Operation TunnelSnake
Description
(Kaspersky) In this blog post we will focus on the following key findings that came up in our investigation:
• A newly discovered rootkit that we dub ‘Moriya’ is used by an unknown actor to deploy passive backdoors on public facing servers, facilitating the creation of a covert C&C communication channel through which they can be silently controlled; • The rootkit was found on networks of regional diplomatic organizations in Asia and Africa, detected on several instances dating back to October 2019 and May 2020, where the infection persisted in the targeted networks for several months after each deployment of the malware; • We observed an additional victim in South Asia, where the threat actor deployed a broad toolset for lateral movement along with the rootkit, including a tool that was formerly used by APT1. Based on the detection timestamps of that toolset, we assess that the attacker had a foothold in the network from as early as 2018; • A couple of other tools that have significant code overlaps with Moriya were found as well. These contain a user mode version of the malware and another driver-based utility used to defeat AV software.
Names
Name | Name-Giver |
---|---|
Operation TunnelSnake | Kaspersky |
Country
Motivation
- Information theft and espionage
First Seen
2018
Observed Countries
Tools
Information
Other Information
Uuid
841c5da3-a545-4f1b-b26b-098ede8fa700
Last Card Change
2025-06-27