New hacking strategy uncovered

Hacker strategy, attack, hacker

Share post

The SophosLabs have uncovered a new hacking strategy. Apparently confused attack methods should let security mechanisms run nowhere. But the forensic experts at SophosLabs are on to them and have recently unmasked a new method of attack.

A new attack method has hit the net for the specialists at SophosLabs. Security experts Fraser Howard and Andrew O'Donnell came across an unusual variant in their hunt for new threats. In summary, the chain of attacks begins with a malicious email message including VB scripting code and ends with the placement of a remote access Trojan called MoDi RAT. During their forensic examinations, however, the specialists discovered some surprising actions in the confused sequence of attacks. This included, for example, starting a Visual Basic script file, which in turn activates a PowerShell in order to literally paste the text of the commands into the PowerShell window via the clipboard instead of passing the command string as a parameter. The goal behind it: Fileless attack scripts should avoid detection by security mechanisms in connection with the clipboard. This is exactly what all security experts are looking for in order to prepare protective solutions for such attacks.

Hacker strategy relies on tricks

“In our investigations, we uncovered some interesting telemetry data that indicate cybercriminals are attempting to evade detection. This is a general trend that we are seeing particularly this year. Attackers try different methods to improve their chances. The latest telemetry data was reason enough to delve deeper. In doing so, we uncovered some interesting tricks - notably the use of VBScript to inject the malicious commands into the PowerShell process. The goal of this approach was, with a high degree of certainty, to evade detection and stay out of sight of security teams,” said Fraser Howard, threat research director at Sophos.

Attack in confused steps - this is how it works

The entire attack chain sounds confused and not necessarily logical. But cyber criminals use just such tricks to try to prevent detection using security mechanisms. The individual steps remain under the radar and attract no attention.

The attack begins when the spam email is opened. The attached Visual Basic script connects to a remote location, the entry point into a series of HTTP 302 redirects. These in turn lead to a zip archive that is hosted on OneDrive cloud storage and contains an encoded VBS file.

Sophos Labs analyzes hacker strategy

The SophosLabs have identified a new hacking strategy.

In the next phase, the first VBScript writes a second VBS file into the file system and adds three new entries with binary data to the Windows registry, which are output as 8-digit binary numbers. The system service is then started to create a new scheduled task. This should start the VBS script at a previously defined future time.

When this scheduled task runs, it uses wscript.exe to start the VBS. The VBS code in turn starts PowerShell and executes a code that takes data from the VBS and places it on the clipboard. These data or commands are then inserted into the PowerShell window under program control using the VBS SendKeys command.

In the subsequent steps, PowerShell extracts a .NET decoder execution file from one of the registry blobs (called Entreur) that the VBE had previously created and loads it reflective by injecting it into a system process. The executable decoder file then extracts the .NET injector and the payload blobs (called inj or Myfile in the registry) from the registry. Finally, the injector loads the payload (injects into the host application msbuild.exe). The procedure for this attack is a little easier to understand in the diagram.

What can a company do?

It is extremely important that no older Windows operating systems are used in the IT infrastructure. The reason lies in the AMSI framework from Microsoft. This is only available in newer versions of Windows (Windows 10, Windows Server 2016 and Windows Server 2019) and provides the basis for detecting and repelling such attacks. Cyber ​​criminals know that even older systems are in use and make intensive use of this security gap.

More on this at Sophos.com

 

[starboxid=15]

 

Matching articles on the topic

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more

Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices ➡ Read more

The Terminator tool is coming back

BYOVD (Bring Your Own Vulnerable Driver) are still very popular among threat actors as EDR killers. One reason is, ➡ Read more