SHUTTERSPEED
SHUTTERSPEED is a backdoor Trojan that includes limited spyware features that could collect information. Its attacks are part of APT37 South Korean cyber-campaigns with state espionage motives. Users can protect themselves by upholding best practices for security with e-mail interactions and employ anti-malware programs as required for removing SHUTTERSPEED.
Losing Data at the Speed of Trojans
As a pragmatic threat actor that uses down-to-earth, 'whatever works' strategies for deploying buttoned-down Trojans, APT37 is a studied contrast to the more colorful, profit-motivated, and lone-wolf hackers of elsewhere. These criminals launch campaigns against South Koreans and other nations' residents, primarily focusing on the theft of information. SHUTTERSPEED is one of the ways they accomplish that goal.
SHUTTERSPEED, like KARAE, sometimes achieves deployment through the 'first-stage,' or, during the initial infection period. Through its capabilities, APT37 (also known by its more memorable names like Red Eyes and Reaper) determines whether or not the target is worth further action, and, potentially, cement its control over the computer. Unlike KARAE, however, malware experts can confirm SHUTTERSPEED's dabbling in the spyware side of attacks.
SHUTTERSPEED offers backdoor features such as collecting system statistics for the attacker and downloading other files (such as the installers for other threats). For unclear reasons, APT37 also baked in an extra feature: screen-grabbing. This attack, more often a part of a fleshed-out RAT or spyware kit, has SHUTTERSPEED take screenshots of the user's desktop.
Traditional strategies by APT37 will not hinge on deploying SHUTTERSPEED, alone. Most infections will escalate to introducing other Trojans and spyware through the downloading abilities of SHUTTERSPEED, KARAE and others.
Closing the Shutters on Eye
Examining SHUTTERSPEED's old attacks may offer clues to preventing future ones from achieving their goals. SHUTTERSPEED's deployment is notable for using highly-traditional, e-mail phishing attacks with attached documents and embedded vulnerabilities. There is a patch for the last known vulnerability (CVE-2017-0199, a code execution weakness in Microsoft Office), although APT37 could use different ones for any upcoming campaigns. Patching software and disabling macros are of high relevance to the self-defense of all potential victims.
Besides the above precautionary notes, malware experts also recommend paying attention to torrents and other download resources. SHUTTERSPEED's threat actor, often, uses psychologically-manipulative or social-engineering techniques for compromising systems and will tailor website breaches and Web content to their targets of the moment. Their C&C infrastructure may use either cloud storage that's available to the public, or a series of hacked sites, such as vulnerable Korean business websites. Once SHUTTERSPEED gets on a computer, it can download and install anything else virtually. First-stage Trojans are, as the name implies, just the start of something even worse, for those who aren't minding their security.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.