May 02 2025

How to Create Your Own Home Lab for Hacking

Category: Hackingdisc7 @ 1:55 pm

Pawan Jaiswal’s guide, published on April 24, 2025, offers a comprehensive walkthrough for setting up a personal hacking lab. This resource is tailored for aspiring penetration testers, ethical hackers, and cybersecurity enthusiasts seeking hands-on experience in a controlled environment. The lab facilitates practical learning without risking real-world systems.

1. Purpose and Advantages of a Home Lab

Establishing a home lab provides a safe space to practice cybersecurity techniques. It allows learners to experiment with tools, understand vulnerabilities, and develop problem-solving skills. The lab serves as a sandbox for testing exploits, conducting scans, and simulating attacks without legal or ethical concerns.

2. Essential Hardware and Software Requirements

A robust setup is crucial for running multiple virtual machines (VMs). Recommended specifications include an Intel i5 or Ryzen 5 processor, a minimum of 8 GB RAM (16 GB preferred), and at least 512 GB SSD storage. For virtualization, tools like VirtualBox or VMware Workstation Player are suggested due to their user-friendliness and compatibility.

3. Configuring Virtual Machines

The lab setup involves creating an attacker machine and several victim machines:

  • Attacker Machine: Kali Linux is the preferred choice, equipped with tools like Nmap, Metasploit, and Wireshark.
  • Victim Machines: These include Metasploitable 2/3, DVWA (Damn Vulnerable Web App), OWASP Broken Web Apps, and Windows 10/11 VMs. These systems are intentionally vulnerable, providing realistic targets for practice.

4. Networking and Security Measures

Proper network configuration ensures isolation and safety:

  • Host-Only Networking: Prevents VMs from accessing the internet, mitigating the risk of unintended consequences.
  • Internal Networking: Allows communication between VMs for simulating attacks like DNS poisoning or man-in-the-middle scenarios.

Tools like tcpdump and Wireshark can be used to monitor and analyze network traffic within the lab.

5. Progressive Learning and Expansion

As skills develop, the lab can be expanded:

  • Additional Targets: Incorporate platforms like Juice Shop, bWAPP, or WebGoat for diverse challenges.
  • Capture The Flag (CTF) Challenges: Engage with VulnHub VMs or platforms like TryHackMe and Hack The Box to test and enhance skills.

6. Cloud-Based Alternatives

For those with hardware limitations, cloud-based labs offer viable alternatives:

  • TryHackMe: Beginner-friendly with guided paths.
  • Hack The Box: Offers a range of challenges from beginner to advanced levels.
  • RangeForce and PentesterLab: Provide browser-based labs focusing on various cybersecurity aspects.

These platforms eliminate the need for complex setups, allowing users to focus on learning.

In conclusion, setting up a home hacking lab is a valuable investment for anyone serious about a career in cybersecurity. It provides a practical environment to learn, experiment, and hone skills essential for real-world applications.

For further details, access the article here

Building and Automating Penetration Testing Labs in the Cloud: Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP

Hands-On AWS Penetration Testing with Kali Linux: Set-up a virtual lab and pentest major AWS services such as EC2, S3, Lambda, CloudFormation, and more

Building a Home Cybersecurity Lab

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services


May 02 2025

Car Hacking and its Countermeasures

Category: Hackingdisc7 @ 10:07 am

Car hacking refers to the unauthorized access and manipulation of a vehicle’s electronic systems, exploiting vulnerabilities in software, hardware, and communication networks. Modern vehicles, equipped with numerous Electronic Control Units (ECUs) interconnected via protocols like the Controller Area Network (CAN) bus, are susceptible to cyberattacks. These attacks can range from disabling brakes to remotely controlling the vehicle, as demonstrated in notable incidents like the 2015 Jeep Cherokee hack. The increasing integration of connected technologies, such as Bluetooth, Wi-Fi, and cellular networks, further expands the attack surface for potential hackers.

One prevalent method of car hacking involves exploiting keyless entry systems. Thieves use devices to intercept signals from key fobs, allowing unauthorized access and ignition of vehicles. Techniques like “relay attacks” and “headlight hacking” have been employed to bypass security measures, enabling criminals to steal cars in mere seconds. The rise in such incidents underscores the need for enhanced security protocols in vehicle design and manufacturing.

To counteract these threats, several measures can be implemented:

  1. Regular Software Updates: Manufacturers often release updates to patch known vulnerabilities. Vehicle owners should ensure their car’s software is up-to-date, either through dealership visits or over-the-air updates.
  2. Use of Physical Security Devices: Employing steering wheel locks or car alarms can deter potential thieves, adding an extra layer of protection against unauthorized access.
  3. Secure Key Fob Storage: Storing key fobs in signal-blocking containers, like Faraday pouches, can prevent signal interception and relay attacks.
  4. Intrusion Detection Systems (IDS): Implementing IDS within the vehicle’s network can monitor and detect anomalous activities, alerting owners to potential breaches.
  5. Network Segmentation and Gateways: Dividing the vehicle’s network into sub-networks with secure gateways can limit the spread of potential attacks, ensuring critical systems remain protected.
  6. Authentication Protocols: Incorporating robust authentication mechanisms can verify the legitimacy of commands and data within the vehicle’s systems, thwarting unauthorized access attempts.

The automotive industry must prioritize cybersecurity in the design and development of vehicles. Collaborative efforts between manufacturers, cybersecurity experts, and regulatory bodies are essential to establish standardized security protocols. As vehicles become increasingly connected and autonomous, proactive measures are vital to safeguard against evolving cyber threats.

In conclusion, while the advent of connected vehicles offers enhanced convenience and features, it also introduces significant cybersecurity challenges. By adopting a multi-faceted approach encompassing software updates, physical security measures, and advanced network protections, both manufacturers and consumers can work together to mitigate the risks associated with car hacking.

Hacking Connected Cars: Tactics, Techniques, and Procedures

The Car Hacker’s Handbook: A Guide for the Penetration Tester

Volvo Cars Suffered A New Data Breach? Data Published On Hacking Forum

Hacking Cars with MP3 Files

The Role of AI in Modern Hacking: Both an Asset and a Risk

Connected cars are heading toward a cybersecurity crisis

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Car Hacking, Car Security


Apr 30 2025

The Role of AI in Modern Hacking: Both an Asset and a Risk

Category: AI,Cyber Threats,Hackingdisc7 @ 1:39 pm

AI’s role in modern hacking is indeed a double-edged sword, offering both powerful defensive tools and sophisticated offensive capabilities. While AI can be used to detect and prevent cyberattacks, it also provides attackers with new ways to launch more targeted and effective attacks. This makes AI a crucial element in modern cybersecurity, requiring a balanced approach to mitigate risks and leverage its benefits. 

AI in Modern Hacking: A Double-Edged Sword

AI as a Shield: Enhancing Cybersecurity Defenses

  • Threat Detection and Prevention: AI can analyze vast amounts of data to identify anomalies and patterns indicative of cyberattacks, even those that are not yet known to traditional security systems.
  • Automated Incident Response: AI can automate many aspects of the incident response process, enabling faster and more effective remediation of security breaches.
  • Enhanced Threat Intelligence: AI can process information from multiple sources to gain a deeper understanding of potential threats and predict future attack vectors.
  • Vulnerability Management: AI can automate vulnerability assessments and patch management, helping organizations to proactively identify and address weaknesses in their systems. 

AI as a Weapon: Amplifying Attack Capabilities

  • Sophisticated Phishing Attacks: AI can be used to generate highly personalized and convincing phishing emails and messages, making it more difficult for users to distinguish them from legitimate communication. 
  • Automated Vulnerability Exploitation: AI can automate the process of identifying and exploiting vulnerabilities in software and systems, making it easier for attackers to gain access to sensitive data. 
  • Deepfakes and Social Engineering: AI can be used to create realistic deepfakes and engage in other forms of social engineering, such as pretexting and scareware, to deceive victims and gain their trust. 
  • Password Cracking and Data Poisoning: AI can be used to crack passwords more efficiently and manipulate data used to train AI models, potentially leading to inaccurate results and compromising security. 

The Need for a Balanced Approach

  • Multi-Layered Security:Organizations need to adopt a multi-layered security approach that combines AI-powered tools with traditional security measures, including human expertise. 
  • Skills Gap:The increasing reliance on AI in cybersecurity requires a skilled workforce, and organizations need to invest in training and development to address the skills gap. 
  • Continuous Monitoring and Adaptation:The threat landscape is constantly evolving, so organizations need to continuously monitor their security posture and adapt their strategies to stay ahead of attackers. 
  • Ethical Hacking and Red Teaming:Organizations can leverage AI for ethical hacking and red teaming exercises to test the effectiveness of their security defenses. 

