Malware found in ..  tax software

Company tries to cover up tracks of GoldenSpy backdoor.

By Casey Tonkin on Jul 21 2020   (Australian Computer Society)

https://ia.acs.org.au/content/ia/article/2020/malware-found-in-chinese-tax-software.html?ref=newsletter


Tax software required to conduct business in China has been installing malware 
on enterprise systems and trying to evade detection, according to cybersecurity 
researchers.

The team at Trustwave has been monitoring the malware campaign which they 
originally found on the systems of one of its clients.

“They informed us that upon opening operations in China, their local Chinese 
bank required that they install a software package called Intelligent Tax 
produced by the Golden Tax Department of Aisino Corporation, for paying local 
taxes,” researcher Brian Hussey said.

“As we continued our investigation into the tax software, we found that it 
worked as advertised.

“But it also installed a hidden backdoor on the system that enabled a remote 
adversary to execute Windows commands or to upload and execute any binary.”

Businesses operating in China have to pay a value added tax (VAT).

The payment of VAT is monitored through China’s Golden Tax Project which 
requires organisations use specific software to lodge and track invoices.

Dubbed ‘GoldenSpy’, the malware found in Aisino’s tax software was downloaded 
onto its host system two hours after the Intelligent Tax software was installed.

Two versions of the malware were installed and would autostart on boot to 
maintain persistence with system level privileges.

Trustwave said it could not tell if Aisino was an “active and/or willing” 
participant in the malware, but recommended that businesses operating in China 
– especially those using Aisino Intelligent Tax Software – should consider this 
malware a threat.

Destroying the evidence

Shortly after Trustwave published its original report about GoldenSpy last 
month, the researchers spotted the Aisino program downloading a new package 
that silently deleted GoldenSpy from computers.

The uninstaller was designed to remove all registry entries, files, and folders 
created by GoldenSpy before deleting itself – all through the Windows command 
line without prompting user action.

“Gone without a trace, or even knowing it was there,” said Hussey.

“In our testing, this GoldenSpy uninstaller will automatically download and 
execute, and effectively, will negate the direct threat of GoldenSpy in your 
environment.

“However, as the deployment of this uninstaller is delivered directly from the 
supposedly legitimate tax software, this has to leave users of Intelligent Tax 
concerned about what else could be downloaded and executed in a similar manner.”

A week later, Trustwave spotted a new version of the same uninstaller 
downloading quietly on systems with the tax software installed.

This uninstaller was downloaded with the same purpose – to remove any trace of 
GoldenSpy – except it was designed specifically to evade the detection methods 
previously shared by Trustwave online.

Enter GoldenHelper

Trustwave’s posts about GoldenSpy led to the discovery of another malware 
sitting in software distributed by an Aisino subsidiary prior to the launch of 
GoldenSpy.

>From early 2018 to July 2019, a suspicious program was being installed on 
>machines by the tax software.

“The Golden Tax Project is a national program in China, impacting every 
business operating in China,” Hussey said.

“We are currently aware of only two organisations authorised to produce Golden 
Tax software, Aisino and Baiwang.

“This is now the second Golden Tax software package that Trustwave SpiderLabs 
has found to contain a hidden backdoor capable of remotely executing arbitrary 
code with system level privileges.”

Nicknamed GoldenHelper, the program contained three different .dll files that 
it used to bypass the Windows User Account Control feature before dropping the 
taxver.exe payload on the target machine.

While the researchers have not yet been able to dissect a sample of the taxver 
executable, aspects of its delivery leads them to question the .exe’s 
legitimacy.

Aside from deliberately bypassing Windows security, the taxver.exe dropper 
gives it a random extension name (eg .jpg, .gif, .dat, .rar, or .zip) so that 
network sniffers don’t pick up on an executable being downloaded.

Then a randomiser puts the .exe into one of six different Windows directories – 
again trying to hide the installer from detection.

Trustwave recommends that “any system hosting third-party applications with a 
potential for adding a gateway into your environment, be isolated and heavily 
monitored with strict processes and procedures in their usage”.


CASEY TONKIN Twitter
A lifelong technophile and science fiction geek, Casey joined Information Age 
in 2019. With interests in AI, space travel, and post-humanism, Casey is always 
on the hunt for the overlap of science-fact and science-fiction.

_______________________________________________
Link mailing list
[email protected]
http://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to