{"id":84097,"date":"2018-07-11T11:50:14","date_gmt":"2018-07-11T18:50:14","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=84097"},"modified":"2023-08-03T15:52:51","modified_gmt":"2023-08-03T22:52:51","slug":"hawkeye-keylogger-reborn-v8-an-in-depth-campaign-analysis","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/07\/11\/hawkeye-keylogger-reborn-v8-an-in-depth-campaign-analysis\/","title":{"rendered":"Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis"},"content":{"rendered":"

Much of cybercrime today is fueled by underground markets where malware and cybercriminal services are available for purchase. These markets in the deep web commoditize malware operations. Even novice cybercriminals can buy malware toolkits and other services they might need for malware campaigns: encryption, hosting, antimalware evasion, spamming, and many others.<\/p>\n

Hawkeye Keylogger is an info-stealing malware that\u2019s being sold as malware-as-a-service. Over the years, the malware authors behind Hawkeye have improved the malware service, adding new capabilities and techniques. It was last used in a high-volume campaign in 2016.<\/p>\n

This year marked the resurgence of Hawkeye. In April, malware authors started peddling a new version of the malware that they called Hawkeye Keylogger – Reborn v8<\/em>. Not long after, on April 30, Office 365 Advanced Threat Protection (Office 365 ATP<\/a>) detected a high-volume campaign that distributed the latest variants of this keylogger.<\/p>\n

At the onset, Office 365 ATP blocked the email campaign and protected customers, 52% of whom are in the software and tech sector. Companies in the banking (11%), energy (8%), chemical (5%), and automotive (5%) industries are also among the top targets<\/p>\n

\"TopFigure 1. Top industries targeted by the April 2018 Hawkeye campaign<\/em><\/p>\n

Office 365 ATP uses intelligent systems that inspect attachments and links for malicious content to protect customers against threats like Hawkeye in real time. These automated systems include a robust detonation platform, heuristics, and machine learning<\/a> models. Office 365 ATP uses intelligence from various sensors, including multiple capabilities in Windows Defender Advanced Threat Protection (Windows Defender ATP<\/a>).<\/p>\n

Windows Defender AV (a component of Windows Defender ATP) detected and blocked the malicious attachments used in the campaign in at least 40 countries. United Arab Emirates accounted for 19% of these file encounters, while the Netherlands (15%), the US (11%), South Africa (6%) and the UK (5%) make the rest of the top 5 countries that saw the lure documents used in the campaign. A combination of generic and heuristic protections in Windows Defender AV (TrojanDownloader:O97M\/Donoff<\/a>, Trojan:Win32\/Tiggre!rfn<\/a>, Trojan:Win32\/Bluteal!rfn<\/a>, VirTool:MSIL\/NetInject.A<\/a>) ensured these threats are blocked in customer environments.<\/p>\n

\"Top<\/p>\n

Figure 2. Top countries that encountered malicious documents used in the Hawkeye campaign<\/em><\/p>\n

As part of our job to protect customers from malware attacks, Office 365 ATP researchers monitor malware campaigns like Hawkeye and other developments in the cybercriminal landscape. Our in-depth investigation into malware campaigns like Hawkeye and many others adds to the vast threat intelligence we get from the Microsoft Intelligent Security Graph, which enables us to continuously raise the bar in security. Through the Intelligent Security Graph<\/a>, security technologies in Microsoft 365 share signals and detections, allowing these technologies to automatically update protection and detection mechanisms, as well as orchestrate remediation across Microsoft 365.<\/p>\n

\"Microsoft<\/p>\n

Figure 3. Microsoft 365 threat protection against Hawkeye<\/em><\/p>\n

Campaign overview<\/h2>\n

Despite its name, Hawkeye Keylogger – Reborn v8<\/em> is more than a common keylogger. Over time, its authors have integrated various modules that provide advanced functionalities like stealth and detection evasion, as well as credential theft and more.<\/p>\n

Malware services like Hawkeye are advertised and sold in the deep web, which requires anonymity networks like Tor to access, etc. Interestingly, the Hawkeye authors advertised their malware and even published tutorial videos on a website on the surface web (that has since been taken down). Even more interesting, based on underground forums, it appears the malware authors have employed intermediary resellers, an example of how cybercriminal underground business models expand and evolve.<\/p>\n

\"HawkeyeOur investigation into the April 2018 Hawkeye campaign shows that the cybercriminals have been preparing for the operation since February, when they registered the domains they later used in the campaign.<\/p>\n

Typical of malware campaigns, the cybercriminals undertook the following steps:<\/p>\n