Countering AI-powered hacking requires a multi-layered defense strategy that blends traditional cybersecurity with AI-specific safeguards. Here are key countermeasures:

  1. Deploy Defensive AI: Use AI/ML for threat detection, behavior analytics, and anomaly spotting to identify attacks faster than traditional tools.
  2. Adversarial Robustness Testing: Regularly test AI systems for vulnerabilities to adversarial inputs (e.g., manipulated data that tricks models).
  3. Zero Trust Architecture: Assume no device or user is trusted by default; verify everything continuously using identity, behavior, and device trust levels.
  4. Model Explainability Tools: Employ tools like LIME or SHAP to understand AI decision-making and detect abnormal behavior influenced by attacks.
  5. Secure the Supply Chain: Monitor and secure datasets, pre-trained models, and third-party AI services from tampering or poisoning.
  6. Continuous Model Monitoring: Monitor for data drift and performance anomalies that could indicate model exploitation or evasion techniques.
  7. AI Governance and Compliance: Enforce strict access controls, versioning, auditing, and policy adherence for all AI assets.
  8. Human-in-the-Loop: Combine AI detection with human oversight for critical decision points, especially in security operations centers (SOCs).

In conclusion, AI has revolutionized cybersecurity, but it also presents new challenges. By understanding both the benefits and risks of AI, organizations can develop a more robust and resilient security posture. 

Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-driven World

Combatting Cyber Terrorism – A guide to understanding the cyber threat landscape and incident response planning

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: AI hacking


Mar 24 2025

Chinese Weaver Ant hackers spied on telco network for 4 years

Category: Hacking,Spywaredisc7 @ 2:16 pm

A China-linked advanced persistent threat group, dubbed ‘Weaver Ant,’ infiltrated the network of a major Asian telecommunications provider and maintained unauthorized access for over four years. This prolonged intrusion was characterized by sophisticated techniques designed to evade detection and persist within the compromised environment.

Weaver Ant employed an operational relay box (ORB) network, primarily consisting of compromised Zyxel customer-premises equipment (CPE) routers. This strategy allowed them to proxy their malicious traffic, effectively concealing their infrastructure and activities from standard monitoring tools.

Initial access was achieved using an AES-encrypted variant of the China Chopper web shell, a tool that facilitates remote control of servers while bypassing firewall restrictions. This allowed the attackers to establish a foothold within the telecommunications provider’s network.

As their operation progressed, Weaver Ant deployed a more advanced, custom-built web shell known as ‘INMemory.’ This tool leverages a dynamic-link library (DLL) named ‘eval.dll’ to execute code directly in the host’s memory, enhancing stealth and reducing the likelihood of detection.

Despite multiple attempts by the affected telecommunications provider to eradicate the intrusion, Weaver Ant demonstrated resilience, maintaining their covert presence over an extended period. This underscores the group’s sophistication and the challenges organizations face in defending against such advanced threats.

This incident highlights the critical importance for organizations, especially those in the telecommunications sector, to implement robust cybersecurity measures. Regular network monitoring, timely patching of vulnerabilities, and comprehensive incident response strategies are essential to detect and mitigate such sophisticated cyber espionage activities.

For further details, access the article here

Tiger Trap: America’s Secret Spy War with China

China’s Hacker Army

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Chinese Weaver Ant, telco network


Mar 24 2025

State-Sponsored Hackers Exploit Link Files for Espionage

Category: Cyber Espionage,Hacking,Information Securitydisc7 @ 10:42 am

Critical Vulnerability in Microsoft Windows Exposed: State-Sponsored Hackers Exploit Link Files for Espionage

A critical vulnerability has been discovered in Microsoft Windows, actively exploited by state-sponsored hackers from North Korea, Russia, Iran, and China. These cyber attackers are leveraging a flaw in Windows’ handling of shortcut (LNK) files to conduct espionage operations.

The exploitation involves crafting malicious LNK files that, when opened, execute arbitrary code without the user’s knowledge. This method allows hackers to infiltrate systems, access sensitive information, and maintain persistent control over compromised networks.

Microsoft has acknowledged the vulnerability and is working on a security patch to address the issue. In the meantime, users and organizations are advised to exercise caution when handling LNK files, especially those received from untrusted sources.

To mitigate potential risks, it is recommended to disable the display of icons for shortcut files and enable the “Show file extensions” option to identify potentially malicious LNK files. Regularly updating antivirus software and conducting system scans can also help detect and prevent exploitation attempts.

This incident underscores the importance of maintaining robust cybersecurity practices and staying informed about emerging threats. Organizations should prioritize timely software updates and employee training to recognize and avoid potential security risks.

As cyber threats continue to evolve, collaboration between software vendors, security researchers, and users is crucial in identifying and addressing vulnerabilities promptly. Proactive measures and vigilance are essential to safeguard against sophisticated cyber espionage activities.

To mitigate this risk, users and organizations are advised to exercise caution with LNK files from untrusted sources, disable icon displays for shortcut files, enable the “Show file extensions” option to identify potentially malicious LNK files, and regularly update antivirus software.

This incident highlights the importance of robust cybersecurity practices and staying informed about emerging threats. Collaboration between software vendors, security researchers, and users is crucial to promptly identify and address vulnerabilities.

For further details, access the article here

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics 

Cyber Mercenaries: The State, Hackers, and Power

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: and Power, Cyber Mercenaries: The State, hackers, State-Sponsored Hackers, The Hacker and the State


Mar 12 2025

How an attacker progress toward valuable assets

Category: Cyber Attack,Hackingdisc7 @ 8:24 am

Many people frequently repeat the phrase, “The good guys have to be right all the time, but the bad guys only have to be right once,” without grasping its true meaning. This oversimplified view distorts the reality of cyberattacks. Attackers don’t succeed with a single stroke of luck; they must overcome multiple security layers while avoiding detection.

To reach their objective, attackers must circumvent various security defenses, often exploiting several vulnerabilities in a sequence. A robust security infrastructure should not collapse due to a single flaw. If one vulnerability leads to a complete compromise, it signals critical weaknesses that require immediate remediation.

Attack path analysis provides insight into how adversaries advance toward high-value assets. By studying these pathways, defenders can identify the most effective points for detection and mitigation, significantly reducing the likelihood of a successful attack.

Even if attackers make progress at multiple stages, well-implemented security measures can obstruct or stop them. By strategically allocating security resources, organizations can increase the complexity and cost of an attack, discouraging potential threats.

An attacker’s progression toward valuable assets follows a structured, multi-step process, often referred to as the Cyber Kill Chain or attack path analysis. This process involves reconnaissance, initial access, privilege escalation, lateral movement, and ultimately, achieving their goal—whether data exfiltration, system disruption, or financial fraud. Each step requires careful planning, evasion techniques, and exploitation of security gaps.

1. Reconnaissance & Initial Access

Attackers start by gathering information about their target, using publicly available data, scanning tools, or social engineering. They identify exposed assets, weak credentials, unpatched vulnerabilities, or employees who might be susceptible to phishing. Once they find an entry point, they exploit it to gain an initial foothold—this could be via phishing emails, misconfigured cloud services, or exploiting software vulnerabilities.

2. Privilege Escalation & Persistence

After gaining initial access, attackers work to increase their privileges, allowing deeper control over the environment. This might involve exploiting misconfigured permissions, stealing admin credentials, or abusing system vulnerabilities. Simultaneously, they establish persistence through backdoors, scheduled tasks, or rootkits, ensuring they can maintain access even if detected at a later stage.

3. Lateral Movement & Discovery

With elevated privileges, attackers move laterally across the network, looking for valuable data and critical systems. They might pivot from one compromised machine to another, exploiting weak authentication mechanisms or using legitimate administrative tools like PowerShell or PsExec. Their goal is to map the infrastructure, identify high-value assets, and locate sensitive data.

4. Data Exfiltration, Impact, or Exploitation

Once attackers reach their target, they execute their final objective. This could involve exfiltrating sensitive data for financial gain, deploying ransomware to disrupt operations, or modifying critical configurations to maintain long-term access. At this stage, defenders who lack proper monitoring, anomaly detection, or incident response capabilities may struggle to prevent damage.

By understanding this attack progression, security teams can focus on key detection points, implement segmentation, and optimize defenses to disrupt the attack before it reaches critical assets.

Cyber Security Kill Chain – Tactics and Strategies: Breaking down the cyberattack process and responding to threats

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: attack path analysis, attacker progress, Cyber Security Kill Chain


Feb 03 2025

Hackers Can Remotely Control Heart Rate Monitors – Alarming Security Vulnerability!

Category: Hacking,Security vulnerabilitiesdisc7 @ 3:19 pm

A critical security vulnerability has been identified in Contec CMS8000 patient monitors, as reported by the Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Food and Drug Administration (FDA). This flaw permits remote attackers to gain unauthorized access, alter patient data, and disrupt device functionality, posing significant risks to healthcare facilities. Exploitation of this vulnerability could lead to manipulation of real-time vital sign monitoring, potentially resulting in severe medical errors or enabling ransomware attacks on these devices.

The vulnerability, designated as CVE-2025-0626 and CVE-2025-0683, stems from hardcoded credentials and an undocumented remote access protocol within the monitor’s firmware. Attackers can remotely authenticate using weak or publicly known factory-set usernames and passwords, access a command-line interface over an open network port, and execute arbitrary commands on the device. This access allows them to manipulate system settings and patient data without proper authorization.

The potential consequences of this security flaw are alarming. Unauthorized manipulation of patient monitors can lead to incorrect vital sign readings, causing healthcare professionals to make misguided treatment decisions. Additionally, attackers could disable the devices or demand ransom to restore functionality, directly impacting patient care and safety.

To mitigate these risks, it is imperative for healthcare providers to update the firmware of Contec CMS8000 patient monitors to the latest version provided by the manufacturer. Implementing strong, unique passwords and disabling unnecessary network services can further enhance security. Regular security assessments and network monitoring are also recommended to detect and respond to potential threats promptly.

For further details, access the article here

Smart Watch Health Fitness Tracker with 24/7 Heart Rate, Blood Oxygen Blood Pressure Sleep Monitor

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Heart Rate Monitors


Jan 30 2025

Hackers are getting quicker—48 minutes is all it takes for a breach.

Category: Hacking,Security Breachdisc7 @ 3:06 pm

Cybercriminals are becoming alarmingly faster at breaching networks, with the average time to compromise a system now just 48 minutes. This rapid escalation means organizations have even less time to detect and respond to attacks before significant damage occurs. The speed at which hackers operate underscores the urgent need for real-time threat detection and automated security responses to minimize risk and disruption.

One of the key drivers behind this increased efficiency is the use of AI and automation by attackers. Cybercriminals are leveraging advanced tools to scan for vulnerabilities, deploy malware, and escalate privileges within minutes. Traditional cybersecurity approaches that rely on manual detection and response are no longer sufficient. Organizations must adopt AI-driven defense mechanisms that can detect threats instantly and initiate automated countermeasures.

The rise of ransomware-as-a-service (RaaS) has also contributed to the growing speed of attacks. Even less-skilled hackers can now launch highly effective cyberattacks, thanks to pre-packaged hacking tools available on the dark web. This democratization of cybercrime means that businesses of all sizes are at risk, making proactive security strategies and employee awareness training essential.

 “breakout time is the most critical window in an attack,” as successful threat containment at this stage prevents consequences “such as data exfiltration, ransomware deployment, data loss, reputational damage, and financial loss,” 

To stay ahead, companies must prioritize cybersecurity resilience, implementing zero-trust security models, continuous monitoring, and AI-enhanced threat detection. The 48-minute rule highlights a new reality—if an organization is not prepared to detect and respond to threats in real time, it risks catastrophic breaches. Cybersecurity is no longer about reacting after an attack; it’s about preventing compromise before it happens.

For further details, access the article here.

A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back

New regulations and AI hacks drive cyber security changes in 2025

Hackers will use machine learning to launch attacks

VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks

THE PATH TO A PENTESTING CAREER (A BLUEPRINT FOR ASPIRING WHITE HATS)

Hackers Hijack Facebook Pages To Mimic AI Brands & Inject Malware

170K+ Python Developers GitHub Accounts Hacked In Supply Chain Attack

HackerGPT – A ChatGPT-Powered AI Tool for Ethical Hackers & Cyber Security Community

7 hacking tools that look harmless but can do real damage

SYSTEM HACKING, SCRIPTING, AND OTHER CONTRONYMS IN CYBERSECURITY

11 WAYS OF HACKING INTO CHATGPT LIKE GENERATIVE AI SYSTEMS

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: breach, hackers


Jan 22 2025

New regulations and AI hacks drive cyber security changes in 2025

Category: AI,Cyber Strategy,Hackingdisc7 @ 10:57 am

The article discusses how evolving regulations and AI-driven cyberattacks are reshaping the cybersecurity landscape. Key points include:

  1. New Regulations: Governments are introducing stricter cybersecurity regulations, pushing organizations to enhance their compliance and risk management strategies.
  2. AI-Powered Cyberattacks: The rise of AI is enabling more sophisticated attacks, such as automated phishing and advanced malware, forcing companies to adopt proactive defense measures.
  3. Evolving Cybersecurity Strategies: Businesses are prioritizing the integration of AI-driven tools to bolster their security posture, focusing on threat detection, mitigation, and overall resilience.

Organizations must adapt quickly to address these challenges, balancing regulatory compliance with advanced technological solutions to stay secure.

For further details, access the article here

Threat modeling your generative AI workload to evaluate security risk

How CISOs Can Drive the Adoption of Responsible AI Practices

Hackers will use machine learning to launch attacks

To fight AI-generated malware, focus on cybersecurity fundamentals

4 ways AI is transforming audit, risk and compliance

AI security bubble already springing leaks

Could APIs be the undoing of AI?

The Rise of AI Bots: Understanding Their Impact on Internet Security

How to Address AI Security Risks With ISO 27001

AI cybersecurity needs to be as multi-layered as the system it’s protecting

How cyber criminals are compromising AI software supply chains

AI Risk Management

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: AI hacks, Cyber Strategy


Nov 06 2024

Hackers will use machine learning to launch attacks

Category: AI,Hackingdisc7 @ 1:37 pm

The article on CSO Online covers how hackers may leverage machine learning for cyber attacks, including methods like automating social engineering, enhancing malware evasion, launching advanced spear-phishing, and creating adaptable attack strategies that evolve with new data. Machine learning could also help attackers mimic human behavior to bypass security protocols and tailor attacks based on behavioral analysis. This evolving threat landscape underscores the importance of proactive, ML-driven security defenses.

The article covers key ways hackers could leverage machine learning to enhance their cyberattacks:

  1. Sophisticated Phishing: Machine learning enables attackers to tailor phishing emails that feel authentic and personally relevant, making phishing even more deceptive.
  2. Exploit Development: AI-driven tools assist in uncovering zero-day vulnerabilities by automating and refining traditional techniques like fuzzing, which involves bombarding software with random inputs to expose weaknesses.
  3. Malware Creation: Machine learning algorithms can make malware more evasive by adapting to the target’s security measures in real time, allowing it to slip through defenses.
  4. Automated Reconnaissance: Hackers use AI to analyze massive data sets, such as social media profiles or organizational networks, to find weak points and personalize attacks.
  5. Credential Stuffing and Brute Force: AI speeds up credential-stuffing attacks by automating the testing of large sets of stolen credentials against a variety of online platforms.
  6. Deepfake Phishing: AI-generated audio and video deepfakes can impersonate trusted individuals, making social engineering attacks more convincing and difficult to detect.

For more detail on these evolving threats, you can read the full article on CSO Online.

Machine Learning: 3 books in 1: – Hacking Tools for Computer + Hacking With Kali Linux + Python Programming- The ultimate beginners guide to improve your knowledge of programming and data science

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: Machine Learning


Aug 08 2024

STAC6451 Hacker Hijacking Microsoft SQL Servers to Compromise Organizations

Category: data security,Hackingdisc7 @ 1:24 pm

A sophisticated threat activity cluster, STAC6451, has been identified targeting Microsoft SQL servers.

This cluster, primarily observed by Sophos Managed Detection and Response (MDR) teams, has compromised organizations by exploiting SQL server vulnerabilities.

The attackers have been using a combination of brute-force attacks, command execution, and lateral movement techniques to infiltrate and compromise networks.

This article delves into the intricate details of the STAC6451 attacks, the techniques employed, and the implications for organizations worldwide.

For details: STAC6451 Hacker Hijacking Microsoft SQL Servers to Compromise Organizations

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: Microsoft SQL Servers


Jun 27 2024

HACKING MICROSOFT MMC: DISCOVER THE GRIMRESOURCE EXPLOIT

Category: Hackingdisc7 @ 7:04 am

Elastic Security Labs has uncovered a novel technique, GrimResource, that leverages specially crafted Microsoft Management Console (MMC) files for initial access and evasion, posing a significant threat to cybersecurity.

In response to Microsoft’s decision to disable Office macros by default for internet-sourced documents, attackers have been forced to adapt, exploring new infection vectors like JavaScript, MSI files, LNK objects, and ISOs. These traditional methods are now heavily scrutinized by defenders, pushing well-resourced attackers to innovate further. A recent example includes North Korean actors using a novel command execution technique within MMC files.

Elastic researchers have identified GrimResource, a new infection technique that exploits MSC files, allowing attackers to execute arbitrary code in the context of mmc.exe when a user opens a specially crafted MSC file. The first sample leveraging GrimResource was uploaded to VirusTotal on June 6th.

Key Takeaways

  • GrimResource enables attackers to execute arbitrary code in Microsoft Management Console with minimal security warnings, making it ideal for initial access and evasion.
  • Elastic Security Labs provides analysis and detection guidance to help the community defend against this technique.

Detailed Analysis

INITIAL DISCOVERY

The GrimResource method was identified after a sample was uploaded to VirusTotal on June 6th, 2024. This sample demonstrated a novel way to achieve code execution by exploiting the MSC file format, commonly used in administrative tools within Windows.

TECHNICAL BREAKDOWN

Exploitation of apds.dll Vulnerability

The core of the GrimResource technique exploits an old cross-site scripting (XSS) flaw in the apds.dll library. By crafting an MSC file that includes a reference to this vulnerable library in the StringTable section, attackers can execute arbitrary JavaScript in the context of mmc.exe. This approach leverages the following steps:

  1. StringTable Manipulation: The MSC file is modified to include a reference to apds.dll.
  2. JavaScript Execution: The XSS flaw in apds.dll allows JavaScript execution within MMC, enabling further payload delivery.

Combination with DotNetToJScript

To execute arbitrary code, attackers combine the XSS exploit with the DotNetToJScript technique:

  1. Obfuscation Techniques: The initial sample uses the transformNode method for obfuscation, a technique also seen in recent macro-based attacks. This helps evade ActiveX security warnings.
  2. Embedded VBScript: The obfuscated script within the MSC file sets environment variables with the target payload.
  3. DotNetToJScript Execution: The script then uses DotNetToJScript to run an embedded .NET loader, named PASTALOADER, which retrieves the payload from the environment variables and executes it.

