that threat actors are continuing to adapt and evolve their techniques. And as a result, we are seeing a combination of novel threats and proven attack methods that together are creating an increasingly volatile threat landscape.

Of course, some attack groups have developed a track record for primarily focusing their efforts on exploiting one vulnerability or using one technique. However, others have demonstrated an appetite for deploying a range of threat methods to target their victims.

With regards to the latter category, XeGroup stands as a prime example.

Believed to have been established and active since at least 2013, this threat group that is likely to be based in Vietnam has been responsible for a number of nefarious activities, including:

  • Supply chain attacks that inject credit card skimmers into web pages.
  • Creating fake websites to deceive users into revealing their personal information.
  • Selling stolen data on the dark web.

XeGroup’s Track Record

Security research group, Volexity detailed the specific tactics, techniques, and procedures (TTPs) used by XeGroup in a recent report, this suggesting that the group may be associated with both other cybercriminal organisations and state-sponsored hacking groups. 

The group was first identified in 2013 when it successfully exploited retail point-of-sale (PoS) systems globally through its malware called “Snipr”, which was created specifically for this purpose.

Indeed, it is estimated that the threat outfit has stolen more than $30 million from US-based corporations, as well as compromising several websites and mobile applications with malicious code designed to steal payment card data from unsuspecting customers.

Arguably, the most prevalent technique used by XeGroup is the injection of malicious JavaScript into web pages, previously used to successfully exploit vulnerabilities in Magento e-commerce platforms and Adobe ColdFusion server software. 

Further, in addition to stealing financial information directly, XeGroup has also demonstrated a track record for attempting to gain access to corporate networks through the deployment of phishing emails sent out using fake domains impersonating legitimate companies, such as PayPal and eBay.

Such activities continued for seven years until August 2020, when XeGroup was said to have been taken down after Volexity’s researchers reported their findings to law enforcement agencies, resulting in several key arrests across multiple countries. 

Adapted Attack Methods

Unfortunately, however, it seems that XeGroup has once again reappeared, and is now actively attempting to exploit the CVE-2019-18935 vulnerability.

If done so successfully, this can enable threat actors to execute arbitrary code remotely on a vulnerable server by exploiting a deserialisation vulnerability in the Telerik.Web.UI assembly. 

These efforts were flagged by the US Cybersecurity and Infrastructure Security Agency (CISA) in an advisory published back in 15 March 2023. Further research from the Menlo Labs threat intel team affirms that XeGroup actors are targeting government agencies, construction firms, and healthcare organisations across our customer base.

Further, XeGroup is also now associated with the use of ASPXSPY web shells – scripts that are intentionally designed to be malicious, allowing threat actors to gain unauthorised access to web servers and carry out further attacks.

Protecting Against Varied Threats

XeGroup’s diverse array of threat techniques highlight just how imperative it is for organisations to enhance their defences to combat today’s HEAT attacks and other security threats.

No longer can companies rely on outdated detect and remediate solutions. Today, they must also adopt preventative security measures to ensure any attempts from threat actors can be thwarted in the first instance.

One straightforward way to achieve this is through isolation technology. Designed to support organisations in achieving zero trust in the truest sense, it a solution that creates a ‘digital air gap’ that ensures all active code - be it malicious or not - is executed in isolated cloud containers, removing any risk from common web and email attack vectors. 

Brett Raybould is EMEA Solutions Architect at Menlo Security

You Might Also Read: 

Highly Evasive Adaptive Threats & Advanced Persistent Threats:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Year in Review: Biggest Application Security Breaches Of 2022
US Government Agencies Attacked By Russian Criminals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

Alan Turing Institute

Alan Turing Institute

Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Advisera 27001Academy

Advisera 27001Academy

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR.

Cyber-Physical Systems Security Institute (CPSSI)

Cyber-Physical Systems Security Institute (CPSSI)

CPSSI is a non-profit, by-invitation-only research and educational organization focused on practical and theoretical solutions to the cybersecurity challenges facing Cyber-Physical Systems.

MPC Alliance

MPC Alliance

A consortium of developers and practitioners of multiparty computation (MPC), committed to accelerating market awareness and adoption of MPC to increase the security and privacy of online services.

Early Birds

Early Birds

Early Birds is a Business to Business (B2B) marketplace for Innovators (Startups/Scaleups) and Early Adopters to exchange value early on.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

Control D

Control D

Control D is a modern and customizable DNS service that blocks threats, unwanted content and ads - on all devices.

Ethnos Cyber

Ethnos Cyber

Ethnos Cyber is Africa’s leading cybersecurity and compliance management company. We provide Information Security, Risk Management, Cybersecurity and Compliance Management solutions to clients.