Mind the (air) gap: GoldenJackal Targets Government Systems

New insights into GoldenJackal’s sophisticated toolsets, which have been used to carry out cyberespionage activities across Europe, South Asia, and the Middle East since 2019.

Mind the (air) gap: GoldenJackal Targets Government Systems
The original image was generated by OpenAI's DALL-E Source: OpenAI (October 2024)

Introduction

On October 7, 2024, ESET Research published a detailed analysis of GoldenJackal, an advanced persistent threat (APT) group, and their efforts to breach air-gapped government systems. The report, authored by Matías Porolli, presents new insights into GoldenJackal’s sophisticated toolsets, which have been used to carry out cyberespionage activities across Europe, South Asia, and the Middle East since 2019.

Report Overview

The campaign attributed to GoldenJackal spans from May 2022 to March 2024 and primarily targets government and diplomatic entities. The group's focus is on breaching air-gapped systems—networks that are isolated from the internet for security purposes—to exfiltrate sensitive information. ESET's research highlights two previously undocumented toolsets used by GoldenJackal, revealing an intricate strategy to maintain persistence and gather intelligence.

The first toolset was observed targeting a South Asian embassy in Belarus in 2019. The attack featured custom tools such as GoldenDealer, GoldenHowl, and GoldenRobo, specifically developed to breach air-gapped systems via infected USB drives. The second toolset, deployed between May 2022 and March 2024, showcased a highly modular approach. It involved various components, each playing a distinct role in file collection, distribution, and exfiltration across a compromised network.

Technical Breakdown

ESET's analysis describes in detail the components of GoldenJackal's toolsets:

  • GoldenDealer: Delivers executable payloads to air-gapped systems through USB drives, relying on automated processes to reduce the need for user interaction.
  • GoldenHowl: A modular backdoor written in Python, capable of multiple malicious activities, including data collection, system information gathering, and command execution.
  • GoldenRobo: Focuses on file exfiltration, using the Robocopy utility to gather specific file types from compromised systems.

The more recent toolset saw the introduction of tools like GoldenUsbCopy and GoldenAce, emphasizing a modular design that allowed GoldenJackal to maximize the effectiveness of their attacks, minimizing detection and maintaining control over compromised networks.

Insights and Analysis

GoldenJackal’s campaigns have impacted several governmental organizations across Europe and South Asia. Their toolsets allow them to collect confidential documents from high-value targets that are not connected to the internet, indicating that their primary goal is espionage. While no definitive nation-state sponsorship has been attributed to GoldenJackal, certain characteristics, such as similarities to malware used by Russian-speaking APTs, hint at potential origins.

Mitigation Measures

For organizations looking to protect themselves from similar threats, especially those involving air-gapped systems, ESET recommends stringent physical security controls for all removable media, consistent software updates, and vigilant monitoring of network connections. Threat intelligence feeds and regular security audits are also vital for defending against sophisticated threats like GoldenJackal.

For more technical details on the tools used by GoldenJackal and indicators of compromise (IoCs), readers can refer to ESET's report. Maintaining awareness and understanding the evolving tactics of APT groups is crucial for staying ahead of potential breaches.


GoldenJackal’s persistent attacks on air-gapped systems highlight the need for organizations to remain vigilant, particularly in securing isolated networks. Stay informed on the latest threat research to better protect your infrastructure.

Indicators of Compromise (IoCs)

SHA-1FilenameDetectionDescription
DA9562F5268FA61D19648DFF9C6A57FB8AB7B0D7winaero.exeWin32/Agent.AGKQGoldenDealer.
5F12FFD272AABC0D5D611D18812A196A6EA2FAA91102720677Python/Agent.ANA, Python/HackTool.Agent.W, Python/Riskware.LdapDump.A, Python/Riskware.Impacket.CGoldenHowl.
6DE7894F1971FDC1DF8C4E4C2EDCC4F4489353B6OfficeAutoComplete.exeWinGo/Agent.AAOGoldenRobo.
7CB7C3E98CAB2226F48BA956D3BE79C52AB62140prinntfy.dllWinGo/DataStealer.AGoldenUsbCopy.
8F722EB29221C6EAEA9A96971D7FB78DAB2AD923zUpdater.exeWinGo/Spy.Agent.AHGoldenUsbGo.
24FBCEC23E8B4B40FEA188132B0E4A90C65E3FFBfc.exeWinGo/DataStealer.CGoldenAce.
A87CEB21EF88350707F278063D7701BDE0F8B6B7upgradeMSIL/Agent.WPJJackalWorm – simpler version.
9CBE8F7079DA75D738302D7DB7E97A92C4DE5B71fp.exeWinGo/Spy.Agent.CAGoldenBlacklist.
9083431A738F031AC6E33F0E9133B3080F641D90fp.exePython/TrojanDownloader.Agent.YOGoldenPyBlacklist.
C830EFD843A233C170285B4844C5960BA8381979cb.exePython/Agent.ALEGoldenMailer.
F7192914E00DD0CE31DF0911C073F522967C6A97GoogleUpdate.exeWinGo/Agent.YHGoldenDrive.
B2BAA5898505B32DF7FE0A7209FC0A8673726509fp.exePython/Agent.ALFPython HTTP server.
IP AddressDomainHosting ProviderFirst SeenDetails
83.24.9[.]124N/AOrange Polska Spolka Akcyjna2019‑08‑09Primary C&C server used by GoldenJackal in 2019.
196.29.32[.]210N/AUTANDE2019‑08‑09Secondary C&C server used by GoldenJackal in 2019.
N/Aassistance[.]uzN/A2019‑09‑25Compromised website used to download malware.
N/Athehistore[.]comN/A2019‑09‑25Compromised website used as a C&C server.
N/Axgraphic[.]roN/A2019‑09‑25Compromised website used as a C&C server.
Email Address
mariaalpane@outlook[.]com
katemarien087@outlook[.]com
spanosmitsotakis@outlook[.]com

MITRE ATT&CK Techniques

TacticTechniqueIDDescription
Resource DevelopmentAcquire Infrastructure: Virtual Private ServerT1583.003GoldenJackal probably acquired a VPS server to use as a secondary C&C server for the GoldenDealer malware.
Resource DevelopmentAcquire Infrastructure: ServerT1583.004GoldenJackal likely acquired a server to use as a primary C&C server for the GoldenDealer malware.
Resource DevelopmentCompromise Infrastructure: Web ServicesT1584.006GoldenJackal has used compromised WordPress sites for C&C infrastructure, used by the JackalControl and JackalSteal malware.
Resource DevelopmentDevelop Capabilities: MalwareT1587.001GoldenJackal develops its own custom malware.
Resource DevelopmentEstablish Accounts: Cloud AccountsT1585.003GoldenJackal has used Google Drive to store exfiltrated files and legitimate tools.
Resource DevelopmentObtain Capabilities: ToolT1588.002GoldenJackal uses legitimate tools, such as Plink and PsExec, for post-compromise operations.
ExecutionCommand and Scripting Interpreter: PowerShellT1059.001GoldenJackal executed PowerShell scripts to download the JackalControl malware from a compromised WordPress website.
ExecutionCommand and Scripting Interpreter: Windows Command ShellT1059.003GoldenAce uses cmd.exe to run a batch script to execute other malicious components.
ExecutionCommand and Scripting Interpreter: PythonT1059.006GoldenHowl contains various malicious modules that are Python scripts.
ExecutionNative APIT1106GoldenDealer can copy and run an executable file with the CreateProcessW API.
ExecutionSystem Services: Service ExecutionT1569.002GoldenDealer can run as a service.
ExecutionUser Execution: Malicious FileT1204.002JackalWorm uses a folder icon to entice a potential victim to launch it.
PersistenceCreate or Modify System Process: Windows ServiceT1543.003GoldenDealer creates the service NetDnsActivatorSharing to persist on a compromised system.
PersistenceBoot or Logon Autostart Execution: Registry Run Keys / Startup FolderT1547.001If GoldenDealer fails to create a service for persistence, an entry in a Run registry key is created instead.
PersistenceScheduled Task/Job: Scheduled TaskT1053.005GoldenHowl creates the scheduled task Microsoft\Windows\Multimedia\SystemSoundsService2 for persistence.
Defense EvasionHide Artifacts: Hidden Files and DirectoriesT1564.001GoldenDealer modifies the registry so that hidden files and directories are not shown in Windows Explorer. GoldenDealer, GoldenAce, and JackalWorm create hidden folders on USB drives.
Defense EvasionIndicator Removal: File DeletionT1070.004GoldenAce deletes payloads after they are run. GoldenBlacklist and GoldenPyBlacklist delete intermediate files after the final archives are generated.
Defense EvasionMasquerading: Match Legitimate Name or LocationT1036.005GoldenUsbCopy uses a legitimate Firefox directory C:\Users<username>\AppData\Roaming\Mozilla\Firefox\ to stage files.
Defense EvasionMasquerading: Masquerade File TypeT1036.008JackalWorm uses a folder icon to disguise itself as a non-executable file.
Defense EvasionModify RegistryT1112GoldenDealer modifies the registry so that hidden files and directories are not shown in Windows Explorer.
Defense EvasionObfuscated Files or Information: Encrypted/Encoded FileT1027.013GoldenJackal uses various encryption algorithms in its toolset, such as XOR, Fernet, and AES, to encrypt configuration files and files to be exfiltrated.
Credential AccessUnsecured Credentials: Credentials In FilesT1552.001GoldenUsbGo looks for files with filenames that are usually associated with credentials.
Credential AccessUnsecured Credentials: Private KeysT1552.004GoldenUsbGo looks for files that may contain private keys, such as those with filenames that contain id_rsa.
DiscoveryAccount Discovery: Local AccountT1087.001GoldenDealer collects information about all user accounts on a compromised system.
DiscoveryFile and Directory DiscoveryT1083GoldenHowl has a module to generate a

References

Mind the (air) gap: GoldenJackal gooses government guardrails
ESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackal.