Krasue’s curse: Group-IB discovers new Linux Remote Access Trojan targeting companies in Thailand

Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, has discovered a new Linux Remote Access Trojan (RAT) that has been leveraged by cybercriminals looking to stealthily maintain access to the networks of targeted companies, which were exclusively based in Thailand. This Trojan, which has been named Krasue by Group-IB’s Threat Intelligence unit as a nod to the Thai name of a nocturnal native spirit known throughout Southeast Asian folklore, has been active since at least 2021, although remained under the radar for a significant period of time. At this stage, Group-IB researchers can confirm that Krasue was used against telecommunications companies in Thailand, although it has likely been part of attacks against organizations in other verticals.

Krasue profile made by Group-IB Threat Intelligence

Figure 1. Krasue profile made by Group-IB Threat Intelligence.

Upon discovery of Krasue, Group-IB’s Threat Intelligence customers were promptly notified of the threat, and Group-IB’s blog into this Linux RAT contains a full list of YARA rules so that organizations can actively hunt for this threat. Group-IB’s Computer Emergency Response Team (GIB-CERT) shared the report with the Thailand Computer Emergency Response Team (ThaiCERT) and the Thailand Telecommunications Sector Computer Emergency Response Team (TTC-CERT) in line with its zero-tolerance policy to cybercrime, and further research and outreach efforts are ongoing.

Krasue’s core functionality lies in its ability to maintain access to a targeted network, in the summer of 2023. The initial infection vector and the full scale of its usage have not been determined, but the Linux RAT could likely enter systems via vulnerability exploitation, credential brute force attacks, or more uncommonly, downloaded as part of a deceptive package or binary (i.e. a file masquerading as a product update) from an untrustworthy third-party source. The malware is able to conceal its own presence during the initialization phase, meaning that it can evade detection. Group-IB experts believe that Krasue is either deployed by malicious actors as part of a botnet, or access to Krasue is sold to other cybercriminals, such as ransomware gangs, by initial access brokers (IAB).

At the heart of Krasue is its rootkit, a piece of software used by cybercriminals to maintain privileged access to a computer while hiding its presence. Krasue’s rootkit is based on three open-source, publicly-available Linux Kernel Module rootkits, and Group-IB researchers also found that Krasue contained seven embedded rootkits that mean it can be functional on different versions of Linux. Krasue’s rootkit also contains multiple similarities with XorDdos, another Linux malware. As a result, Group-IB experts believe that Krasue was either created by the same author as XorDdos, or by an individual who had access to XorDdos’ source code.

Notably, Krasue uses Real Time Streaming Protocol (RTSP) — a network protocol designed for controlling the delivery of real-time media streams over IP networks — to communicate with its master command and control (C2 server). Group-IB researchers suspect that this tactic is a ploy that helps Krasue evade detection, although they note that using RTSP for this purpose is highly uncommon.

“Group-IB is committed to fighting against cybercrime in all its forms, and the discovery of Krasue, a sophisticated Linux Remote Access Trojan that has targeted organizations in Thailand, underscores the need for constant vigilance. Group-IB’s rapid response upon discovery of this malware and information sharing with ThaiCERT and TTC-CERT are vital steps towards countering this threat. Group-IB will continue to monitor Krasue’s spread both within Thailand and in other geographies, and take all measures to proactively inform affected parties.”

Benyatip Hongto
Benyatip Hongto

Group-IB’s Business Development Manager, Thailand

In March 2023, Group-IB announced its intention to open a Digital Crime Resistance Center in Thailand in order to counter the growing cyber risks in the country and provide localized support for Thai organizations. At the same time, Group-IB signed a partnership with leading Thai cybersecurity distributor nForce. Building on this momentum, Group-IB signed a memorandum of understanding with the Defence Technology Institute, a government agency under the supervision of the Minister of Defence of Thailand, in May 2023 to enhance knowledge sharing and collaboration in the development of the Defense Technology Institute Cyber Academy Program.

Try Threat Intelligence by Group-IB

Defeat threats efficiently and identify attackers proactively with a revolutionary cyber threat intelligence platform

Request a demo

About Group-IB

Founded in 2003 and headquartered in Singapore, Group-IB is a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime. Combating cybercrime is in the company’s DNA, shaping its technological capabilities to defend businesses, citizens, and support law enforcement operations.

Group-IB’s Digital Crime Resistance Centers (DCRCs) are located in the Middle East, Europe, Central Asia, and Asia-Pacific to help critically analyze and promptly mitigate regional and country-specific threats. These mission-critical units help Group-IB strengthen its contribution to global cybercrime prevention and continually expand its threat-hunting capabilities.

Group-IB’s decentralized and autonomous operational structure helps it offer tailored, comprehensive support services with a high level of expertise. We map and mitigate adversaries’ tactics in each region, delivering customized cybersecurity solutions tailored to risk profiles and requirements of various industries, including retail, healthcare, gambling, financial services, manufacturing, crypto, and more.

The company’s global security leaders work in synergy with some of the industry’s most advanced technologies to offer detection and response capabilities that eliminate cyber disruptions agilely.

Group-IB’s Unified Risk Platform (URP) underpins its conviction to build a secure and trusted cyber environment by utilizing intelligence-driven technology and agile expertise that completely detects and defends against all nuances of digital crime. The platform proactively protects organizations’ critical infrastructure from sophisticated attacks while continuously analyzing potentially dangerous behavior all over their network.

The comprehensive suite includes the world’s most trusted Threat Intelligence, The most complete Fraud Protection, AI-powered Digital Risk Protection, Multi-layered protection with Managed Extended Detection and Response (XDR), All-infrastructure Business Email Protection, and External Attack Surface Management.

Furthermore, Group-IB’s full-cycle incident response and investigation capabilities have consistently elevated industry standards. This includes the 77,000+ hours of cybersecurity incident response completed by our sector-leading DFIR Laboratory, more than 1,400 successful investigations completed by the High-Tech Crime Investigations Department, and round-the-clock efforts of CERT-GIB.

Time and again, its solutions and services have been revered by leading advisory and analyst agencies such as Aite Novarica, Gartner®, Forrester, Frost & Sullivan, KuppingerCole Analysts AG, and more.

Being an active partner in global investigations, Group-IB collaborates with international law enforcement organizations such as INTERPOL, EUROPOL and AFRIPOL to create a safer cyberspace. Group-IB is also a member of the Europol European Cybercrime Centre’s (EC3) Advisory Group on Internet Security, which was created to foster closer cooperation between Europol and its leading non-law enforcement partners.