{"id":14289,"date":"2023-04-19T09:37:11","date_gmt":"2023-04-19T09:37:11","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=14289"},"modified":"2023-04-19T09:53:26","modified_gmt":"2023-04-19T09:53:26","slug":"legion-hacker-tool","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/legion-hacker-tool\/","title":{"rendered":"Legion Hacker Tool Used to Steal Data from Poorly Protected Websites"},"content":{"rendered":"<p>Experts have discovered a Python-based Legion hacking tool that is sold via Telegram and is used as a way to hack into various online services for further exploitation.<\/p>\n<p>Let me remind you that we also wrote that <a href=\"\/blogs\/uefi-bootkit-blacklotus\/\"><strong>Microsoft<\/strong> Told How To Detect The Installation Of The <strong>BlackLotus<\/strong> UEFI Bootkit<\/a>, and also that <a href=\"\/blogs\/experts-discovered-especter-uefi-bootkit-used-for-espionage\/\">Experts discovered <strong>ESPecter<\/strong> UEFI bootkit used for espionage<\/a>.<\/p>\n<h2>Attacks with Legion Hacker Tool<\/h2>\n<p>According to <strong>Cado Labs<\/strong> researchers, the <strong>Legion<\/strong> malware has modules for enumerating vulnerable SMTP servers, conducting remote code execution (<strong>RCE<\/strong>) attacks, exploiting unpatched versions of Apache, brute force cPanel and WebHost Manager (<strong>WHM<\/strong>) accounts, as well as interacting with the <strong>Shodan<\/strong> API and abusing <strong>AWS<\/strong> services.<\/p>\n<p>The researchers say the malware shares similarities with another malware family, <strong>AndroxGh0st<\/strong>, which <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/www.lacework.com\/blog\/androxghost-the-python-malware-exploiting-your-aws-keys\/\">was first discovered by cloud security provider <strong>Lacework<\/strong> in December 2022<\/a>.<\/p>\n<p>Last month, <strong>SentinelOne<\/strong> published an analysis of AndroxGh0st, which showed that the malware is <a target=\"_blank\" href=\"https:\/\/www.freezingcomputer.com\/alienfox-malware-steals-data\/\" rel=\"noopener nofollow\">part of the <strong>AlienFox<\/strong> toolkit<\/a>, which is offered to criminals to steal API keys and secrets from cloud services.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">Legion appears to be part of a new generation of cloud credential harvesting and spam utilities. The developers of these tools often steal code from each other, making attribution difficult.<span class=\"su-quote-cite\"><a href=\"https:\/\/www.cadosecurity.com\/legion-an-aws-credential-harvester-and-smtp-hijacker\/\" target=\"_blank\" rel=\"nofollow noopener\">experts<\/a><\/span><\/div><\/div>\n<p>In addition to using <strong>Telegram<\/strong> to extract data, Legion is designed to hack web servers with CMS, PHP, or PHP-based frameworks such as <strong>Laravel<\/strong>.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">It is capable of obtaining credentials for a wide range of web services such as email providers, cloud providers, server management systems, databases, and payment platforms, including <strong>Stripe<\/strong> and <strong>PayPal<\/strong>.<span class=\"su-quote-cite\">Cado Labs' report.<\/span><\/div><\/div>\n<p>Other targeted services include <strong>SendGrid<\/strong>, <strong>Twilio<\/strong>, <strong>Nexmo<\/strong>, <strong>AWS<\/strong>, <strong>Mailgun<\/strong>, <strong>Plivo<\/strong>, <strong>ClickSend<\/strong>, <strong>Mandrill<\/strong>, <strong>Mailjet<\/strong>, <strong>MessageBird<\/strong>, <strong>Vonage<\/strong>, <strong>Exotel<\/strong>, <strong>OneSignal<\/strong>, <strong>Clickatell<\/strong>, and <strong>TokBox<\/strong>.<\/p>\n<figure id=\"attachment_14290\" aria-describedby=\"caption-attachment-14290\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/04\/Services-being-attacked-by-Legion.jpg\" alt=\"Legion hacker tool\" width=\"760\" height=\"729\" class=\"size-full wp-image-14290\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/04\/Services-being-attacked-by-Legion.jpg 760w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/04\/Services-being-attacked-by-Legion-300x288.jpg 300w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><figcaption id=\"caption-attachment-14290\" class=\"wp-caption-text\">Services being attacked by Legion<\/figcaption><\/figure>\n<p>In addition, Legion extracts AWS credentials from insecure or misconfigured web servers and sends spam SMS to users of US operators, including <strong>AT&#038;T<\/strong>, <strong>Sprint<\/strong>, <strong>T-Mobile<\/strong>, <strong>Verizon<\/strong>, and <strong>Virgin<\/strong>.<\/p>\n<h2>What&#8217;s the matter?<\/h2>\n<p>The main goal of the malware is to use the infrastructure of hijacked services for subsequent attacks, including bulk spam mailings and opportunistic phishing campaigns.<\/p>\n<p>The researchers also discovered a <strong>YouTube<\/strong> channel (created June 15, 2021) containing tutorial videos on Legion. Experts conclude that &#8220;the tool is widespread and most likely is paid malware.&#8221;<\/p>\n<figure id=\"attachment_14291\" aria-describedby=\"caption-attachment-14291\" style=\"width: 881px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/04\/Educational-videos.jpg\" alt=\"Legion hacker tool\" width=\"881\" height=\"549\" class=\"size-full wp-image-14291\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/04\/Educational-videos.jpg 881w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/04\/Educational-videos-300x187.jpg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/04\/Educational-videos-768x479.jpg 768w\" sizes=\"auto, (max-width: 881px) 100vw, 881px\" \/><figcaption id=\"caption-attachment-14291\" class=\"wp-caption-text\">&#8220;Educational videos&#8221; published by the hacker<\/figcaption><\/figure>\n<p>The location of the creator of this tool, who uses the Telegram nickname <strong>forzatools<\/strong>, remains unknown, although the presence of comments in Indonesian in the code indicates that the developer may be Indonesian or located in that country.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Experts have discovered a Python-based Legion hacking tool that is sold via Telegram and is used as a way to hack into various online services for further exploitation. Let me remind you that we also wrote that Microsoft Told How To Detect The Installation Of The BlackLotus UEFI Bootkit, and also that Experts discovered ESPecter [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":14293,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[29,271],"class_list":{"0":"post-14289","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-hackers","9":"tag-telegram"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/04\/Legion-hacker-tool.webp","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/14289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=14289"}],"version-history":[{"count":5,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/14289\/revisions"}],"predecessor-version":[{"id":14297,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/14289\/revisions\/14297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/14293"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=14289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=14289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=14289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}