PASTALOADER Execution

PASTALOADER is designed to execute the payload in a stealthy manner:

  1. Payload Injection: PASTALOADER injects the payload into a new instance of dllhost.exe, a legitimate system process, to avoid detection.
  2. Stealth Techniques: The injection uses DirtyCLR, function unhooking, and indirect syscalls to minimize detection chances.
https://www.securitynewspaper.com/2023/09/29/send-phishing-emails-with-content-font-size-0px-can-to-hack-into-microsoft-outlook-365-accounts/embed/#?secret=RSwxVMwOix#?secret=Nug7FeGVNf

Final Payload: Cobalt Strike

In the identified sample, the final payload is the Cobalt Strike Beacon, a widely used post-exploitation tool. The injection into dllhost.exe is done carefully to avoid triggering security mechanisms.

DETECTION METHODS

Elastic Security Labs’ Detection Techniques

Elastic Security Labs has developed several detection methods to identify GrimResource activity:

  1. Suspicious Execution via Microsoft Common Console:
    • This detection looks for unusual processes spawned by mmc.exe, indicating potential malicious activity.
  2. .NET COM Object Created in Non-standard Windows Script Interpreter:
    • Detects memory allocations by .NET on behalf of Windows Script Host (WSH) engines, indicative of DotNetToJScript usage.
  3. Script Execution via MMC Console File:
    • Monitors file operations and process behaviors related to MSC file execution, particularly looking for the creation and use of apds.dll references.
  4. Windows Script Execution via MMC Console File:
    • Correlates the creation of temporary HTML files in the INetCache folder, a hallmark of the APDS XSS redirection.

Example EQL Rules

sequence by process.entity_id with maxspan=1m

[process where event.action == “start” and process.executable : “?:\\Windows\\System32\\mmc.exe” and process.args : “*.msc”]

[file where event.action == “open” and file.path : “?:\\Windows\\System32\\apds.dll”]

Detecting Temporary HTML Files:

sequence by process.entity_id with maxspan=1m

[process where event.action == “start” and process.executable : “?:\\Windows\\System32\\mmc.exe” and process.args : “*.msc”]

[file where event.action in (“creation”, “overwrite”) and process.executable : “?:\\Windows\\System32\\mmc.exe” and file.name : “redirect[?]” and file.path : “?:\\Users\\*\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\*\\redirect[?]”]

Forensic Artifacts

The technique leaves several forensic artifacts, including:

  • MSC File Manipulations: Unusual references in StringTable sections.
  • Temporary Files: HTML files in the INetCache directory named “redirect[?]”.
  • Process Anomalies: Unexpected process creation and memory allocations by mmc.exe and dllhost.exe.

Attackers have developed a new technique to execute arbitrary code in Microsoft Management Console using crafted MSC files. Elastic’s defense-in-depth approach has proven effective against this novel threat. Defenders should implement the provided detection guidance to protect themselves and their customers from GrimResource before it proliferates among commodity threat groups.

Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: GRIMRESOURCE EXPLOIT, MICROSOFT MMC


Jun 12 2024

20,000 FortiGate appliances compromised by Chinese hackers

Category: Hacking,Security Breachdisc7 @ 7:43 am

How Coathanger persists on FortiGate devices

In February 2024, the Dutch Military Intelligence and Security Service (MIVD) and the General Intelligence and Security Service (AIVD) made it known that Chinese state-sponsored hackers breached the Dutch Ministry of Defense in 2023 by exploiting a known FortiOS pre-auth RCE vulnerability (CVE-2022-42475), and used novel remote access trojan malware to create a persistent backdoor.

The RAT was dubbed Coathanger and found to be capable of surviving reboots and firmware upgrades. It’s also difficult to detect its presence by using FortiGate CLI commands, and to remove it from compromised devices.

The security services shared indicators of compromise and a variety of detection methods in an advisory, and explained that “the only currently identified way of removing [it] from an infected FortiGate device involves formatting the device and reinstalling and reconfiguring the device.”

They also attributed the intrusion and the malware to a Chinese cyber-espionage group.

A widespread campaign

On Monday, the Dutch National Cyber Security Center said that the MIVD continued to investigate the campaign, and found that:

  • The threat actor gained access to at least 20,000 FortiGate systems worldwide within a few months in both 2022 and 2023
  • They exploited the FortiOS vulnerability (CVE-2022-42475) as a zero-day, at least two months before Fortinet announced it

“During this so-called ‘zero-day’ period, the actor alone infected 14,000 devices. Targets include dozens of (Western) governments, international organizations and a large number of companies within the defense industry,” the NCSC said.

The threat actor installed the Coathanger malware at a later time, on devices of relevant targets.

“It is not known how many victims actually have malware installed. The Dutch intelligence services and the NCSC consider it likely that the state actor could potentially expand its access to hundreds of victims worldwide and carry out additional actions such as stealing data,” they said, and added that given the difficult discovery and clean-up process, “it is likely that the state actor still has access to systems of a significant number of victims.”

Another problem is that the Coathanger malware can be used in combination with any present or future vulnerability in FortiGate devices – whether zero- or N-day.

Advice for organizations

“Initial compromise of an IT network is difficult to prevent if the attacker uses a zero-day. It is therefore important that organizations apply the ‘assume breach’ principle,” the NCSC opined.

“This principle states that a successful digital attack has already taken place or will soon take place. Based on this, measures are taken to limit the damage and impact. This includes taking mitigating measures in the areas of segmentation, detection, incident response plans and forensic readiness.”

(In the attack targeting the Dutch MoD, the effects of the intrusion were limited due to effective network segmentation.)

Finally, the NCSC noted that the problem is not specifically Fortinet appliances, but “edge” devices – firewalls, VPN servers, routers, SMTP servers, etc. – in general.

“Recent incidents and identified vulnerabilities within various edge devices show that these products are often not designed according to modern security-by-design principles,” they said. Because almost every organization has one or more edge devices deployed, they added, it pays for threat actors to look for vulnerabilities affecting them.

The NCSC has, therefore, published helpful advice on how organizations should deal with using edge devices.

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics 

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: Chinese hackers, FortiGate appliances, The Hacker and the State


Jun 11 2024

YOUR AZURE SECURITY AT RISK? HOW HACKERS ARE EXPLOITING AZURE SERVICE TAGS (AND HOW TO STOP THEM)?

Category: Hacking,Risk Assessmentdisc7 @ 8:24 am

A significant security vulnerability has been discovered by Tenable Research that affects Azure customers relying on Service Tags for their firewall rules. This vulnerability allows attackers to bypass Azure firewall rules, posing a substantial risk to organizations using these configurations. Here’s an in-depth look at the vulnerability, how it can be exploited, and crucial defensive measures to mitigate the risk.

Azure Security

INITIAL DISCOVERY IN AZURE APPLICATION INSIGHTS

Tenable Research initially uncovered the vulnerability within Azure Application Insights, a service designed to monitor and analyze web applications’ performance and availability. The Availability Tests feature of Azure Application Insights, intended to check the accessibility and performance of applications, was found to be susceptible to abuse. Users can control server-side requests in these tests, including adding custom headers and changing HTTP methods. This control can be exploited by attackers to forge requests from trusted services, mimicking a server-side request forgery (SSRF) attack.

EXPANSION TO MORE THAN 10 OTHER AZURE SERVICES

Upon further investigation, Tenable Research found that the vulnerability extends beyond Azure Application Insights to more than 10 other Azure services. These include:

  • Azure DevOps
  • Azure Machine Learning
  • Azure Logic Apps
  • Azure Container Registry
  • Azure Load Testing
  • Azure API Management
  • Azure Data Factory
  • Azure Action Group
  • Azure AI Video Indexer
  • Azure Chaos Studio

Each of these services allows users to control server-side requests and has an associated Service Tag, creating potential security risks if not properly mitigated.

HOW ATTACKERS CAN EXPLOIT THE VULNERABILITY

Attackers can exploit the vulnerability in Azure Service Tags by abusing the Availability Tests feature in Azure Application Insights. Below are detailed steps and examples to illustrate how an attacker can exploit this vulnerability:

1. Setting Up the Availability Test:

  • Example Scenario: An attacker identifies an internal web service within a victim’s Azure environment that is protected by a firewall rule allowing traffic only from Azure Application Insights.
  • Action: The attacker sets up an Availability Test in Azure Application Insights, configuring it to target the internal web service.

2. Customizing the Request:

  • Manipulating Headers: The attacker customizes the HTTP request headers to include authorization tokens or other headers that may be expected by the target service.
  • Changing HTTP Methods: The attacker can change the HTTP method (e.g., from GET to POST) to perform actions such as submitting data or invoking actions on the target service.
  • Example Customization: The attacker configures the test to send a POST request with a custom header “Authorization: Bearer <malicious-token>”.

3. Sending the Malicious Request:

  • Firewall Bypass: The crafted request is sent through the Availability Test. Since it originates from a trusted Azure service (Application Insights), it bypasses the firewall rules based on Service Tags.
  • Example Attack: The Availability Test sends the POST request with the custom header to the internal web service, which processes the request as if it were from a legitimate source.

4. Accessing Internal Resources:

  • Unauthorized Access: The attacker now has access to internal APIs, databases, or other services that were protected by the firewall.
  • Exfiltration and Manipulation: The attacker can exfiltrate sensitive data, manipulate internal resources, or use the access to launch further attacks.
  • Example Impact: The attacker retrieves confidential data from an internal API or modifies configuration settings in an internal service.

DETAILED EXAMPLE OF EXPLOIT

Scenario: An organization uses Azure Application Insights to monitor an internal financial service. The service is protected by a firewall rule that allows access only from the ApplicationInsightsAvailability Service Tag.

  1. Deploying an Internal Azure App Service:
    • The organization has a financial application hosted on an Azure App Service with firewall rules configured to accept traffic only from the ApplicationInsightsAvailability Service Tag.
  2. Attempted Access by the Attacker:
    • The attacker discovers the endpoint of the internal financial application and attempts to access it directly. The firewall blocks this attempt, returning a forbidden response.
  3. Exploiting the Vulnerability:
    • Setting Up the Test: The attacker sets up an Availability Test in Azure Application Insights targeting the internal financial application.
    • Customizing the Request: The attacker customizes the test to send a POST request with a payload that triggers a financial transaction, adding a custom header “Authorization: Bearer <malicious-token>”.
    • Sending the Request: The Availability Test sends the POST request to the internal financial application, bypassing the firewall.
  4. Gaining Unauthorized Access:
    • The financial application processes the POST request, believing it to be from a legitimate source. The attacker successfully triggers the financial transaction.
    • Exfiltration: The attacker sets up another Availability Test to send GET requests with custom headers to extract financial records from the application.

ADVANCED EXPLOITATION TECHNIQUES

1. Chain Attacks:

  • Attackers can chain multiple vulnerabilities or services together to escalate their privileges and impact. For example, using the initial access gained from the Availability Test to find other internal services or to escalate privileges within the Azure environment.

2. Lateral Movement:

  • Once inside the network, attackers can move laterally to compromise other services or extract further data. They might use other Azure services like Azure DevOps or Azure Logic Apps to find additional entry points or sensitive data.

3. Persistent Access:

  • Attackers can set up long-term Availability Tests that periodically execute, ensuring continuous access to the internal services. They might use these persistent tests to maintain a foothold within the environment, continuously exfiltrating data or executing malicious activities.

DEFENSIVE MEASURES

To mitigate the risks associated with this vulnerability, Azure customers should implement several defensive measures:

1. Analyze and Update Network Rules:

  • Conduct a thorough review of network security rules.
  • Identify and analyze any use of Service Tags in firewall rules.
  • Assume services protected only by Service Tags may be vulnerable.

2. Implement Strong Authentication and Authorization:

  • Add robust authentication and authorization mechanisms.
  • Use Azure Active Directory (Azure AD) for managing access.
  • Enforce multi-factor authentication and least privilege principles.

3. Enhance Network Isolation:

  • Use network security groups (NSGs) and application security groups (ASGs) for granular isolation.
  • Deploy Azure Private Link to keep traffic within the Azure network.

4. Monitor and Audit Network Traffic:

  • Enable logging and monitoring of network traffic.
  • Use Azure Monitor and Azure Security Center to set up alerts for unusual activities.
  • Regularly review logs and audit trails.

5. Regularly Update and Patch Services:

  • Keep all Azure services and applications up to date with security patches.
  • Monitor security advisories from Microsoft and other sources.
  • Apply updates promptly to minimize risk.

6. Use Azure Policy to Enforce Security Configurations:

  • Deploy Azure Policy to enforce security best practices.
  • Create policies that require strong authentication and proper network configurations.
  • Use Azure Policy initiatives for consistent application across resources.

7. Conduct Security Assessments and Penetration Testing:

  • Perform regular security assessments and penetration testing.
  • Engage with security experts or third-party services for thorough reviews.
  • Use tools like Azure Security Benchmark and Azure Defender.

8. Educate and Train Staff:

  • Provide training on risks and best practices related to Azure Service Tags and network security.
  • Ensure staff understand the importance of multi-layered security.
  • Equip teams to implement and manage security measures effectively.

https://www.securitynewspaper.com/2024/05/16/how-to-implement-principle-of-least-privilegecloud-security-in-aws-azure-and-gcp-cloud/embed/#?secret=4TeHUyw59w#?secret=RHf1cNP2eR

The vulnerability discovered by Tenable Research highlights significant risks associated with relying solely on Azure Service Tags for firewall rules. By understanding the nature of the vulnerability and implementing the recommended defensive measures, Azure customers can better protect their environments and mitigate potential threats. Regular reviews, updates, and a multi-layered security approach are essential to maintaining a secure Azure environment.

Azure Security

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: Azure Security


May 02 2024

VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks

Category: Hacking,Security Toolsdisc7 @ 7:26 am

While facilitating remote work, remote desktop software presents security challenges for IT teams due to the use of various tools and ports.

The multitude of ports makes it difficult to monitor for malicious traffic. 

Weak credentials and software vulnerabilities are exploited to gain access to user systems.

Hackers may also use technical support scams to trick users into granting access.  

The Most Targeted Remote Desktop Tools In The Last 12 Months

Researchers identified VNC, a platform-independent remote desktop tool using RFB protocol, as the most targeted remote desktop application (98% of traffic).

The attacks leveraged weak passwords and a critical vulnerability (CVE-2006-2369) in RealVNC 4.1.1, allowing authentication bypass. 

Over 99% of attacks targeted unsecured HTTP ports rather than TCP ports used for application data exchange, which suggests attackers exploit the inherent lack of authentication on HTTP for unauthorized access.

The security of VNCs varies depending on the specific software, while some offer weak password limitations, others leverage SSH or VPN tunnelling for encryption.

VNC uses a base port (5800 for TCP, 5900 for HTTP) with an additive display number, making it difficult to secure with firewalls compared to single-port remote desktop solutions. 

Additionally, pinpointing the origin of VNC attacks is challenging due to attackers using proxies and VPNs, but a significant portion seems to originate from China. 

Attackers target RDP, a remote desktop protocol, for credential-based attacks and exploit vulnerabilities to execute malicious code, as RDP is more likely to be involved in large attacks compared to VNC. 

Flaws Exploited

In one study, 15% of RDP attacks leveraged obsolete cookies, possibly to target older, more vulnerable RDP software,  and RDP vulnerabilities like CVE-2018-0886 (targeting credential security), CVE-2019-0708 (with worm potential), and CVE-2019-0887 (hypervisor access) have been reported by Barracuda

Attackers exploit vulnerabilities in RDP to gain access to systems. Brute-force attacks are common, targeting password hashes for privileged accounts. RDP can also be used to launch denial-of-service attacks. 

In social engineering scams, attackers convince users to grant RDP access to fix fake technical problems, and vulnerable RDP instances are sold on the black market for further attacks.

North America is a leading source of RDP attacks, but location tracking is difficult due to anonymizing techniques. 

TeamViewer, a remote desktop tool, rarely encounters attacks (0.1% of traffic). Recent versions target enterprises and integrate with business applications, offering security features like fingerprinting, strong password enforcement, and multi-factor authentication. 

Encrypted communication channels further enhance security. However, phished credentials and technical support scams can still compromise TeamViewer sessions and may use ports beyond the primary port 5938, making malicious traffic detection more challenging for security teams. 

Citrix created ICA as an alternative to RDP. It uses ports 1494 and 2598, while older ICA clients and the ICA Proxy have had RCE vulnerabilities. 

AnyDesk, another RDP solution, uses port 6568 and has been abused in tech support scams and malware, while Splashtop Remote, using port 6783, has been involved in support scams and can be compromised through weak credentials.

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot


Apr 24 2024

HACKERS HIJACKED THE ESCAN ANTIVIRUS UPDATE MECHANISM IN MALWARE CAMPAIGN

Category: Antivirus,Hacking,Malwaredisc7 @ 9:04 am

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute backdoors and cryptocurrency miners.

Avast researchers discovered and analyzed a malware campaign that exploited the update mechanism of the eScan antivirus to distribute backdoors and crypto miners.

Threat actors employed two different types of backdoors and targeted large corporate networks

The researchers believe the campaign could be attributed to North Korea-linked AP Kimsuky. The final payload distributed by GuptiMiner was also XMRig.

“GuptiMiner is a highly sophisticated threat that uses an interesting infection chain along with a couple of techniques that include performing DNS requests to the attacker’s DNS servers, performing sideloading, extracting payloads from innocent-looking images, signing its payloads with a custom trusted root anchor certification authority, among others.” reads the analysis published by Avast. “The main objective of GuptiMiner is to distribute backdoors within big corporate networks.”

The threat actors behind this campaign exploited a vulnerability in the update mechanism of the Indian antivirus provider eScan that allowed them to carry out a man-in-the-middle attack to distribute the malware. Avast already reported the issue to eScan and the India CERT. eScan acknowledged the flaw and addressed it on July 31, 2023. The issue in the update mechanism was present for at least five years.

The infection process begins when eScan requests an update from the update server. However, the attackers carry out a MitM attack and replace the legitimate update package with a malicious one. Subsequently, eScan unpacks and installs the package, which results in the sideloading of a DLL by eScan’s clean binaries. This DLL facilitates the continuation of the process, leading to the execution of multiple shellcodes and intermediary PE loaders.

eScan antivirus

The researchers noticed that the downloaded package file is replaced with a malware-laced one on the wire because the process doesn’t use an HTTPS connection. 

