top of page

The SystemBC Malware Strikes Again: Southern African Power Company Under Siege

Rabah Moula


In the digital age, cyber threats have become as potent as traditional warfare. Recent developments highlight a new variant of the notorious SystemBC malware, called DroxiDat, aiming its malicious gaze at southern Africa's power infrastructure.

 

The Details of the Attack

A late March 2023 attack on a southern African power generation company alarmed cybersecurity experts. Kurt Baumgartner, a principal security researcher at Kaspersky's GReAT, uncovered the utilization of the DroxiDat variant of SystemBC malware. This malware sets up a SOCKS5 proxy, allowing hackers to tunnel malicious traffic associated with other malware. What's worrisome is that this particular attack seems to be the precursor to a potential ransomware attack.

DroxiDat differs from its predecessor SystemBC. While it's more streamlined, it's tailored to profile systems and stealthily exfiltrate data. Unlike SystemBC, which is loaded with features, DroxiDat is designed for a simple yet effective task – act as a system profiler and transport the mined information to an external server.


Delving Deeper into SystemBC's Dark Past

Since its emergence in 2019, SystemBC has been a staple for cyber attackers. As a C/C++-based commodity malware and remote administrative tool, its primary role has been to facilitate malicious traffic. Sophos, in December 2020, unveiled its association with Ryuk and Egregor ransomware infections, citing the malware’s capability to deploy ransomware automatically using Windows tools if provided the proper credentials.


The Implications in a CSOC Environment

Cybersecurity Operation Centers (CSOCs) should be on high alert. Ransomware attacks on industrial entities have surged, doubling from 125 in Q2 2022 to 253 in Q2 2023. The crux of this alarming trend? Ransomware attacks are not only increasing in number but also evolving in their strategies, targeting operational technology (OT) and industrial control systems.


In the CSOC arena, detecting these threats early is crucial. Regular profiling of system networks, monitoring of unusual traffic, and updating security protocols are paramount. A swift response mechanism to contain and neutralize threats can drastically reduce potential damages.



Keywords & Definitions:


  • SystemBC Malware: A C/C++-based commodity malware and remote administrative tool known to set up SOCKS5 proxies on victim computers.

  • SOCKS5 Proxy: A protocol that exchanges network packets between clients and servers through a proxy server.

  • Ransomware: A type of malware that threatens to publish or blocks access to data unless a ransom is paid.

  • Operational Technology (OT): Hardware and software that detects or causes a change in physical processes through direct monitoring.



Summary:

The new SystemBC malware variant, DroxiDat, targeted a southern African power company, hinting at a potential ransomware attack. As ransomware threats evolve, cybersecurity strategies must adapt swiftly to protect critical infrastructure.


What Happened?

  1. The Attack: A power company in southern Africa was targeted by cyber attackers using a new version of harmful software called DroxiDat, which is related to another known bad software named SystemBC.

  2. Purpose of the Attack: This harmful software was probably used to prepare for a bigger attack where the cyber attackers would lock the company's systems and demand money (ransom) to unlock them.

  3. How It Works: The DroxiDat software sneaks into a computer system, gathers information, and sends it back to the attackers. This information helps the attackers plan their next steps.

  4. Past Behavior: SystemBC, the older version, has been used before to help attackers get into systems and then demand money from the victims.

1 view

Commentaires


SUBSCRIBE

Sign up to receive news and updates.

Thanks for submitting!

©CyberGuardianNews. 

bottom of page