MESSAGETAP/APT41 Activity
Description
What is the issue specifically?
The FortiGuard Labs SE team is aware of a new state
sponsored attack dubbed "MESSAGETAP" discovered by researchers at FireEye.
MESSAGETAP is an infostealer that can steal SMS text messages, IMSI numbers and
specific keywords for later exfiltration. This new APT is assigned the number
41, which follows the nomenclature of FireEye's naming convention. FireEye has
attributed APT41 to China.
How was this
discovered?
FireEye states this sample was discovered in 2019
during an investigation of an unnamed telecom provider.
What is the threat
specifically?
MESSAGETAP is a 64-bit ELF file that is designed to
exfiltrate information from servers hosting SMS services, IMSI data and any other
specific keywords targeted by the attackers. The malware looks for the creation
of two specific text files keyword_parm.txt and parm.txt on the targeted
machine and will check the contents of these files every 30 seconds. Contained within these text files is logged
data that contains IMSI numbers, which is a number that uniquely identifies
every individual caller of a mobile network. It is stored in a 64-bit field and
is sent from device to the carrier once a connection is established. Additional
data stored in these log files are phone numbers and specific keyword data. The
files are then loaded into memory and deleted off the disk once accessed.
Outside of the logging of phone numbers connected to the network, it will also register
calls made from devices as well.
MESSAGETAP will then utilize the open source
libpcap library to intercept all targeted traffic to and from the server, where
it will then exfiltrate the targeted variables off the machine for later
analysis. Finally, it will seek to intercept SMS messages checking against a
blacklist of IMSI numbers alongside using specific keywords to determine if the
SMS messages contain specific text that are hostile to the Chinese government.
If these keywords are found, the file will be logged elsewhere to the system
for later exfiltration.
How widespread
were these attacks?
Spread is limited to targeted attacks in the
telecom vertical.
Are these recent
attacks?
According to FireEye, this attack was first
discovered in August of 2019.
What operating
systems are affected?
Linux based systems, specifically those acting as Short
Message Service Center (SMSC) servers.
What is the status
of AV and IPS coverage?
Fortinet customers running the latest definition set are protected against this threat with the following AV signature:
ELF/Messagetap.A!tr
Any suggested
recommendations or mitigations?
The FortiGuard SE team recommends that all AV and
IPS definitions are kept up to date on a continual basis, and to always
maintain a proactive patching routine when vendor updates are available. If it
is deemed that patching is not feasible at this time, it is recommended that a
risk assessment is conducted to determine additional mitigation safeguards
within an environment.
Also, the FortiGuard SE and FortiGuard Labs teams are
proactively monitoring the threat landscape for the latest announcements made
by researchers through the responsible disclosure process or elsewhere to
ensure that customers are protected with latest mitigation strategy and
signature updates affecting the threat ecosystem.