Below the infection chain described by Avast:

  1. The eScan updater triggers the update 
  2. The downloaded package file is replaced with a malicious one on the wire because of a missing HTTPS encryption (MitM is performed) 
  3. A malicious package updll62.dlz is downloaded and unpacked by eScan updater 
  4. The contents of the package contain a malicious DLL (usually called version.dll) that is sideloaded by eScan. Because of the sideloading, the DLL runs with the same privileges as the source process – eScan – and it is loaded next time eScan runs, usually after a system restart 
  5. If a mutex is not present in the system (depends on the version, e.g. Mutex_ONLY_ME_V1), the malware searches for services.exe process and injects its next stage into the first one it can find 
  6. Cleanup is performed, removing the update package 

GuptiMiner operates its own DNS servers to provide legitimate destination domain addresses of C2 servers through DNS TXT responses.

GuptiMiner connects directly to malicious DNS servers, bypassing the DNS network entirely. This use of the DNS protocol resembles telnet and is not considered DNS spoofing, which typically occurs within the DNS network. Although the servers requested by GuptiMiner exist, it’s likely an evasion tactic.

In the second-stage the shellcode from the PNG file extracts and executes the Gzip loader. This loader is a simple PE that decompresses another shellcode using Gzip and executes it in a separate thread that kiads the Stage 3 malware Puppeteer.

Puppeteer orchestrates the core functionality of the malware, including the cryptocurrency mining as well as the backdoor deployment.

Surprisingly, the ultimate payload disseminated by GuptiMiner can be also XMRig, which was somewhat unexpected given the level of sophistication of this campaign.

The researchers speculate that using the miner could be a diversionary tactic.

“During our research, we’ve also found an information stealer which holds a rather similar PDB path as was used across the whole GuptiMiner campaign.” concludes the report. “What is truly interesting, however, is that this information stealer might come from Kimsuky operations.”

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: ESCAN ANTIVIRUS


Apr 15 2024

THE PATH TO A PENTESTING CAREER (A BLUEPRINT FOR ASPIRING WHITE HATS)

Category: Hacking,Pen Test,Security Toolsdisc7 @ 7:22 am

Security analysis of web applications is, first of all, a search and investigation of cases of incorrect functioning of program code and vulnerabilities. Those who choose a penetration tester’s profession should keep in mind that it requires continuous learning and the ability to use a library of resources for self-education. A common situation is that while you are studying vulnerabilities in one framework, a dozen new reports are published. To quickly understand the potential vulnerabilities associated with previously unknown technologies, you need to be well-versed in the sources of information. When working in a team on an actual pentest project, there is usually no time for a thoughtful search. So, if your skills are combined with a strong foundational education, you are looking at promising career opportunities.

Your initial understanding of the subject can be developed through cybersecurity analysis courses at the university. These courses can also help you decide if this career path is right for you. It is good to receive foundational training in software development and networking, including web applications, while you are at university. Afterward, you can gain hands-on experience by practicing infrastructure penetration testing.

Usually, your initial attempts to secure a job as a web penetration tester might reveal gaps in your knowledge. Seeking employment at companies like VentureDive, where the work could help fill these educational gaps and offer valuable experience, is a smart approach. For instance, you could start as a technical support specialist in information security at a large company. After about two to four months, you might go for your first interview for a security analyst position, during which you could identify any weak points you might still have. With a few more months of work under the guidance of a mentor and diving into training materials, you could successfully land a position as a penetration tester.

Choosing where to work in the future is not as straightforward as it may appear. In a large, well-known company, you will be surrounded by a high level of expertise and likely assigned a mentor. However, the opportunity to find truly interesting vulnerabilities in real projects might be limited. This is because such organizations often have costly services, and their clients are usually not willing to skimp on development and security. Consequently, you will be working with quality products that have undergone thorough security testing, reducing the likelihood of encountering situations that provide valuable experience.

In a small company, you should not expect to find a mentor, a high level of expertise, or an impressive salary. However, these companies often get orders to pentest applications with many vulnerabilities, providing invaluable experience for those new to the profession. With this experience under your belt, you could eventually transition to a larger company.

Mastering Interview Techniques

Given that we cannot cover everything, let’s go over the essential knowledge and skills you need to analyze vulnerabilities in web applications.

  • A pentester needs to understand how applications function on the network level, which includes knowing about TCP handshakes, domain names, IPs, proxies, etc. It is also important to grasp the basics of how HTTP and HTTPS protocols work. Being prepared to answer questions like “What is the difference between HTTP methods?” “When should PATCH be used as opposed to POST?” and “How do HTTP 0.9/1.1 differ from HTTP/2?” is a part of this foundational knowledge.
  • Vulnerabilities are not always tucked away in a web application’s code; sometimes, they are embedded in its architecture, like within the web server itself. Often, a pentester might not have a direct view of the application’s architecture but can infer how it functions. Therefore, having knowledge in this area is incredibly useful.
  • As vulnerabilities become more complex, it is important to grasp the basics. This foundational understanding allows you to tackle more complex issues as they arise.
  • Developing the ability to search for answers to your questions using open sources is vital, even if you have someone to ask. Always start by seeking out information and attempting to solve problems on your own before seeking help.
  • Being able to write and read code in various languages, including PHP, Python, JavaScript, Java, and C#, is essential. When it comes to analyzing web applications, you will encounter different approaches, such as white box, gray box, and black box testing. For example, if you are doing white box testing and have access to the application’s source code, having development experience is a big plus. Additionally, the ability to write automation scripts and tailor third-party tools to fit your needs is a valuable skill.
  • Pentest projects frequently require examining the application from the outside in. You need the ability to scan the network and identify vulnerable services to ensure no obvious security flaws are overlooked.
  • In your work, you will often need to theoretically explain the nature of a vulnerability. This requires understanding basic concepts, such as how databases operate, the properties of information, and what constitutes vulnerability and exploitation. Essential skills also include system administration for both Windows and Linux.

Simply studying a vast number of vulnerabilities will turn you into a top-tier professional because it does not cultivate the skill of discovering them. During actual pentest projects, the toughest part is often identifying vulnerabilities. It is advised to search for vulnerable applications and analyze them without peeking at the technology stack or hints about the vulnerabilities. This practice offers foundational experience and insights into how things operate in an actual project.

For those lacking a basic education in security analysis, paid penetration testing courses are an option to consider. Unfortunately, the better courses tend to be expensive, and it is difficult to recommend any budget-friendly options that are truly effective. It is crucial to realize that these courses will not turn you into an expert overnight, as some might claim, but they will provide you with a solid understanding of the profession.

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: ASPIRING WHITE HATS


Apr 10 2024

New SharePoint Technique Lets Hackers Bypass Security Measures

Category: Hacking,Security controlsdisc7 @ 9:36 am

Two new techniques uncovered in SharePoint enable malicious actors to bypass traditional security measures and exfiltrate sensitive data without triggering standard detection mechanisms.

Illicit file downloads can be disguised as harmless activities, making it difficult for cybersecurity defenses to detect them. To accomplish this, the system’s features are manipulated in various ways.

Security researchers from Varonis Threat Labs discovered two SharePoint techniques.

Open-In-App Method

The first technique dubbed the “Open in App Method,” takes advantage of the SharePoint feature, which allows users to open documents directly in their associated applications.

While this feature is designed for user convenience, it has inadvertently created a loophole for data breaches.

Attackers can use this feature’s underlying code to access and download files, leaving behind only an access event in the file’s audit log.

This subtle footprint can easily be overlooked, as it does not resemble a typical download event.

The exploitation of this method can be carried out manually or automated through a PowerShell script.

When automated, the script can rapidly exfiltrate many files, significantly amplifying the potential damage.

The script leverages the SharePoint client object model (CSOM) to fetch files from the cloud and save them to a local computer, avoiding creating a download log entry.

SkyDriveSync User-Agent

The second technique involves the manipulation of the User-Agent string for Microsoft SkyDriveSync, now known as OneDrive, Varonis said.

By masquerading as the sync client, attackers can download files or even entire SharePoint sites.

These downloads are mislabeled as file synchronization events rather than actual downloads, thus slipping past security measures that are designed to detect and log file downloads.

This method is particularly insidious because it can be used to exfiltrate data on a massive scale, and the sync disguise makes it even harder for security tools to distinguish between legitimate and malicious activities.

The use of this technique suggests a sophisticated understanding of SharePoint and OneDrive’s synchronization mechanisms, which could be exploited to systematically drain data from an organization without raising alarms.

Microsoft’s Response And Security Patch Backlog

Upon discovery, Varonis researchers promptly reported these vulnerabilities to Microsoft in November 2023. Microsoft has acknowledged the issue and categorized these vulnerabilities as “moderate” security risks.

They have been added to Microsoft’s patch backlog program, indicating that a fix is in the pipeline but may not be immediately available.

The discovery of these techniques underscores the risks associated with SharePoint and OneDrive, especially when permissions are misconfigured or overly permissive.

Organizations relying on these services for file sharing and collaboration must be vigilant and proactive in managing access rights to minimize the risk of unauthorized data access.

To combat these vulnerabilities, organizations are advised to implement additional detection strategies.

Monitoring for unusual patterns of access events, especially those that could indicate the use of the “Open in App Method,” is crucial.

Similarly, keeping an eye on sync activities and verifying that they match expected user behavior can help identify misuse of the SkyDriveSync User-Agent technique.

Furthermore, organizations should prioritize the review and tightening of permissions across their SharePoint and OneDrive environments.

Regular audits and updates to security policies can help prevent threat actors from exploiting such vulnerabilities in the first place.

Permissions Management in SharePoint Online – A Practical Guide

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: SharePoint


Apr 05 2024

Hackers Hijack Facebook Pages To Mimic AI Brands & Inject Malware

Category: AI,Hacking,Malwaredisc7 @ 8:08 am

Hackers have been found hijacking Facebook pages to impersonate popular AI brands, thereby injecting malware into the devices of unsuspecting users.

This revelation comes from a detailed investigation by Bitdefender Labs, which has been closely monitoring these malicious campaigns since June 2023.

Recent analyses of malvertising campaigns have revealed a disturbing trend.

Ads are distributing an assortment of malicious software, which poses severe risks to consumers’ devices, data, and identity.

Unwitting interactions with these malware-serving ads could lead to downloading and deploying harmful files, including Rilide Stealer, Vidar Stealer, IceRAT, and Nova Stealer, onto users’ devices.

Rilide Stealer V4: A Closer Look

Bitdefender Labs has spotlighted an updated version of the Rilide Stealer (V4) lurking within sponsored ad campaigns that impersonate popular AI-based software and photo editors such as Sora, CapCut, Gemini AI, Photo Effects Pro, and CapCut Pro.

This malicious extension, targeting Chromium-based browsers, is designed to monitor browsing history, capture login credentials, and even facilitate the withdrawal of crypto funds by bypassing two-factor authentication through script injections.

Sora Ad campaign
Gemini Ad Campaign

Key Updates in Rilide V4:

  • Targeting of Facebook cookies
  • Masquerading as a Google Translate Extension
  • Enhanced obfuscation techniques to conceal the software’s true intent

Indicators Of Compromise

Malicious hashes

  • 2d6829e8a2f48fff5348244ce0eaa35bcd4b26eac0f36063b9ff888e664310db – OpenAI Sora official version setup.msi – Sora
  • a7c07d2c8893c30d766f383be0dd78bc6a5fd578efaea4afc3229cd0610ab0cf – OpenAI Sora Setup.zip – Sora
  • e394f4192c2a3e01e6c1165ed1a483603b411fd12d417bfb0dc72bd6e18e9e9d – Setup.msi – Sora
  • 021657f82c94511e97771739e550d63600c4d76cef79a686aa44cdca668814e0 – Setup.msi – Sora
  • 92751fd15f4d0b495e2b83d14461d22d6b74beaf51d73d9ae2b86e2232894d7b – Setup.msi – Sora
  • 32a097b510ae830626209206c815bbbed1c36c0d2df7a9d8252909c604a9c1f1 – Setup.msi – Sora
  • c665ff2206c9d4e50861f493f8e7beca8353b37671d633fe4b6e084c62e58ed9 – Setup.msi – Sora
  • 0ed3b92fda104ac62cc3dc0a5ed0f400c6958d7034e3855cad5474fca253125e – Capcut Pro For PC.setup.msi – Capcut
  • 757855fcd47f843739b9a330f1ecb28d339be41eed4ae25220dc888e57f2ec51 – OpenAI ChatGPT-4.5 Version Free.msi – ChatGPT
  • 3686204361bf6bf8db68fd81e08c91abcbf215844f0119a458c319e92a396ecf – Google Gemini AI Ultra Version Updata.msi – Gemini AI
  • d60ea266c4e0f0e8d56d98472a91dd5c37e8eeeca13bf53e0381f0affc68e78a – Photo Effects Pro v3.1.3 Setup.msi – Photo Effects
  • bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407 – Photo Effects Pro v3.1.3 Setup.msi – Photo Effects
  • 0ed3b92fda104ac62cc3dc0a5ed0f400c6958d7034e3855cad5474fca253125e – AISora.setup.msi – Sora

Vidar Stealer: Evolving Threats

Vidar Stealer, another prolific info stealer, is marketed through the same MaaS model via dark web ads, forums, and Telegram groups.

Capable of exfiltrating personal information and crypto from compromised devices, Vidar’s distribution has evolved from spam campaigns and cracked software to malicious Google Search ads and social media platforms, mainly through sponsored ads on Meta’s platform.

Indicators Of Compromise

Malicious hashes

  • 6396ac7b1524bb9759f434fe956a15f5364284a04acd5fc0ef4b625de35d766b- g2m.dll – MidJourney
  • 76ed62a335ac225a2b7e6dade4235a83668630a9c1e727cf4ddb0167ab2202f6- Midjourney.7z – MidJourney

IceRAT: More Than Just A Trojan

Despite its name, IceRAT functions more as a backdoor on compromised devices. It acts as a gateway for secondary infections, such as crypto miners and information stealers that target login credentials and other sensitive data.

Indicators Of Compromise

Malicious hashes

  • aab585b75e868fb542e6dfcd643f97d1c5ee410ca5c4c5ffe1112b49c4851f47- Midjourneyv6.exe – MidJourney
  • b5f740c0c1ac60fa008a1a7bd6ea77e0fc1d5aa55e6856d8edcb71487368c37c- Midjourneyv6ai.exe – MidJourney
  • cc15e96ec1e27c01bd81d2347f4ded173dfc93df673c4300faac5a932180caeb- Mid_Setup.exe – MidJourney
  • d2f12dec801000fbd5ccc8c0e8ed4cf8cc27a37e1dca9e25afc0bcb2287fbb9a- Midjourney_v6.exe – MidJourney
  • f2fc27b96a4a487f39afad47c17d948282145894652485f9b6483bec64932614-Midjourneyv6.1_ins.exe – MidJourney
  • f99aa62ee34877b1cd02cfd7e8406b664ae30c5843f49c7e89d2a4db56262c2e – Midjourneys_Setup.exe – MidJourney
  • 54a992a4c1c25a923463865c43ecafe0466da5c1735096ba0c3c3996da25ffb7 – Mid_Setup.exe – MidJourney
  • 4a71a8c0488687e0bb60a2d0199b34362021adc300541dd106486e326d1ea09b- Mid_Setup.exe – MidJourney

Nova Stealer: The New Kid On The Block

Nova Stealer emerges as a highly proficient info stealer with capabilities including password exfiltration, screen recordings, discord injections, and crypto wallet hijacking.

Nova Stealer, offered as MaaS by the threat actor known as Sordeal, represents a significant threat to digital security.

Indicators Of Compromise

Malicious hashes

  • fb3fbee5372e5050c17f72dbe0eb7b3afd3a57bd034b6c2ac931ad93b695d2d9- Instructions_for_using_today_s_AI.pdf.rar – AI and Life
  • 6a36f1f1821de7f80cc9f8da66e6ce5916ac1c2607df3402b8dd56da8ebcc5e2- Instructions_for_using_today_s_AI.xlsx_rar.rar – AI and Life
  • fe7e6b41766d91fbc23d31573c75989a2b0f0111c351bed9e2096cc6d747794b- Instructions for using today’s AI.pdf.exe – AI and Life
  • ce0e41e907cab657cc7ad460a5f459c27973e9346b5adc8e64272f47026d333d- Instructions for using today’s AI.xlsx.exe – AI and Life
  • a214bc2025584af8c38df36b08eb964e561a016722cd383f8877b684bff9e83d- 20 digital marketing tips for 2024.xlsx.exe – Google Digital Marketing
  • 53714612af006b06ca51cc47abf0522f7762ecb1300e5538485662b1c64d6f55 – Premium advertising course registration form from Oxford.exe – Google Digital Marketing
  • 728953a3ebb0c25bcde85fd1a83903c7b4b814f91b39d181f0fc610b243c98d4- New Microsoft Excel Worksheet.exe – Google Digital Marketing

The Midjourney Saga: AI’s Dark Side

The addition of AI tools on the internet, from free offerings and trials to subscription-based services, has not gone unnoticed by cybercriminals.

Midjourney, a leading generative AI tool with a user base exceeding 16 million as of November 2023, has become a favored tool among cyber gangs over the past year, highlighting the intersection of cutting-edge technology and cybercrime.

Midjourney has been a fan-favorite among cybercriminal gangs as well over the past year.
Midjourney has been a fan-favorite among cybercriminal gangs as well over the past year.

Indicators Of Compromise

  • 159.89.120.191
  • 159.89.98.241

As the digital landscape continues to evolve, so does the nature of the threats it maintains.

The rise of Malware-as-a-Service represents a significant shift in the cyber threat paradigm that requires vigilant and proactive measures to combat.

