Lucian Constantin
CSO Senior Writer

Custom-developed Dripion backdoor used for targeted attacks in Asia, U.S.

news
Mar 30, 20162 mins

The malware may be linked to a known cyberespionage group that targets companies with interests in Taiwan

A new custom-developed backdoor program has been used in highly targeted attacks against organizations from Taiwan, Japan, South Korea, and the United States over the past year.

Malware researchers from Symantec first came across the program, which they’ve named Dripion, in August 2015. However, due to its custom nature and sparse use, it has managed to fly under the radar since as early as November 2013.

When their analysis began, the Symantec researchers believed Dripion was a local threat used against organizations in Taiwan, where most of its victims were found. However, since then they have found computers infected with the backdoor in other countries as well.

The program’s creators went to great lengths to disguise the malware’s activities. It is installed on computers by another malicious program known as Blugger, which uses encryption to hide its communications.

Blugger downloads the Dripion backdoor from what appear to be English-language blogs. It’s not clear if these are legitimate blogs that have been compromised, or if the attackers intentionally created the sites.

After it’s installed on a computer, Dripion connects to command-and-control domains with names similar to those of several antivirus companies in an attempt to further hide the malicious traffic in victims’ network logs.

Dripion allows attackers to steal information and files from infected computers, as well as upload new files and execute them.

Symantec has also found links between Dripion and a cyberespionage group known as Budminer that, until 2014, has used a different backdoor program called Taidoor. Budminer is known for launching targeted attacks since 2009 against international think tanks, manufacturers, and defense contractors with interests in Taiwan.

It’s possible that Dripion is Budminer’s new malware tool, created after Taidoor was exposed and documented by security researchers. There are no code similarities between the two programs, though, suggesting that Dripion was developed from scratch.

The Dripion case shows that custom-developed backdoors used in a small number of highly targeted attacks can easily bypass traditional anti-malware defenses and remain undetected for a long time. Defending against them requires a multi-layered security approach.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author