Earlier this year, a Russia-based hacking group began distributing Hammertoss, a very nasty piece of malware that makes use of Twitter and Github to transfer its attack payloads and hide from view. Because it uses these common sites that are visited by millions, the notion is that its network traffic patterns are normally hard to detect since the traffic looks like ordinary end user queries of these services.

Opportunities for Malicious Acts

But hidden in these interactions are the directions for the malware to first download an image from Github, extract encrypted instructions and then finally upload a victimized PC’s data to its servers. While each of these techniques isn’t new, the combination shows that someone with a great deal of skill has taken the time to craft the code. For example, Hammertoss is able to:

  • Retrieve legitimate commands from social media networks — again, looking like a normal user’s interactions;
  • Use compromised Web servers for command-and-control purposes;
  • Update its code frequently to change its behavior and backdoor infection patterns;
  • Automatically visit different Twitter handles daily on a scheduled basis; and
  • Use a schedule to do all of these communications during the local workday so as not to appear suspicious.

How Hammertoss Works

Fusion explained how Hammertoss operates with Twitter, Github and other images.

“Each Hammertoss-created tweet is custom-tailored with a unique hashtag and a URL that links to a seemingly innocuous image,” Charles Pulliam-Moore wrote on the site. “In reality, the image itself contains a small bit of encrypted data. The hashtag tells a computer where to look for the image and includes a matching bit of encrypted data that, when combined with the image, unleashes a new set of malware commands that can extract data from a compromised computer.”

One security researcher has tracked the origins of Hammertoss to the APT29 group, which allegedly has nation-state ties. The group operates during the appropriate time zones and local Russian holidays, supporting this hypothesis.

What Should IT Teams Do?

What can IT departments do about Hammertoss, given this profile? First, they should employ a security product that can examine network traffic that it produces and look for unexpected behavior. While Hammertoss connects to random Twitter and Github accounts, it is using the information gleaned from these accounts in an automated and programmatic fashion.

Second, part of this analysis is also examining more carefully what kinds of data are leaving your network; if you don’t have any way to do this, now is the time to start looking at protective tools that will allow for this kind of monitoring. Third, you should look at security products that examine file integrity and movement specifically. Finally, you should probably subscribe to several security news and intelligence feeds to keep up to date on the news about Hammertoss and other similar advanced threats.

More from Malware

ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK)

7 min read - In late April 2023, IBM Security X-Force uncovered documents that are most likely part of a phishing campaign mimicking credible senders, orchestrated by a group X-Force refers to as ITG10, and aimed at delivering RokRAT malware, similar to what has been observed by others. ITG10's tactics, techniques and procedures (TTPs) overlap with APT37 and ScarCruft. The initial delivery method is conducted via a LNK file, which drops two Windows shortcut files containing obfuscated PowerShell scripts in charge of downloading a…

7 min read

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis. Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last…

2 min read

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Ex-Conti and FIN7 Actors Collaborate with New Backdoor

15 min read -   April 27, 2023 Update This article is being republished with modifications from the original that was published on April 14, 2023, to change the name of the family of malware from Domino to Minodo. This is being done to avoid any possible confusion with the HCL Domino brand. The family of malware that is described in this article is unrelated to, does not impact, nor uses HCL Domino or any of its components in any way. The malware is…

15 min read