SentinelLabs today published a report identifying a Python-based tool that cybercriminals are using to compromise cloud computing and software-as-a-service platforms.
Alex Delamotte, senior threat researcher at SentinelLabs, said FBot is used to take over Amazon Web Services accounts in addition to targeting PayPal and other various SaaS applications, such as Office365, she added.
Specifically, FBot contains multiple utilities, including an IP address generator and port scanner.
The tool itself appears to be of Indonesian origin, said Dellamotte.
The letter F in the tool stands for a vulgar term that appears to have been adopted to help market the tool to cybercriminals.
FBot has three functions dedicated to AWS account attacks.
The first is an AWS API Key Generator, handled by function aws generator, which generates a random AWS access key ID by appending 16 randomly selected alphabetic characters to the standard AKIA prefix.
The second AWS feature is a Mass AWS Checker, handled by function aws checker.
This function checks for AWS Simple Email Service email configuration details, including the maximum send quota and rate, as well as how many messages have been sent in the past 24 hours, likely to maximize spamming efforts against the targeted account.
Unlike other cloud attack tools such as AlienFox, FBot does not delete the compromised account the attacker used to gain access.
The third and final AWS feature is an AWS EC2 Checker, with the description Get EC2 VCPU Limit, which is handled by function ec checker.
This function reads a list of AWS identities from a text file in the format of AccessKey|SecretKey|Region.
The script uses these values to check the targeted account's EC2 service quotas.
The FBot menu highlights that this can be used to check vCPU details.
The query results describe the account's EC2 configurations and capabilities and then iterates through a list of specified AWS regions, runs the query again for each region and logs the result to a text file.
In terms of functionality and design, FBot is similar to an existing Legion infostealer tool, but is based on a different codebase that was clearly created by professional developers, said Delamotte.
It is likely that whoever built FBot adapted some of the code used to create Legion, she added.
There is no mechanism for identifying whether FBot has been used to compromise a cloud service, but its discovery should serve as a reminder to limit the scope of the cloud services that any single credential should be allowed to access, said Delamotte.
Hopefully, there might be a repository created one day that keeps track of the tools being used by cybercriminals in the hope of making it simpler to identify tactics and techniques.
In the meantime, there is no substitute for basic cloud security hygiene in an era where the tools being created by cybercriminals are only going to become increasingly sophisticated.
This Cyber News was published on securityboulevard.com. Publication date: Thu, 11 Jan 2024 15:43:15 +0000