Software Compromised with Backdoor Trojan

Number: AV17-009
Date: 17 August 2017

Purpose

The purpose of this alert is to bring attention to a recently disclosed compromised software update by NetSarang. 

Assessment

CCIRC has received a report of a software developer (NetSarang) which was compromised, which led to the embedding of malicious code (ShadowPad backdoor BackdoorAn undocumented, private, or less-detectable way of gaining remote access to a computer, bypassing authentication measures, and obtaining access to plaintext. trojan TrojanA malicious program that is disguised as or embedded within legitimate software. ) in some of their distributed software packages.

The affected software was distributed by NetSarang through their website and in-application update utilities between the dates of 18 July to 4 August 2017.

The identified malicious software from the developer (NetSarang) are identified below.  File compilation dates for the install packages are all 17 July 2017.

- Xmanager Enterprise 5 Build 1232
- Xmanager 5 Build 1045
- Xshell 5 Build 1322
- Xftp 5 Build 1218
- Xlpd 5 Build 1220

Suggested Action

CCIRC recommends that owners/operators test and deploy the vendor released update or workaround to affected platforms accordingly.

CCIRC recommends that organizations review the following mitigation information and consider their implementation in the context of their network environment.

• Hosts with confirmed installations of compromised versions of the software should be removed from the network for forensic analysis. If re-imaging is to be performed on a compromised host, it is important that the reinstallation fully removes all digital artifacts, including disk partitions and the master boot record.

• Collect relevant logs pertaining to the connection attempts of the host(s) involved.                    

References

http://www.netsarang.com/news/security_exploit_in_july_18_2017_build.html

Date modified: