TAG-140’s Deployment of DRAT V2: A Sophisticated Cyber Espionage Campaign Targeting Indian Government Sectors

In recent developments, the cyber-espionage group known as TAG-140 has intensified its operations against Indian government entities by deploying an advanced variant of the DRAT remote access trojan (RAT), termed DRAT V2. This evolution signifies a strategic enhancement in TAG-140’s cyber capabilities, reflecting a broader trend among state-aligned threat actors to refine their tools for more effective infiltration and data exfiltration.

Background on TAG-140

TAG-140, identified as an operational sub-cluster within the Transparent Tribe (also known as APT36), has been active since at least 2019. Historically, the group has targeted sectors such as government, defense, maritime, and academia. However, recent activities indicate an expansion into critical infrastructure sectors, including railways, oil and gas, and external affairs ministries. This shift underscores the group’s adaptive strategies and its focus on sectors pivotal to national security and economic stability.

Evolution to DRAT V2

The transition from the original .NET-based DRAT to the Delphi-compiled DRAT V2 marks a significant advancement in TAG-140’s malware development. This change not only enhances the malware’s efficiency but also complicates detection and analysis efforts. Key enhancements in DRAT V2 include:

– Arbitrary Shell Command Execution: The introduction of the `exec_this_comm` command allows operators to execute any shell command on the compromised system, providing greater control and flexibility.

– Enhanced Command-and-Control (C2) Protocol: DRAT V2 employs a custom TCP-based protocol that supports both ASCII and Unicode inputs, facilitating more robust and reliable communication between the malware and its operators.

– Improved Obfuscation Techniques: The malware obfuscates its C2 IP addresses using Base64 encoding with unique prepended strings, complicating detection by automated security tools.

Infection Chain and Delivery Mechanism

The deployment of DRAT V2 involves a meticulously crafted multi-stage infection chain:

1. Spoofed Government Portal: TAG-140 created a counterfeit website mimicking the Indian Ministry of Defence’s official press release portal. This site hosts a malicious link that, when clicked, initiates the infection sequence.

2. Social Engineering Tactics: Victims are prompted to execute a command copied to their clipboard, leading to the download and execution of an HTML Application (HTA) file via `mshta.exe`.

3. Loader Deployment: The HTA file retrieves and executes the BroaderAspect loader, which establishes persistence by modifying Windows Registry settings and downloads the DRAT V2 payload.

4. Activation of DRAT V2: Once deployed, DRAT V2 connects to its C2 server, awaiting further instructions from the attackers.

Capabilities and Implications

DRAT V2’s functionalities extend beyond mere data exfiltration. Its capabilities include:

– System Reconnaissance: Gathering detailed information about the compromised system.

– File Manipulation: Uploading and downloading files to and from the infected machine.

– Execution of Additional Payloads: Facilitating the deployment of further malicious tools or updates.

These features provide TAG-140 with persistent and flexible control over compromised hosts, enabling prolonged surveillance and potential disruption of critical services.

Detection and Mitigation Strategies

Despite its advanced features, DRAT V2 lacks sophisticated anti-analysis mechanisms, making it susceptible to detection through vigilant monitoring and analysis. Organizations are advised to implement the following measures:

– User Education: Train personnel to recognize and avoid social engineering tactics, such as unsolicited prompts to execute commands or open unfamiliar links.

– Endpoint Detection and Response (EDR): Deploy solutions capable of identifying and responding to suspicious activities, including unauthorized registry modifications and unusual network communications.

– Network Monitoring: Monitor for anomalous outbound connections, particularly those involving uncommon TCP ports or unexpected data transfers.

– Regular Software Updates: Ensure all systems are updated with the latest security patches to mitigate vulnerabilities that could be exploited by such malware.

Conclusion

The emergence of DRAT V2 underscores the evolving threat landscape and the need for continuous adaptation in cybersecurity defenses. TAG-140’s strategic enhancements in malware capabilities and delivery methods highlight the importance of a proactive and comprehensive security posture. By staying informed about such developments and implementing robust security measures, organizations can better protect themselves against sophisticated cyber threats.