Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Cuttlefish (HiatusRat) – Malware

August 6, 2024
Reading Time: 7 mins read
in Malware
Cuttlefish (HiatusRat) – Malware

Cuttlefish

Type of Malware

Credential Stealer

Addittional names

HiatusRat

Country of Origin

Allegedly China

Date of initial activity

2023

Targeted Countries

Turkey

Motivation

To steal authentication data from HTTP GET and POST requests

Attack Vectors

The method for the initial infection of the routers has yet to be determined, but it could involve exploiting known vulnerabilities or brute-forcing credentials.

Targeted System

SOHO Routers (Linux)

Overview

A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring all traffic through the devices and gathering authentication data from HTTP GET and POST requests. Examination and Functionality Lumen Technologies’ Black Lotus Labs analyzed the malware and reports that Cuttlefish creates a proxy or VPN tunnel on the compromised router to discreetly exfiltrate data, bypassing security measures designed to detect unusual sign-ins. The malware also has the capability to perform DNS and HTTP hijacking within private IP spaces, which can interfere with internal communications and potentially introduce additional payloads. Code Analysis and Attribution While Cuttlefish shares some code with HiatusRat—a malware previously observed in campaigns aligned with Chinese state interests—there are no concrete links between the two, making attribution impossible. Campaign Activity Cuttlefish has been active since at least July 27, 2023, with the latest campaign running from October 2023 through April 2024. This campaign predominantly infected 600 unique IP addresses associated with two Turkish telecom providers.

Targets

Enterprise-grade and small office/home office (SOHO) routers

How they operate

The Cuttlefish malware operates by targeting networking equipment, specifically enterprise-grade small office/home office (SOHO) routers. Here’s a detailed overview of how it operates: Initial Access and Installation: The infection vector for Cuttlefish is currently undisclosed, but once a device is compromised, the malware is deployed using a bash script. This script gathers host-based data and sends it to the command-and-control (C2) server. After this reconnaissance, Cuttlefish itself is downloaded and executed on the compromised device. Functionality: Packet Inspection and Hijacking: Cuttlefish sets up a packet filter to inspect outbound connections. It targets specific ports and protocols (e.g., UDP/Port 53 for DNS, TCP/Port 80 for HTTP) and monitors traffic for certain activities. If specific conditions are met, it hijacks HTTP requests by inserting a 302 error code to redirect traffic to actor-controlled infrastructure. DNS requests to private IPs are also redirected. Credential Theft: The malware passively sniffs packets for authentication materials, including usernames, passwords, and tokens used in cloud services (e.g., AWS, Azure). It logs this information and sends it to the C2 server, potentially using it to access cloud resources through a VPN or proxy tunnel. Modularity: Cuttlefish is modular, allowing it to interact with other devices on the local network once installed. It can move laterally and introduce new agents or malware components. Persistence and Evasion: To maintain persistence, Cuttlefish hides itself within the system by using techniques such as hiding files in directories like /tmp/.Pg88s51gQG4tFyImFsT9qy6ZM5TeTF8.so and deleting traces from the file system after execution. It also employs evasion tactics to avoid detection by security tools. Network Manipulation and VPN/Proxy Usage: Cuttlefish can create VPN tunnels back through compromised routers or set up proxy functionality using tools like n2n or socks_proxy. This allows threat actors to use the compromised device as a proxy for further attacks or to access internal resources without triggering security alerts. Geographical and Victim Targeting: The malware primarily targeted devices in Turkey, with a significant number of infections traced back to specific telecommunications providers. This targeted approach suggests strategic interest in certain geographical regions and network infrastructures. Overlap with HiatusRat: There is significant code overlap and operational similarities with HiatusRat, another malware associated with state-backed threat actors from China. This suggests a shared development or operational framework between the two malware families, although victimology remains distinct.

Significant Malware Campaigns

  • Hackers with alleged connections to China are using a malware platform called “Cuttlefish” to target routers and other networking equipment used by organizations in Turkey. (May 2024)
References:
  • Alleged China-based hackers using ‘Cuttlefish’ malware platform to target Turkey
  • Eight Arms To Hold You: The Cuttlefish Malware
  • Dissecting Cuttlefish Malware (Attack Anatomy)
  • CTI Roundup: Cuttlefish Malware, Hackers Leverage Docker Hub
Tags: credential stealerCuttlefishDNSEnterpriseHiatusRATHTTPLumen TechnologiesMalwareRoutersSOHOTurkey
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Hackers Exploit Output Messenger Zero-Day

ASUS Fixes Critical Flaws in DriverHub

Apple Fixes Critical Bugs in iOS and MacOS

Subscribe to our newsletter

    Latest Incidents

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    Alleged Steam Breach Exposes 89M Records

    Ulhasnagar Municipal Corporation Hacked

    Madison County Iowa Systems Disrupted

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial