Frequently Asked Questions

Product Information & Threat Intelligence

What is Iron Tiger's SysUpdate and how does it target Linux systems?

Iron Tiger's SysUpdate is a malware family known for targeting Windows systems and, in its latest version, Linux systems as well. The malware uses DLL side-loading vulnerabilities and modular architecture to evade detection and persist on infected machines. The Linux variant uses ELF files, C++ code, and the Asio library for cross-platform compatibility, ensuring persistence via systemd scripts and encrypted communication with its command and control (C&C) servers. (Source: Original Webpage)

How does SysUpdate achieve persistence on infected Linux systems?

SysUpdate ensures persistence on Linux by copying a script to the /usr/lib/systemd/system/ directory and creating a symlink in /etc/ystem/system/multi-user.target.wants/. This method works if the process has root privileges, allowing the malware to start automatically on system boot. (Source: Original Webpage)

What new features were added to SysUpdate in the latest campaign?

The latest SysUpdate version added C&C communication through DNS TXT requests, enabling the malware to send and receive information using DNS as a covert channel. This is in addition to existing features like service management, screenshot capture, process management, file operations, and command execution. (Source: Original Webpage)

How does SysUpdate use DNS TXT records for command and control?

SysUpdate retrieves DNS servers from the system and, if necessary, defaults to Google's 8.8.8.8. It generates a unique domain name using a random number and encodes it with Base32. The malware then sends DNS TXT requests to the C&C server, which replies with commands. This method helps the malware blend in with legitimate DNS traffic. (Source: Original Webpage)

What information does SysUpdate collect from infected machines?

SysUpdate collects a range of system information, including GUID, hostname, domain name, username, user privileges, processor architecture, process ID, OS version, file path, and local IP address and port. This data is encrypted and sent to the C&C server. (Source: Original Webpage)

How does SysUpdate use stolen certificates?

SysUpdate samples have been found signed with a stolen certificate belonging to 'Permyakov Ivan Yurievich IP.' The certificate was also used to sign legitimate VMProtect software, which is often used to obfuscate malware. The use of stolen certificates helps the malware appear legitimate and evade detection. (Source: Original Webpage)

What is DLL side-loading and how does SysUpdate exploit it?

DLL side-loading is a technique where a legitimate executable loads a malicious DLL instead of the intended one. SysUpdate exploits this by using signed executables like rc.exe or Wazuh, loading malicious DLLs that then execute the malware payload. (Source: Original Webpage)

How does SysUpdate's modular architecture affect its capabilities?

SysUpdate's modular architecture allows threat actors to customize features for each campaign. For example, DNS C&C communication code is only present in samples that use it, suggesting the builder can enable or disable features as needed. (Source: Original Webpage)

What legitimate software was abused by SysUpdate in recent attacks?

SysUpdate was observed abusing Wazuh, a free and open-source security platform, by exploiting a sideloading vulnerability in its signed executable. This allowed the malware to appear legitimate in the victim's environment. (Source: Original Webpage)

How does SysUpdate's use of DNS C&C differ from previous versions?

Earlier SysUpdate versions used hardcoded IP addresses for C&C communication. The latest version uses domain names and DNS TXT records, likely to support the new DNS-based communication feature and improve stealth. (Source: Original Webpage)

What is the significance of VMProtect in SysUpdate campaigns?

VMProtect is a commercial software used to obfuscate code and hinder analysis. In SysUpdate campaigns, threat actors used VMProtect to obfuscate malware and signed it with a stolen certificate, making detection and analysis more difficult. (Source: Original Webpage)

How did SysUpdate use chat applications as an infection vector?

SysUpdate was distributed using repackaged chat applications, such as 'i Talk,' which included both legitimate and malicious components. Victims were lured into opening these applications, leading to infection. This tactic is consistent with previous Iron Tiger campaigns targeting chat apps in government and critical sectors. (Source: Original Webpage)

What are the main functionalities of SysUpdate malware?

SysUpdate provides service management, screenshot capture, process management, drive information retrieval, file management (find, delete, rename, upload, download), and command execution. It also supports modular C&C communication and persistence mechanisms. (Source: Original Webpage)

How does Cymulate help organizations defend against threats like SysUpdate?

Cymulate's Exposure Management Platform enables organizations to simulate real-world threats, including advanced malware like SysUpdate, across the full kill chain. This helps validate defenses, identify exploitable exposures, and prioritize remediation to strengthen overall security posture. (Source: Knowledge Base)

What resources does Cymulate provide for understanding advanced threats?

Cymulate offers whitepapers, guides, solution briefs, data sheets, and e-books covering exposure management, threat validation, and vulnerability management. These resources are available in the Resource Hub. (Source: Knowledge Base)

How does Cymulate's immediate threats module help organizations respond to new attacks?

Cymulate's immediate threats module is updated rapidly to reflect new attacks. According to a Penetration Tester, it allows organizations to quickly assess their risk and implement remedial action when a new attack emerges. (Source: Knowledge Base)

What types of threats can Cymulate validate?

Cymulate validates threats across the full kill chain, including phishing, malware, lateral movement, data exfiltration, and zero-day exploits, using daily updated threat templates and AI-generated attack plans. (Source: Knowledge Base)

How does Cymulate's Threat Validation solution differ from manual pen tests and traditional BAS?

Cymulate's Threat Validation provides automated, continuous security testing with a library of over 100,000 attack actions, easy out-of-the-box integrations, and automated mitigation. This approach overcomes the limitations of infrequent manual tests and cumbersome traditional BAS tools. (Source: Knowledge Base)

Features & Capabilities

What are the key features of Cymulate's Exposure Management Platform?

Cymulate's platform offers continuous threat validation, unified BAS and CART, AI-powered optimization, complete kill chain coverage, attack path discovery, automated mitigation, cloud validation, and ease of use. Customers report measurable outcomes such as a 52% reduction in critical exposures and a 60% increase in team efficiency. (Source: Knowledge Base)

Does Cymulate integrate with other security technologies?

Yes, Cymulate integrates with numerous security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, CrowdStrike Falcon, Crowdstrike Falcon LogScale, and Cybereason. For a full list, visit the Partnerships and Integrations page. (Source: Knowledge Base)

How does Cymulate's 'Threat (IoC) updates' feature improve threat resilience?

The 'Threat (IoC) updates' feature provides recommended Indicators of Compromise that can be exported and applied directly to security controls, improving resilience by enabling rapid defense against new threats. (Source: Knowledge Base)

What is threat exposure prioritization in cybersecurity?

Threat exposure prioritization is the process of identifying and ranking vulnerabilities based on their exploitability and impact on business-critical assets. Cymulate automates this process, helping teams focus on exposures not protected by security controls. (Source: Knowledge Base)

What does Cymulate mean by 'threats validated'?

'Threats validated' means Cymulate can provide full-spectrum validation across an organization's tools, controls, and environments, proving the exploitability of threats in the specific environment and showing exactly where defenses fail. (Source: Knowledge Base)

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams across industries such as media, transportation, financial services, retail, and healthcare. Organizations of all sizes, from small businesses to enterprises, can benefit. (Source: Knowledge Base)

What business impact can customers expect from using Cymulate?

Customers typically see a 30% improvement in threat prevention, a 52% reduction in critical exposures, a 60% increase in efficiency, 40X faster threat validation, and an 81% reduction in cyber risk within four months. (Source: Knowledge Base)

How easy is it to implement Cymulate and get started?

Cymulate is easy to implement, requiring only a few clicks to start running simulations. It supports agentless deployment, quick onboarding, and minimal resource requirements. Customers report fast and straightforward integration with existing technologies. (Source: Knowledge Base)

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly dashboard, ease of deployment, and excellent support. Testimonials highlight the platform's simplicity and the practical insights it provides for improving security posture. (Source: Knowledge Base)

Pain Points & Solutions

What core problems does Cymulate solve for security teams?

Cymulate addresses overwhelming threat volumes, lack of visibility, unclear prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers by providing continuous threat validation, automation, and actionable insights. (Source: Knowledge Base)

How does Cymulate address the specific needs of different security roles?

Cymulate tailors its solutions for CISOs (exposure scoring, metrics), SecOps (automation, efficiency), red teams (scalable offensive testing), and vulnerability management teams (prioritization and consolidation of insights). (Source: Knowledge Base)

What problems does Cymulate's Threat Validation solution solve?

Cymulate's Threat Validation addresses lack of confidence in security controls and security configuration drift by continuously validating defenses and identifying gaps as configurations change. (Source: Knowledge Base)

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate is SOC2 Type II certified and complies with ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1. These certifications cover security, privacy, and cloud service best practices. (Source: Knowledge Base)

How does Cymulate ensure data security and privacy?

Cymulate hosts services in secure AWS data centers, uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), and follows a strict Secure Development Lifecycle. The company also complies with GDPR and has a dedicated privacy and security team. (Source: Knowledge Base)

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs, based on the chosen package, number of assets, and scenarios. For a quote, schedule a demo with Cymulate's team. (Source: Knowledge Base)

Competition & Comparison

How does Cymulate compare to AttackIQ?

Cymulate offers an industry-leading threat scenario library and AI-powered capabilities for workflow automation and security posture improvement. AttackIQ focuses on automated security validation but lacks Cymulate's innovation, threat coverage, and ease of use. Read more. (Source: Knowledge Base)

How does Cymulate compare to Mandiant Security Validation?

Mandiant is an original BAS platform but has seen little innovation in recent years. Cymulate continually innovates with AI and automation, expanding into exposure management and recognized as a grid leader. Read more. (Source: Knowledge Base)

How does Cymulate compare to Pentera?

Pentera is useful for attack path validation but lacks Cymulate's depth in assessing and strengthening defenses. Cymulate optimizes defense, scales offensive testing, and increases exposure awareness. Read more. (Source: Knowledge Base)

How does Cymulate compare to Picus Security?

Picus may suit organizations seeking an on-prem BAS vendor. Cymulate offers a more complete exposure validation platform, covering the full kill chain and cloud control validation. Read more. (Source: Knowledge Base)

How does Cymulate compare to SafeBreach?

Cymulate outpaces SafeBreach with unmatched innovation, precision, and automation, featuring the industry’s largest attack library and a full CTEM solution. Read more. (Source: Knowledge Base)

How does Cymulate compare to Scythe?

Scythe is suitable for advanced red teams building custom attack campaigns. Cymulate provides a more comprehensive exposure validation platform with actionable remediation and automated mitigation. Read more. (Source: Knowledge Base)

How does Cymulate compare to NetSPI?

NetSPI excels in penetration testing as a service (PTaaS). Cymulate is designed for continuous, independent assessment and strengthening of defenses, recognized as a leader in exposure validation by Gartner and G2. Read more. (Source: Knowledge Base)

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: The Security Tradeoffs Behind AI Tooling
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Iron Tiger's SysUpdate Reappears, Adds Linux Targeting

March 5, 2023

The attacker runs rc.exe, a legitimate "Microsoft Resource Compiler" signed file , which is vulnerable to a DLL side-loading vulnerability, and loads a file named rc.dll. The malicious rc.dll loads a file named rc.bin in memory. The rc.bin file is a Shikata Ga Nai encoded shellcode that decompresses and loads the first stage in memory. Depending on the number of command line parameters, different actions are performed: Zero or two parameters: "Installs" the malware in the system, and calls Stage 1 again via process hollowing with four parameters One parameter: Same as previous action but without the "installation" Four parameters: Creates a memory section with the DES-encrypted malware configuration and a second Shikata Ga Nai shellcode decompressing and loading Stage 2. It then runs Stage 2 via process hollowing. The "installation" step is considered simple wherein the malware moves the files to a hardcoded folder. Depending on the privileges of the process, the malware either creates a registry key or a service that launches the moved executable rc.exe with one parameter. This ensures that the malware will be launched during the next reboot, skipping the installation part. Analysts saw different legitimate executables being used, sideloading different DLL names, and multiple binary files names being loaded by those DLLs. Analysts want to highlight that this is the first time Analysts observed a threat actor abusing a sideloading vulnerability in a Wazuh signed executable. Wazuh is a free and open source security platform, and Analysts could confirm that one of the victims was using the legitimate Wazuh platform. It is highly likely that Iron Tiger specifically looked for this vulnerability to appear legitimate in the victim's environment. Analysts have notified the affected victim of this intrusion but received no feedback. Looking at the features, several of the functions found in the latest update are similar to the previous SysUpdate version: Service manager (lists, starts, stops, and deletes services) Screenshot grab Process manager (browses and terminates processes) Drive information retrieval File manager (finds, deletes, renames, uploads, downloads a file, and browses a directory) Command execution Iron Tiger also added a feature that had not been seen before in this malware family: C&C communication through DNS TXT requests. While DNS is not supposed to be a communication protocol, the attacker abuses this protocol to send and receive information. First, the malware retrieves the configured DNS servers by calling the GetNetworkParams API function and parsing the DnsServerList linked list. If this method fails, the malware uses the DNS server operated by Google at IP address 8.8.8.8. For the first request, the malware generates a random number of 32 bits and appends 0x2191 to it. This results in six bytes - four for the random number, two for 0x2191 - and encodes the result further with Base32 algorithm using the alphabet "abcdefghijklmnopqrstuvwxyz012345". The contacted domain name is after "TXT"; only the first four letters change as the rest of the encoded series is always the same. This is because the random number changes every time, but the end is the same "0x2191" result. This explains why the first DNS request always ends with "reeaaaaaa.". If the C&C reply matches the format expected by the malware, it launches multiple threads that handle further commands and sends information about the infected machine. Interestingly, the code related to this DNS C&C communication is only present in samples that use it, meaning that the builder is modular and that there might be samples in the wild with unreported features. Analysts continue monitoring this group and malware family for updates on possible variations of C&C communication protocols being abused. In all versions, the malware retrieves information on the infected machine and sends it to the C&C encrypted with DES. Collected machine information includes the following: Randomly generated GUID Hostname Domain name Username User privileges Processor architecture Current process ID Operating system version Current file path Local IP address and port used to send the network packet Analysts noted that Stage 2 does not embed the configuration file, which is copied in memory by the previous stage. Analysts only saw one case where there was only one stage being decrypted in memory and the configuration was hardcoded. Interestingly, all the samples of this "new" version had a domain name as its C&C. In the previous version of SysUpdate, the group used hardcoded IP addresses as C&C. It is possible that this change is a consequence of the new DNS TXT records' communication feature as it requires a domain name. While investigating SysUpdate's infrastructure, Analysts found some ELF files linked to some C&C servers. Analysts analyzed them and concluded that the files were a SysUpdate version made for the Linux platform. The ELF samples were also written in C++, made use of the Asio library, shared common network encryption keys, and had many similar features. For example, the file handling functions are almost the same. It is possible that the developer made use of the Asio library because of its portability across multiple platforms. Some parameters can be passed to the binary (note that "Boolean" refers to Boolean data that is sent to the C&C): The persistence is ensured by copying a script similarly named as the current filename to the /usr/lib/systemd/system/ directory, and creating a symlink to this file in the /etc/ystem/system/multi-user.target.wants/ directory. Thus, this method only works if the current process has root privileges. The content of the script is: [Unit] Description=xxx [Service] Type=forking ExecStart= -x ExecStop=/usr/bin/id [Install] WantedBy=multi-user.target After running the code dependent on the parameters, if the operator has not chosen a GUID with the "-f" parameter, the malware generates a random GUID and writes it to a file similarly named as the current file, with a "d" appended to it. Then, the malware retrieves information on the compromised computer and sends it to the C&C. The following information is sent to the C&C, encrypted with a hardcoded key and DES CBC algorithm: GUID Host name Username Local IP address and port used to send the request Current PID Kernel version and machine architecture Current file path Boolean (0 if it was launched with exactly one parameter, 1 otherwise) For the DNS C&C communication version, the malware retrieves the configured DNS server by reading the content of the /etc/resolv.conf file, or uses the DNS server operated by Google at IP address 8.8.8.8. Another interesting part of this campaign is the fact that some of the malicious files are signed with a certificate with the following signer: "Permyakov Ivan Yurievich IP". Looking for that name in search engines brings results from the official VMProtect website. The email address linked to the Authenticode certificate also links to that domain name. VMProtect is a commercial software intended to make analysis of code extremely difficult by implementing a custom virtual machine with non-standard architecture. The software has been used by multiple APT and cybercrime groups in the past to obfuscate their malware. When searching on malware repositories for other files signed by the same certificate, Analysts find multiple files named "VMProtectDemo.exe", "VMProtect.exe", or "VMProtect_Con.exe", which suggests that an official demo version of VMProtect is also signed by this certificate. It appears that the threat actor managed to retrieve the private key allowing him to sign malicious code. As of this writing, the certificate is now revoked. Using stolen certificates to sign malicious code is a common practice for this threat actor, as Analysts already highlighted in 2015 and in all recent investigations. Interestingly, the threat actor not only signed some of its malicious executables with the stolen certificate, but also used VMProtect to obfuscate one of them. In late January 2023, a Redline stealer sample (detected by Trend Micro as TrojanSpy.Win32.REDLINE.YXDA1Z, SHA256: e24b29a1df287fe947018c33590a0b443d6967944b281b70fba7ea6556d00109) signed by the same certificate was uploaded. Analysts do not believe that the stealer is linked to Iron Tiger, considering that the network infrastructure is different, and previous reports document the malware's goals to be centered on committing cybercrime than data theft. This could mean other users managed to extract the same private key from the VMProtect demo version, or it was sold in the underground to different groups, Iron Tiger among them. Analysts did not find an infection vector. However, Analysts noticed that one of the executables packed with VMProtect and signed with the stolen certificate was named "youdu_client_211.9.194.exe". Youdu is the name of a Chinese instant messaging application aimed for use of enterprise customers. Its website mentions multiple customers in many industries, some of them in critical sectors such as government, energy, healthcare, or banking. But they also have other customers in industries such as gaming, IT, media, construction, and retail, apparently all located inside China. The properties of the malicious file also match the usual Youdu version numbering. However, the legitimate files are signed with a "Xinda.im" certificate instead of the stolen VMProtect certificate. As seen in the product name identified in the malicious file's properties, Analysts searched for possible products named "i Talk" but did not find any that could be related to this investigation. However, Analysts found traces of files from the legitimate Youdu chat application signed by Xinda.im being copied to folders named "i Talk" on one victim's computer. This suggests that some chat application named "i Talk" might be repackaging components from the official Youdu client along with malicious executables. It appears that a chat application was used as a lure to entice the victim into opening the malicious file. This would be consistent with the tactics, techniques, and procedures (TTPs) of two previous Iron Tiger campaigns from 2020 and 2021: a documented compromise of a chat application widely used by the Mongolian government, and a supply chain attack on Mimi chat, a chat application used in parts of South East Asia.