Project Hyphae
Search

Does Your Hardened Network Keep The Bad Guys From Daxin In?

Share This Post

The Threat Hunter Team at Symantec, working jointly with CISA, has identified an APT Campaign against select government agencies and critical infrastructure targets using a highly sophisticated rootkit backdoor named Daxin.

Daxin malware is a rootkit backdoor that utilizes Command and Control functionality to not only infect devices with internet access but also devices with limited or no internet access. Using hijacked TCP connections, Daxin creates a Multi-Node communications channel that can span multiple networks and allow attackers to access machines deep in highly secure environments. Daxin can abuse any already running service on the device, so it does not create any new services. This, added to the hijacking of normal, already established TCP traffic, makes Daxin a stealthy tool for an attacker to transmit commands and exfiltrate data from deep within a network.

This attack methodology makes network segmentation more important than ever.

CASA’s report of the campaign can be found here: https://www.cisa.gov/uscert/ncas/current-activity/2022/02/28/broadcom-software-discloses-apt-actors-deploying-daxin-malware

Symantec’s blog post outlining the attack including known IOCs can be found here: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage



Reach out to our incident response team for help

More To Explore

Information Security News 4-15-2024

Roku Disclosed a Security Incident Impacting 576,000 Accounts Article Link: https://securityaffairs.com/161765/data-breach/roku-second-data-breach.html FBI Warns of Massive Wave of Road Toll SMS Phishing Attacks Article Link: https://www.bleepingcomputer.com/news/security/fbi-warns-of-massive-wave-of-road-toll-sms-phishing-attacks/

Firewall Fiasco: CVE-2024-3400

Palo Alto Networks has issued a warning about a severe command injection flaw in their PAN-OS firewall software, currently under active exploitation. The vulnerability is

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.