25.9 C
New York
Sunday, August 3, 2025

‘Sandman’ hackers backdoor telcos with new LuaDream malware


‘Sandman’ hackers backdoor telcos with new LuaDream malware

A beforehand unknown menace actor dubbed ‘Sandman’ targets telecommunication service suppliers within the Center East, Western Europe, and South Asia, utilizing a modular info-stealing malware named ‘LuaDream.’

This malicious exercise was found by SentinelLabs in collaboration with QGroup GmbH in August 2023, who named the menace actor and malware after the backdoor’s inner identify of ‘DreamLand shopper.’

The operational fashion of Sandman is to maintain a low profile to evade detection whereas performing lateral motion and sustaining long-term entry to breached programs to maximise its cyberespionage operations.

A well-liked goal

The Sandman menace actor targets telecommunication service suppliers within the Center East, Western Europe, and South Asia subcontinents.

SentinelOne says the menace actor first positive factors entry to a company community utilizing stolen administrative credentials.

As soon as the community is breached, Sandman has been seen utilizing “pass-the-hash” assaults to authenticate to distant servers and providers by extracting and reusing NTLM hashes saved in reminiscence.

The SentinelLabs report explains that, in a single occasion, all workstations focused by the hackers have been assigned to managerial personnel, indicating the attacker’s curiosity in privileged or confidential data.

Geographic distribution of Sandman targets
Geographic distribution of Sandman targets
Supply: SentinelLabs

LuaDream malware

SandMan has been seen deploying a brand new modular malware named ‘LuaDream’ in assaults utilizing DLL hijacking on focused programs. The malware will get its identify from utilizing the LuaJIT just-in-time compiler for the Lua scripting language

The malware is used to gather information and handle plugins that reach its performance, that are obtained from the command and management server (C2) and executed domestically on the compromised system.

The malware’s growth seems to be lively, with a retrieved model string indicating the discharge quantity “12.0.2.5.23.29,” and the analysts have seen indicators of logs and testing features going way back to June 2022.

LuaDream’s staging depends on a complicated seven-step in-memory course of aiming to evade detection, initiated by both the Home windows Fax or Spooler service, which runs the malicious DLL file.

Sandman staging proccess
Sandman staging proccess
Supply: SentinelLabs

SentinelLabs reviews that the timestamps within the DLL recordsdata used for order hijacking are very near the assaults, which could point out they have been custom-created for particular intrusions.

Anti-analysis measures within the staging course of embrace:

  • Concealing LuaDream’s threads from debuggers.
  • Closing recordsdata with an invalid deal with.
  • Detecting Wine-based sandbox environments.
  • In-memory mapping to dodge EDR API hooks and file-based detections.
  • Packing staging code with XOR-based encryption and compression.

LuaDream contains 34 parts, with 13 core and 21 help parts, which make the most of the LuaJIT bytecode and the Home windows API by means of the ffi library.

Core parts deal with the malware’s major features, like system and consumer information assortment, plugin management, and C2 communications, whereas help parts take care of the technical features, like offering Lua libs and Home windows API definitions.

The malware's main components
The malware’s principal parts (SentinelLabs)

Upon initialization, LuaDream connects to a C2 server (through TCP, HTTPS, WebSocket, or QUIC) and sends gathered data, together with malware variations, IP/MAC addresses, OS particulars, and so forth.

Because of the attackers deploying particular plugins by means of LuaDream in every assault, SentinelLabs does not have an exhaustive checklist of all plugins accessible.

Nonetheless, the report notes one module named ‘cmd,’ whose identify suggests it provides the attackers command execution capabilities on the compromised gadget.

Whereas a few of Sandman’s {custom} malware and a part of its C2 server infrastructure have been uncovered, the menace actor’s origin stays unanswered.

Sandman joins a rising checklist of superior attackers concentrating on telecom corporations for espionage, utilizing distinctive stealthy backdoors which might be difficult to detect and cease.

Telecommunication suppliers are a frequent goal for espionage actions because of the delicate nature of the information they handle.

Earlier this week, we reported on a brand new cluster of exercise tracked as ‘ShroudedSnooper‘ that used two novel backdoors, HTTPSnoop and PipeSnoop, in opposition to telecommunication carriers within the Center East.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles