Xeon Sender: A Repurposed Crimeware Tool Targeting SaaS Credentials for SMS Spam

On August 19, 2024, SentinelOne released a report on the rise and repurposing of Xeon Sender, a Python script initially discovered in 2022, which has since been exploited by various threat actors.

Xeon Sender: A Repurposed Crimeware Tool Targeting SaaS Credentials for SMS Spam
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (August 2024)

Introduction

On August 19, 2024, SentinelOne released a report on the rise and repurposing of Xeon Sender, a Python script initially discovered in 2022, which has since been exploited by various threat actors. This tool, notorious for enabling SMS spam campaigns through multiple SaaS providers, continues to evolve in the hands of cybercriminals. The report highlights the growing threat of SMS spam and smishing attacks, leveraging legitimate APIs from cloud and SaaS services.

Report Overview

Xeon Sender, also known as XeonV5 or SVG Sender, emerged in the cybercrime landscape in 2022. Initially attributed to a hacker under the handle @darkworld47, this cloud attack tool was quickly adopted and modified by other threat actors. Over time, different versions of Xeon Sender appeared, with various actors branding it as their own. Despite these modifications, the core functionality of the tool remains consistent, enabling large-scale SMS spam and smishing campaigns.

Xeon Sender operates by utilizing legitimate APIs from nine different SaaS providers, including Amazon SNS, Twilio, and Nexmo, to send bulk SMS messages. The tool requires valid API keys and other credentials to function, meaning the attackers must have already compromised accounts on these platforms. Once the credentials are obtained, Xeon Sender uses Python libraries like requests or specific provider modules to craft and send SMS messages en masse. The script's main class contains methods that manage interactions with each service provider, handling API requests and the sending of messages to targeted phone numbers.

However, the tool lacks sophistication in certain areas, such as error handling and clarity in API interactions. For instance, while some providers offer status messages or error reports, others simply return a generic "Success" message, regardless of the outcome. This inconsistency presents challenges for defenders attempting to detect and mitigate the abuse of these services.

The consequences of Xeon Sender's activities are significant. Organizations that have gone through the rigorous process of enabling SMS APIs, which are regulated by federal laws, are particularly at risk. The tool’s ability to send bulk messages using legitimate credentials makes it a potent weapon in the hands of cybercriminals, capable of overwhelming recipients with spam or smishing attempts. The broader implications include potential damage to the reputations of the SaaS providers involved, increased regulatory scrutiny, and financial losses for the victims whose credentials have been compromised.

Insights and Analysis

Given the tool’s reliance on legitimate SaaS APIs, detection and prevention are challenging. Security teams must monitor for unusual activities related to SMS permissions, such as unexpected changes to distribution lists or an influx of new recipient phone numbers. For AWS users, specific API calls like GetSMSAttributes or SetSMSAttributesshould be closely watched, as they could indicate the preliminary stages of an attack using Xeon Sender.

To protect against threats like Xeon Sender, organizations should strengthen their monitoring and detection capabilities, particularly around SMS APIs and related permissions. Regularly reviewing and tightening security protocols for API keys and other credentials can also help mitigate the risk of compromise. As the tool continues to evolve, staying informed about its variants and improving detection strategies will be crucial for maintaining robust cybersecurity defenses.

Xeon Sender exemplifies the ongoing trend of cybercriminals exploiting cloud services for SMS spam campaigns. The tool's ability to use legitimate credentials and APIs from well-known SaaS providers poses a significant challenge to defenders. By understanding the tool’s mechanics and potential impact, organizations can take proactive steps to protect themselves from this growing threat.

Indicators of Compromise (IOC)

IndicatorTypeDescription
078e90c959e3290a4f716fbf4e1d09fe46aaa68bSHA-1 HashFile hash of the Xeon Sender tool.
08d7091b7a9907a6f5894f31cd34e3e8e11cc026SHA-1 HashFile hash of the Xeon Sender tool.
3597915cfbbcc7ea135bf889a89bff635c825e0dSHA-1 HashFile hash of the Xeon Sender tool.
4863a15f85cd0f16ad65434de2122324c04a868aSHA-1 HashFile hash of the Xeon Sender tool.
4e6e8b074943c7fab3206ddb0abf571ffaf68523SHA-1 HashFile hash of the Xeon Sender tool.
9b01d82ceb710df3f51e52a1726b0cda85b47672SHA-1 HashFile hash of the Xeon Sender tool.
ac1d71228114bd95647683e842d42e81a6e97a88SHA-1 HashFile hash of the Xeon Sender tool.
bff95ff87e4081386a6ce6b8289e1524a4a4bd47SHA-1 HashFile hash of the Xeon Sender tool.
e0981369347062ac7f3eb32b833eb4264577e073SHA-1 HashFile hash of the Xeon Sender tool.
f192bb0e141c48e5b0bf46083e30823ea58e8bb3SHA-1 HashFile hash of the Xeon Sender tool.
a19db8716c39454bf363327441dc2e5f46810c30SHA-1 HashArchive file hash related to Xeon Sender distribution.
33c622345804b46d0494f83720fad45ec0df3e97SHA-1 HashArchive file hash related to Xeon Sender distribution.
7a7d57ed5f24772afa07ad24313ace5d84646a49SHA-1 HashArchive file hash related to Xeon Sender distribution.

MITRE ATT&CK Table

TacticTechniqueIDDescription
Initial AccessValid AccountsT1078Xeon Sender requires valid API credentials to function, typically gained through compromised accounts.
ExecutionCommand and Scripting InterpreterT1059.007Xeon Sender uses Python scripting for executing its operations.
Command and ControlApplication Layer ProtocolT1071.001Xeon Sender communicates with SaaS APIs using HTTPS, a common application layer protocol.
PersistenceAbuse Elevation Control MechanismT1548.002Attackers may maintain access by using valid API keys that bypass standard authentication.
ImpactSpamT1458Xeon Sender sends spam messages via SMS using legitimate SaaS APIs.

References

Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials
Cloud attack tool has been repurposed by multiple threat actors to push SMS spam and smishing campaigns through major SaaS providers.