This post is also available in: 日本語 (Japanese)
On Tuesday, Unit 42 disclosed the discovery of BendyBear, one of the most sophisticated cyber espionage tools seen to date. It is designed for extreme stealth, with features that allow it to evade detection by security products and make it difficult for threat researchers to reverse engineer. Unit 42 published a report with details on the malware’s capabilities, “BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech.”
BendyBear appears to be a variant of WaterBear, malware used for lateral movement while hiding its activities, due to strong similarities. Other researchers, including Trend Micro and TeamT5, have attributed WaterBear to BlackTech, a group with links to the Chinese government that is believed to be responsible for attacks on East Asian governments and technology organizations dating back to at least 2009.
BendyBear uses a modified version of RC4 encryption, which hardens the encryption and makes it more difficult to break its network communications. It also uses polymorphic code that gives the malware chameleon-like abilities: It alters its bytes after runtime execution, making it unreadable, meaningless and extremely difficult to detect. It loads payloads directly into memory, rather than a filesystem, which means it’s not leaving behind traditional fingerprints for threat researchers and security products to find. These features make it exceptionally difficult to detect.
Unit 42 has already shared information about BendyBear with trusted government and industry partners, including the Cyber Threat Alliance. That data includes Indicators of Compromise (IoCs) that organizations can use to determine if they’ve been compromised by BendyBear and also block future attacks.
Palo Alto Networks hopes that the release of this information will shed enough light on BendyBear to make it a far less effective tool for cyber espionage. Still, we urge organizations to remain vigilant against attackers utilizing advanced tactics to remain undetected, as exhibited by the SolarWinds attacks.
Palo Alto Networks offers protections from the BendyBear attacks outlined in this blog through Cortex XDR, as well as its DNS Security, URL Filtering and WildFire subscriptions for the Next-Generation Firewall.