Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

FROSTBITE (Exploit Kit) – Malware

June 10, 2024
Reading Time: 4 mins read
in Malware
FROSTBITE (Exploit Kit) – Malware

FROSTBITE

Type of Malware

Exploit Kit

Date of initial activity

2024


Addittional Names

rapeflake

Associated Groups

UNC5337

Motivation

Data Theft
Extorsion

Attack Vectors

Credential-based Attacks

Targeted Systems

Windows

Type of information Stolen

Corporate Data
Login Credentials

Tools

DBeaver Ultimate: This is a publicly available database management tool that UNC5537 has been observed using to connect to and run queries across Snowflake instances. It is used for managing and querying databases and is employed by the attackers for interacting with Snowflake environments.

SnowSQL: SnowSQL is Snowflake’s command-line interface (CLI) tool, which UNC5537 utilizes to perform database operations and execute SQL commands.

Overview

FROSTBITE is a sophisticated piece of malware that has emerged as a significant threat within the cybersecurity landscape. This malware, attributed to the threat actor UNC5537, specifically targets Snowflake customer database instances to exfiltrate sensitive information and facilitate extortion. FROSTBITE’s primary mode of operation involves leveraging compromised credentials to access Snowflake environments, where it performs extensive reconnaissance and data exfiltration. The malware’s sophistication lies in its dual-functionality: it is used for both information gathering and data theft. FROSTBITE is adept at interacting with Snowflake’s web-based user interface and command-line tools, making it highly effective in infiltrating and navigating these environments. It utilizes various techniques to conceal its activities and bypass traditional security measures, such as encrypted communications and legitimate-looking data exfiltration commands. What makes FROSTBITE particularly concerning is its operational precision and the impact it has had on numerous organizations. By exploiting stolen credentials from infostealer malware, FROSTBITE has managed to infiltrate multiple Snowflake instances without triggering immediate alerts or suspicion. The malware’s ability to conduct detailed reconnaissance and execute complex SQL commands to extract and stage data highlights its advanced nature and the serious risks it poses to enterprise data security.

Targets

Snowflake Users: The primary targets are organizations that use Snowflake’s cloud-based data warehousing platform. This includes any entity that stores and manages data within Snowflake’s ecosystem, making them vulnerable to data theft and extortion attempts by UNC5537. Organizations with Stolen Credentials: FROSTBITE relies on credentials obtained from various infostealer malware campaigns. Consequently, any organization whose Snowflake credentials have been compromised through these infostealers is at risk. This includes businesses across various sectors that use Snowflake for data analysis and storage. Accounts Lacking Multi-Factor Authentication (MFA): Organizations that have not implemented MFA on their Snowflake accounts are particularly vulnerable. MFA serves as an additional layer of security, and the lack of it makes accounts more susceptible to unauthorized access. Contractor and Personal Systems: The malware often finds its way into Snowflake environments through compromised contractor systems. Contractors who use personal or less secure devices for work, including those used for gaming or downloading pirated software, present a risk as these systems can be exploited to gain access to Snowflake customer instances. Victims of Infostealer Malware: FROSTBITE’s operation is closely linked with infostealer malware, such as VIDAR, RISEPRO, REDLINE, RACOON STEALER, LUMMA, and METASTEALER. Organizations whose employees have been affected by these infostealers are also targeted, as their compromised credentials can be used to access Snowflake accounts.

How they operate

FROSTBITE’s operation begins with the initial compromise of Snowflake instances through stolen credentials. These credentials are often harvested from infostealer malware infections on non-Snowflake systems. Once attackers acquire valid credentials, they gain access to Snowflake’s web-based UI (SnowSight) and command-line interface (SnowSQL). From this vantage point, FROSTBITE performs critical reconnaissance and operational tasks. It uses a custom-built utility, which Mandiant has identified as “rapeflake” or FROSTBITE, to interact with Snowflake’s database management systems. This utility allows the attackers to execute SQL commands for data exploration and exfiltration. The malware’s operation involves several key stages. Initially, FROSTBITE performs reconnaissance by listing databases, tables, and other critical metadata using SQL commands like SHOW TABLES. This reconnaissance phase is crucial for identifying valuable data within the Snowflake environment. Once the data of interest is identified, FROSTBITE stages it for exfiltration by creating temporary data storage stages within Snowflake. The CREATE TEMPORARY STAGE command is employed to facilitate this process, allowing attackers to aggregate and compress data before its transfer. Exfiltration is executed using the COPY INTO command, which enables the malware to copy data from the Snowflake database into the temporary stages. The data is then compressed and prepared for transfer using the GET command. This final stage involves moving the data from Snowflake’s temporary stages to the attacker’s local machine, where it can be accessed or sold. Throughout the process, FROSTBITE’s use of temporary stages and data compression minimizes the risk of detection and leaves fewer traces in the victim’s environment.

MITRE Tactics and Techniques

Initial Access: Valid Accounts (T1078): The attackers gain initial access to Snowflake instances using stolen credentials, primarily obtained from infostealer malware. Execution: Command-Line Interface (T1059.001): The attackers use SnowSQL (a command-line tool) and custom SQL commands to execute operations on the Snowflake database. Persistence: Create Account (T1136): The creation of temporary stages for data staging may be considered a form of persistence as it allows the attacker to maintain access and prepare data for exfiltration. Privilege Escalation: Exploitation for Client Execution (T1068): If attackers exploit vulnerabilities or misconfigurations within the Snowflake environment, it could lead to privilege escalation, although specific instances of this were not detailed. Defense Evasion: Indicator Removal (T1070): The use of temporary stages and the deletion of these stages after data is exfiltrated helps in evading detection and minimizing traces. Credential Access: Credential Dumping (T1003): While the direct credential dumping is not involved, the use of stolen credentials to access Snowflake instances reflects credential access techniques. Discovery: File and Directory Discovery (T1083): The SHOW TABLES and similar SQL commands used to enumerate databases and tables indicate discovery tactics. Collection: Data Staged (T1074): Data staging commands like CREATE TEMPORARY STAGE and COPY INTO for aggregating and compressing data for exfiltration fall under collection tactics. Exfiltration: Exfiltration Over Command and Control Channel (T1041): The use of commands like GET to transfer data from Snowflake stages to the attacker’s local machine represents exfiltration activities. Impact: Data Destruction (T1485): Although not explicitly mentioned, the deletion of temporary stages after exfiltration may impact the integrity of the victim’s data.
References
  • UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion
Tags: LummaMalwareMandiantMetaStealerMFARedLineRiseProSnowflakeSQLUNC5537Vidar
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

CoGUI Targets Consumer and Finance Brands

COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

New OttoKit Flaw Targets WordPress Sites

Mirai Botnet Exploits Vulnerabilities in IoT

Critical Kibana Flaws Allows Code Execution

Subscribe to our newsletter

    Latest Incidents

    Masimo Cyberattack Disrupts Manufacturing

    Cyberattack Targets Tepotzotlán Facebook

    West Lothian Schools Hit by Ransomware

    UK Legal Aid Agency Faces Cyber Incident

    South African Airways Hit by Cyberattack

    Coweta County School System Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial