Today : Apr 30, 2025
Technology
06 August 2024

Hacked ISP Delivers Malware To Users Via Flawed Software Updates

Cyber attackers exploit vulnerabilities from internet providers, leaving Mac and Windows users at risk with tainted downloads

Cybersecurity experts are sounding alarms about a complex malware operation affecting Mac and Windows users. This recent wave of attacks, attributed to hackers infiltrated through their internet service providers (ISP), showcases the serious vulnerabilities presented by unsecure software updates. The ramifications of these assaults could be severe, as they haven’t just compromised user devices but have the potential to jeopardize personal and sensitive information.

The drama unfolded when researchers from Volexity, a security firm, reported finding evidence of malware delivery through the manipulation of legitimate software update processes. How did they execute this? Quite alarming: the hackers reportedly compromised the routers and other device infrastructures of the ISP, which then allowed them to distort domain name system (DNS) responses, directing users to malicious servers instead of the legitimate update sources.

This insidious approach worked even for users who thought they were protected—those who opted for public DNS services like Google’s 8.8.8.8 or Cloudflare’s 1.1.1.1 were still at risk. It’s pretty stunning. For the layman, think of DNS as the phonebook of the web; when you type in www.example.com, your system looks it up to find the right IP address. If this lookup is hijacked, as seen here, the user can end up at dangerous sites without even knowing.

“That is the fun/scary part—this was not the hack of the ISPs DNS servers,” explained Steven Adair, CEO of Volexity, emphasizing the enormity of the breach. He highlighted how the attack was not merely about tampering with the DNS on the ISP's end, but rather intercepting and manipulating the overall network traffic. This means even the most careful users, those who rely on reputed public DNS servers, could still fall prey to this hacking scheme.

Users of at least six different applications have been affected, including well-known software such as 5KPlayer, Quick Heal, and those developed by Corel and Sogou. Since the software updates did not utilize secure transport layer security (TLS) or cryptographic signatures to confirm the authenticity of the connections, perpetrators succeeded at performing machine-in-the-middle (MitM) attacks.

To unpack the technical mumbo jumbo—think of MITM as when someone intercepts your conversation to alter what’s being said, leading you to believe everything is normal when it’s actually laced with trickery. When users attempted to update their software, they were redirected to malicious sites where everything might look similar to the legitimate updates but were twisted to include malware.

This hacking group, tracked under the name StormBamboo, was able to deliver threats disguised as innocent updates. For example, the 5KPlayer app checks for available updates using unsecure HTTP—rather than HTTPS—and the attackers seized this opportunity. By manipulating DNS responses, they influenced the app to download from their compromised servers. Once the system downloaded what appeared to be benign files, the files would execute harmful scripts, introducing malware to the device.

Volexity modeled the flow of this attack to show just how easy it is for malicious actors to exploit such vulnerabilities. The diagram illustrated the deceptive transmission of these updates, which, once they reached users’ devices, set off alarms for potential data breaches. The malware identified includes two notable pieces: MACMA for macOS and POCOSTICK for Windows.

These twisted programs are not your garden-variety malware. MACMA has capabilities including device fingerprinting, screen capturing, and even running terminal commands without the user's knowledge. Similarly, POCOSTICK is notorious for its stealth. Having been used since at least 2014, it has primarily been associated with Chinese-speaking threat groups known for their adeptness at hiding their tracks, which explains the length of time it’s been active.

Volexity’s findings dovetail with prior investigative work by Google’s Threat Analysis Group, which first brought MACMA to light. They suggested configurations and more secure software update methods to avert such intrusions but clearly, the situation is still precarious.

So, what’s one to do to avoid becoming the next victim of such sophisticated attacks? Volexity recommends several preventative measures. The most straightforward but possibly inconvenient option is to refrain from using any software updates delivered through unsecure connections. This could put people at serious risk of missing critical updates but it would drastically reduce exposure to potential malware.

Other recommended preventive measures include utilizing DNS over HTTPS or DNS over TLS. These methods secure the lookups made by DNS queries, ensuring they cannot be tampered with. Adair acknowledged the necessity of these safeguards but pointed out they are still only available through select DNS providers—trusting merely on established names might not be enough.

The recent claims by Volexity included knowledge of multiple servers actively serving malicious software but refrained from disclosing the compromised ISP’s name. Adair commented, “It’s not a big huge one or one you’d likely know,” indicating the widespread impact of such intrusions isn’t limited to the most prominent ISPs out there.

This brings to the forefront the urgent need for software companies and users alike to focus on security when it pertains to software updates. The remaining question is, how can the online community rally to safeguard itself better against emerging threats without sacrificing the convenience of software tools?

While some see this incident as merely another blip on the radar of cybersecurity, it is actually indicative of larger systemic issues within the framework of network security and trust. Ensuring proper methodologies for software updates and user education are steps the tech ecosystem must take to stay one step ahead of attacks before they turn serious.

A shared responsibility exists between service providers, software companies, and users to build resilience against future threats. Vigilance and education are key components of this battle, and the tech world must rise to the occasion. Can they crack this complicated code before more digital wreckage is unleashed?