Tricked: Microsoft Defender runs malware

B2B Cyber ​​Security ShortNews

Share post

LockBit actors use Windows Defender command-line tool MpCmdRun.exe to infect PCs with Cobalt Strike Beacon. After that, the ransomware LockBit will be installed. Microsoft should be on high alert if they aren't already.

Cybersecurity research company SentinelOne has released news: They have discovered that Microsoft's internal anti-malware solution is being abused to load Cobalt Strike Beacon onto victim PCs and servers. The attackers in this case are LockBit ransomware as a service (RaaS) operators MpCmdRun.exe abused to infect victims' PCs.

Microsoft Defender Tool abused

At this point, the attackers exploit the Log4j vulnerability to MpCmdRun.exe Download the infected "mpclient" DLL file and the encrypted Cobalt Strike payload file from their command and control server. In this way, a victim's system is specifically infected. This is followed by the classic process: the blackmail software LockBit is used, the system is encrypted and a ransom demand is displayed.

LockBit slips through the vulnerability

LockBit has been getting quite a bit of attention lately. Last week SentinelLabs reported on LockBit 3.0 (aka LockBit Black) and described how the latest iteration of this increasingly popular RaaS implemented a set of anti-analysis and anti-debugging routines. The research was quickly followed by others who reported similar findings. Meanwhile, back in April, SentinelLabs reported how a LockBit subsidiary used the legitimate VMware command-line utility, VMwareXferlogs.exe, in a live deployment to sideload Cobalt Strike.

In a detailed article, SentinelOne shows how the actually legitimate Microsoft Defender tool is being misused by attackers.

More at SentinelOne.com

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more