visit
Research by: Aviran Hazum, Alex Shamshur, Raman Ladutska, Ohad Mana, Israel Wernik
We tracked the activity of the threat actor, who goes by the nickname Triangulum, in several Darknet forums.
“Triangulum” in Latin means “triangle” and the term is commonly used in relation to the Triangulum galaxy which is a spiral galaxy located in the Triangulum constellation.Just like the Triangulum galaxy, it is hard to spot the traces of the Triangulum actor. But once you do spot him, he’s relatively easy to follow.
Nickname
: Triangulum™
Skype
: triangulum_10 | crook_62
: [email protected]
Discord
: Triang#9504
Alternate identities
: Magicroot
Alleged origin
: Indian
Strengths
: High level of social skills combined with a math background in trigonometry, integration and differentiation
Age
: Approximately 25 years old
Personal details:
- 190cm tall
- had two tortoises as home pets back in 2017
- had a girlfriend back in 2017 (current marital status is unknown)
Preferable laptop models
: Lenovo, HP, Sony, Dell
In the past few years that Triangulum has been active in the dark corners of the internet, he has shown an impressive learning curve. Over a two-year period, he dedicated most of his time to evaluating the market needs and developing a merch network from scratch by maintaining partnerships, rooting investments and distributing malware to potential buyers.Triangulum appears to have gotten started at the very beginning of 2017, when he joined the hack forums in the Darknet.Triangulum initially exhibited some technical skills by reverse engineering malware, but at that point in time still seemed to be an amateur developer.Triangulum also communicated with different users, trying to estimate the market value for different kinds of malware.On June 10, 2017, Triangulum provided a first glimpse of a product he developed by himself.Figure 1. Triangulum teaser for the 1st version of his product.
This product was a mobile RAT that targeted Android devices, and was capable of exfiltrating sensitive data to a C&C server, as well as destroying local data, even deleting the entire OS.As Triangulum moved on to marketing his product, he looked for investors and a partner to help him create a PoC to show off the RAT’s capabilities in all its glory.Figure 2. Message from Triangulum suggesting investment in his product
Figure 3. Looking for a partner.
On October 20, 2017, Triangulum offered his first malware for sale. After that, Triangulum vanished from the radar for a period of a year and a half, with no evident signs of activity in the Darknet.Triangulum surfaced again on April 6, 2019, with another product for sale. From this point on, Triangulum became very active, advertising 4 different products within half a year. It appeared that Triangulum had spent his time off creating a well-functioning production line for developing and distribution malwares.And indeed, after further digging, we observed evidence that indicated Triangulum was sharing his kingdom with another actor nicknamed HexaGoN Dev.
Figure 4. In the past, Triangulum purchased a few projects created by HeXaGoN Dev.
Combining the programming skills of HeXaGon Dev together with the social marketing skills of Triangulum, these 2 actors posed a legitimate threat.Figure 5. HeXaGoN Dev responding to one of Rogue’s customers on behalf of Triangulum.
Working together, Triangulum and HeXaGoN Dev produced and distributed multiple malwares for Android, including crypto miners, key loggers, and sophisticated P2P (Phone to Phone) MRATs.Figure 6. Advertisement of a product for sale in 2017.
Figure 7. Advertisements of products for sale in 2019 (DarkShades) and 2020 (Rogue).
Despite the fact the malware was sold at affordable prices and with different subscription plans, apparently that wasn’t enough for the Triangulum team.We observed some dirty marketing tricks from the actors. Once, HeXaGoN Dev pretended to be a potential buyer, and commented on one of Triangulum’s posts, promoting the product and praising the development in order to attract more customers.Figure 8. Triangulum responds to HeXaGoN Dev’s comment which was designed to whip up interest on the buyers’ side.
It is interesting to note that the team doesn’t want to show demo videos of their products in action.Figure 9. Triangulum explains that a demo video is unnecessary.
Figure 10. Triangulum’s arguments in an online dispute.
Triangulum’s reputation allows him to be a respected member of the hacking society; he receives a lot of positive feedback and has a high status on his home forum.Figure 11. Triangulum’s reputation on his home forum.
Of course, this helps his sales as well: when customers see someone who is a long-term member with many products behind him, together with positive feedback from other users and confident replies by the author, this makes them more inclined to make a purchase.Figure 12. Feedback about Triangulum’s products from users.
Customers apparently flock to Triangulum, despite the lack of demo videos, as well as evidence of dirty marketing tricks and some other warning flags.Figure 13. Post offering one of Triangulum’s products for sale.
Despite his previous reputation on his home forum, he didn’t receive a warm welcome here. Users were not ready to pay for the product without a demo video, especially to a relative unknown as he was on this new site. As he did previously, Triangulum stated that he didn’t feel it necessary to provide demo videos.Figure 14. Triangulum suggesting buying instead of trying.
After several other increasingly acrimonious posts, the topic was closed with the resolution “Topic-author could not be trusted” with a suggestion to attempt to gain users’ trust. All of this transpired within a period of just 5 days after the topic was opened.Figure 15. Triangulum sales didn’t even get a start on the Russian Darknet forum.
What worked well in Triangulum’s home forum didn’t stand a chance in the Russian segment. Triangulum clearly took this lesson to heart, as we have not observed any activity in other Darknet segments since then. Instead of adjusting to customer demands, he stuck to his scheme of what had worked previously, and didn’t want to change it even slightly.Inside the Rogue package, we found two main components. One was what appeared to be DarkShades malware, and the other one was Hawkshaw. What’s so interesting here is that neither of them initially belonged to Triangulum.
DarkShades was originally sold in the Darknet by HeXaGoN in August 2019.
Figure 16. DarkShades sold by HeXaGoN.
The DarkShades project was officially sold to Triangulum 3 days after the initial sales began, and a new sales thread was created, this time by Triangulum himself.Figure 17. DarkShades sold by Triangulum.
What Triangulum did was to embellish the advertisement (see figure 7, to the left) compared to the original one.
Figure 18. DarkShades as originally advertised by HeXaGoN.
DarkShades was not the original product developed, as indicated by the name of its main package (“com.cosmos”) which is a direct link to another product sold by HeXaGoN earlier that year: Cosmos RAT.
Figure 19. Cosmos RAT advertisement; this malware was offered for sale by HeXaGoN.
Interestingly enough, this malware was not acquired to be re-sold by Triangulum. Given the fact how methodically he re-sold other HeXaGoN products, this gap is likely due to DarkShades being a superior successor to Cosmos. Thus, re-sale of Cosmos was unnecessary.Regarding Hawkshaw, its malware source code was leaked in 2017 and is available on the web ever since. The version that we discovered inside the Rogue package is “v.1.17”.A summary of Rogue’s genealogic tree is shown in the diagram below:Figure 20. Rogue malware origins.
Rogue appears to be the latest iteration in malware developed and maintained by HeXaGoN and Triangulum. However, we cannot call it an entirely new malware family. Rather, it’s the combined version of the Cosmos and Hawkshaw malware families. We also have to add that Triangulum didn’t develop his creation from scratch, but took what was available from both worlds, open-source and the Darknet, and united these components.Maintaining persistence
When Rogue successfully gains all of the required permissions (if all of the required permissions are not granted, it will repeatedly ask the user to grant the missing permissions), it hides its icon as a camouflage defense, making sure it will not be easy to get rid of it.The malware then registers as a device administrator. If the user tries to revoke the admin permission, an onscreen message designed to strike terror in the heart of the user appears: “Are you sure to wipe all the data??”In addition, by comparing specific pre-defined values to ones given by the system, Rogue can detect a virtual environment, which may lead to a delay\abort of its malicious intentions.Figure 21. The malware hides its icon.
Networking
The Rogue malware family adopted the services of the Firebase platform to disguise its malicious intentions and masquerade as a legitimate Google service.Rogue uses Firebase’s services as a C&C (command and control) server, which means that all of the commands that control the malware and all of the information stolen by the malware is delivered using Firebase’s infrastructure.Google Firebase incorporates a dozen of services to help developers create mobile and web applications. The Rogue malware uses the following ones:TYPE_VIEW_TEXT_CHANGED
TYPE_VIEW_FOCUSED
TYPE_VIEW_CLICKED
Figure 22. Rogue uploads the documented data.
In addition, the malware registers its own notification service which is used to sniff every notification that pops up on the infected device.Every notification that is triggered after the implantation of the service, is being saved to a local predetermined database and will later be uploaded to the Firebase Database.The malware saves multiple types of notifications and parses them by splitting each notification into these fields:com.facebook.katana
com.facebook.orca
com.instagram.android
com.whatsapp
com.skype.raider
org.telegram.messenger
kik.android
jp.naver.line.android
com.google.android.gm
org.telegram.messenger
kik.android
jp.naver.line.android
com.tencent.mm
Figure 23. Rogue saves the notifications.
Rogue also maintains a “Block List” for phone numbers. The malware can choose which numbers are in this list, and if it detects an incoming or an outgoing call to one of these numbers, it drops the call.This is done by registering a call receiver called
me.hawkshaw.receiver.CallReceiver
that later uses the CallBlock
handler to block a certain call.Figure 24. Rogue registers the call receiver.
On the other hand, when accepting calls, Rogue can record each and every call, incoming or outgoing, and leak it to the Firebase Cloud Store.Figure 25. Rogue listens to every call.
figure 26. Message on September 14, 2020 from an interested customer.
In fact, at the time this report was written, Triangulum is still active and expanding his customer network. Despite all the obstacles and some failures (like an unsuccessful attempt to start sales in the Russian Darknet segment) along the way, together with HeXaGoN he still distributes malware products through his home Darknet forum.We leave it as an exercise to the reader to compare the two brochures with advertisements of DarkShades and Rogue (see figure 7), and find the differences between them.
A lesson to draw here is that threat actors have created a reality in which we cannot be complacent. We must stay constantly vigilant for threats that are lurking around the corner and understand how to protect ourselves from them.In any case, if you’re stepping into this arena, you’d better come prepared.In this research, CPR uncovered a fully active market that sells malicious mobile malware, living and flourishing on the dark net and other related web forums. Similar to Triangulum, other threat actors are perfecting their craft and selling mobile malware across the dark Web – so we need to stay vigilant for new threats that are lurking around the corner and understand how to protect ourselves from them.