{"id":125396,"date":"2021-02-09T03:00:39","date_gmt":"2021-02-09T11:00:39","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=125396"},"modified":"2021-02-08T18:14:07","modified_gmt":"2021-02-09T02:14:07","slug":"u42-bendybear","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2021\/02\/u42-bendybear\/","title":{"rendered":"Exposing the Sophisticated Cyber Espionage Tool Known as BendyBear"},"content":{"rendered":"<p>On Tuesday, Unit 42 disclosed the discovery of BendyBear, one of the most sophisticated cyber espionage tools seen to date. It is designed for <em>extreme<\/em> stealth, with features that allow it to evade detection by security products and make it difficult for threat researchers to reverse engineer. Unit 42 published a report with details on the malware\u2019s capabilities, \u201c<a href=\"https:\/\/unit42.paloaltonetworks.com\/bendybear-shellcode-blacktech\/\">BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech<\/a>.\u201d<\/p>\n<p>BendyBear appears to be a variant of WaterBear, malware used for lateral movement while hiding its activities, due to strong similarities. Other researchers, including <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/19\/l\/waterbear-is-back-uses-api-hooking-to-evade-security-product-detection.html\" rel=\"nofollow,noopener\" >Trend Micro<\/a> and <a href=\"https:\/\/blogs.jpcert.or.jp\/ja\/2020\/02\/japan-security-analyst-conference-2020-1.html\" rel=\"nofollow,noopener\" >TeamT5<\/a>, have attributed WaterBear to BlackTech, a group with links to <a href=\"https:\/\/www.taiwannews.com.tw\/en\/news\/3991160\" rel=\"nofollow,noopener\" >the Chinese government<\/a> that is believed to be responsible for attacks on East Asian governments and technology organizations dating back to at least 2009.<\/p>\n<p>BendyBear uses a modified version of RC4 encryption, which hardens the encryption and makes it more difficult to break its network communications. It also uses polymorphic code that gives the malware chameleon-like abilities: It alters its bytes after runtime execution, making it unreadable, meaningless and extremely difficult to detect. It loads payloads directly into memory, rather than a filesystem, which means it\u2019s not leaving behind traditional fingerprints for threat researchers and security products to find. These features make it exceptionally difficult to detect.<\/p>\n<p>Unit 42 has already shared information about BendyBear with trusted government and industry partners, including the Cyber Threat Alliance. That data includes Indicators of Compromise (IoCs) that organizations can use to determine if they\u2019ve been compromised by BendyBear and also block future attacks.<\/p>\n<p>Palo Alto Networks hopes that the release of this information will shed enough light on BendyBear to make it a far less effective tool for cyber espionage. Still, we urge organizations to remain vigilant against attackers utilizing advanced tactics to remain undetected, as exhibited by the <a href=\"https:\/\/www.crn.com\/news\/security\/solarwinds-should-have-been-more-vigilant-palo-alto-networks-ceo\" rel=\"nofollow,noopener\" >SolarWinds attacks<\/a>.<\/p>\n<p>Palo Alto Networks offers protections from the BendyBear attacks outlined in this blog through <a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cortex-xdr\">Cortex XDR<\/a>, as well as its <a href=\"https:\/\/www.paloaltonetworks.com\/products\/threat-detection-and-prevention\/dns-security\">DNS Security<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/products\/threat-detection-and-prevention\/web-security\">URL Filtering<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/wildfire\">WildFire<\/a> subscriptions for the <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/next-generation-firewall\">Next-Generation Firewall<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unit 42 has disclosed the discovery of BendyBear, extremely stealthy malware that is one of the most sophisticated cyber espionage tools seen to date.<\/p>\n","protected":false},"author":65,"featured_media":125397,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308],"tags":[164,6737,460,74,111],"coauthors":[704],"class_list":["post-125396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","tag-apt","tag-cortex-xdr","tag-cyber-espionage","tag-malware","tag-ngfw"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/02\/Espionage-r3d3.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/125396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=125396"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/125396\/revisions"}],"predecessor-version":[{"id":125410,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/125396\/revisions\/125410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/125397"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=125396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=125396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=125396"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=125396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}