Key Updates in Rilide V4:

  • Targeting of Facebook cookies
  • Masquerading as a Google Translate Extension
  • Enhanced obfuscation techniques to conceal the software’s true intent

Indicators Of Compromise

Malicious hashes

  • 2d6829e8a2f48fff5348244ce0eaa35bcd4b26eac0f36063b9ff888e664310db – OpenAI Sora official version setup.msi – Sora
  • a7c07d2c8893c30d766f383be0dd78bc6a5fd578efaea4afc3229cd0610ab0cf – OpenAI Sora Setup.zip – Sora
  • e394f4192c2a3e01e6c1165ed1a483603b411fd12d417bfb0dc72bd6e18e9e9d – Setup.msi – Sora
  • 021657f82c94511e97771739e550d63600c4d76cef79a686aa44cdca668814e0 – Setup.msi – Sora
  • 92751fd15f4d0b495e2b83d14461d22d6b74beaf51d73d9ae2b86e2232894d7b – Setup.msi – Sora
  • 32a097b510ae830626209206c815bbbed1c36c0d2df7a9d8252909c604a9c1f1 – Setup.msi – Sora
  • c665ff2206c9d4e50861f493f8e7beca8353b37671d633fe4b6e084c62e58ed9 – Setup.msi – Sora
  • 0ed3b92fda104ac62cc3dc0a5ed0f400c6958d7034e3855cad5474fca253125e – Capcut Pro For PC.setup.msi – Capcut
  • 757855fcd47f843739b9a330f1ecb28d339be41eed4ae25220dc888e57f2ec51 – OpenAI ChatGPT-4.5 Version Free.msi – ChatGPT
  • 3686204361bf6bf8db68fd81e08c91abcbf215844f0119a458c319e92a396ecf – Google Gemini AI Ultra Version Updata.msi – Gemini AI
  • d60ea266c4e0f0e8d56d98472a91dd5c37e8eeeca13bf53e0381f0affc68e78a – Photo Effects Pro v3.1.3 Setup.msi – Photo Effects
  • bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407 – Photo Effects Pro v3.1.3 Setup.msi – Photo Effects
  • 0ed3b92fda104ac62cc3dc0a5ed0f400c6958d7034e3855cad5474fca253125e – AISora.setup.msi – Sora

Vidar Stealer: Evolving Threats

Vidar Stealer, another prolific info stealer, is marketed through the same MaaS model via dark web ads, forums, and Telegram groups.

Capable of exfiltrating personal information and crypto from compromised devices, Vidar’s distribution has evolved from spam campaigns and cracked software to malicious Google Search ads and social media platforms, mainly through sponsored ads on Meta’s platform.

Indicators Of Compromise

Malicious hashes

  • 6396ac7b1524bb9759f434fe956a15f5364284a04acd5fc0ef4b625de35d766b- g2m.dll – MidJourney
  • 76ed62a335ac225a2b7e6dade4235a83668630a9c1e727cf4ddb0167ab2202f6- Midjourney.7z – MidJourney

IceRAT: More Than Just A Trojan

Despite its name, IceRAT functions more as a backdoor on compromised devices. It acts as a gateway for secondary infections, such as crypto miners and information stealers that target login credentials and other sensitive data.

Indicators Of Compromise

Malicious hashes

  • aab585b75e868fb542e6dfcd643f97d1c5ee410ca5c4c5ffe1112b49c4851f47- Midjourneyv6.exe – MidJourney
  • b5f740c0c1ac60fa008a1a7bd6ea77e0fc1d5aa55e6856d8edcb71487368c37c- Midjourneyv6ai.exe – MidJourney
  • cc15e96ec1e27c01bd81d2347f4ded173dfc93df673c4300faac5a932180caeb- Mid_Setup.exe – MidJourney
  • d2f12dec801000fbd5ccc8c0e8ed4cf8cc27a37e1dca9e25afc0bcb2287fbb9a- Midjourney_v6.exe – MidJourney
  • f2fc27b96a4a487f39afad47c17d948282145894652485f9b6483bec64932614-Midjourneyv6.1_ins.exe – MidJourney
  • f99aa62ee34877b1cd02cfd7e8406b664ae30c5843f49c7e89d2a4db56262c2e – Midjourneys_Setup.exe – MidJourney
  • 54a992a4c1c25a923463865c43ecafe0466da5c1735096ba0c3c3996da25ffb7 – Mid_Setup.exe – MidJourney
  • 4a71a8c0488687e0bb60a2d0199b34362021adc300541dd106486e326d1ea09b- Mid_Setup.exe – MidJourney

Nova Stealer: The New Kid On The Block

Nova Stealer emerges as a highly proficient info stealer with capabilities including password exfiltration, screen recordings, discord injections, and crypto wallet hijacking.

Nova Stealer, offered as MaaS by the threat actor known as Sordeal, represents a significant threat to digital security.

Indicators Of Compromise

Malicious hashes

  • fb3fbee5372e5050c17f72dbe0eb7b3afd3a57bd034b6c2ac931ad93b695d2d9- Instructions_for_using_today_s_AI.pdf.rar – AI and Life
  • 6a36f1f1821de7f80cc9f8da66e6ce5916ac1c2607df3402b8dd56da8ebcc5e2- Instructions_for_using_today_s_AI.xlsx_rar.rar – AI and Life
  • fe7e6b41766d91fbc23d31573c75989a2b0f0111c351bed9e2096cc6d747794b- Instructions for using today’s AI.pdf.exe – AI and Life
  • ce0e41e907cab657cc7ad460a5f459c27973e9346b5adc8e64272f47026d333d- Instructions for using today’s AI.xlsx.exe – AI and Life
  • a214bc2025584af8c38df36b08eb964e561a016722cd383f8877b684bff9e83d- 20 digital marketing tips for 2024.xlsx.exe – Google Digital Marketing
  • 53714612af006b06ca51cc47abf0522f7762ecb1300e5538485662b1c64d6f55 – Premium advertising course registration form from Oxford.exe – Google Digital Marketing
  • 728953a3ebb0c25bcde85fd1a83903c7b4b814f91b39d181f0fc610b243c98d4- New Microsoft Excel Worksheet.exe – Google Digital Marketing

The Midjourney Saga: AI’s Dark Side

The addition of AI tools on the internet, from free offerings and trials to subscription-based services, has not gone unnoticed by cybercriminals.

Midjourney, a leading generative AI tool with a user base exceeding 16 million as of November 2023, has become a favored tool among cyber gangs over the past year, highlighting the intersection of cutting-edge technology and cybercrime.

Midjourney has been a fan-favorite among cybercriminal gangs as well over the past year.
Midjourney has been a fan-favorite among cybercriminal gangs as well over the past year.

Indicators Of Compromise

  • 159.89.120.191
  • 159.89.98.241

As the digital landscape continues to evolve, so does the nature of the threats it maintains.

The rise of Malware-as-a-Service represents a significant shift in the cyber threat paradigm that requires vigilant and proactive measures to combat.

The Complete Guide to Software as a Service: Everything you need to know about SaaS

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: Hijack Facebook Pages


Mar 25 2024

170K+ Python Developers GitHub Accounts Hacked In Supply Chain Attack

Category: Cyber Attack,Hacking,Pythondisc7 @ 8:38 am

Over 170,000 users have fallen victim to a meticulously orchestrated scheme exploiting the Python software supply chain.

The Checkmarx Research team has uncovered a multi-faceted attack campaign that leverages fake Python infrastructure to distribute malware, compromising the security of countless developers and organizations.

This article delves into the attack campaign, its impact on victims, the tactics, techniques, and procedures (TTPs) employed by the threat actors, and the critical findings from Checkmarx’s investigation.

Attack Campaign Description

The core of this malicious campaign revolves around an attacker’s ability to combine several TTPs to launch a silent attack on the software supply chain, specifically targeting the Python ecosystem.

By creating multiple malicious open-source tools with enticing descriptions, the attackers lured victims into their trap, primarily through search engines.

Python mirror -files.pythonhosted.org

The campaign’s sophistication is evident in distributing a malicious dependency hosted on a fake Python infrastructure, which was then linked to popular projects on GitHub and legitimate Python packages.

A chilling account from Mohammed Dief, a Python developer and one of the campaign’s victims, highlights the stealth and impact of the attack.

Dief encountered a suspicious error message while working on his laptop, the first sign of the compromise, leading to the realization that his system had been hacked.

Victims And Impact

Among the notable victims of this campaign is the Top.gg GitHub organization, a community boasting over 170,000 members.

The attackers managed to hijack GitHub accounts with high reputations, including that of “editor-syntax,” a maintainer with write permissions to Top.gg’s repositories.

The Top.gg community (which boasts over 170K members) was also a victim of  this attack
The Top.gg community (which boasts over 170K members) was also a victim of  this attack

This allowed them to commit malicious acts and increase the visibility and credibility of their malicious repositories.

The attack’s impact is far-reaching, affecting individual developers and larger communities alike.

Social engineering schemes, account takeovers, and malicious packages published on the PyPi registry have underscored the software supply chain’s vulnerability to such sophisticated attacks.

The Checkmarx Research team has uncovered an attack campaign aimed at the software supply chain.

The campaign appears to have successfully exploited multiple victims.

Threat Actors And TTPs

The threat actors behind this campaign demonstrated high sophistication and planning.

They employed a range of TTPs, including:

  • Account Takeover via Stolen Cookies: The attackers gained access to high-reputation GitHub accounts by stealing session cookies, bypassing the need for passwords.
  • Publishing Malicious Packages: By setting up a custom Python mirror and publishing malicious packages to the PyPi registry, they could distribute malware under the guise of legitimate software.
  • Social Engineering: The attackers used social engineering to trick users into downloading malicious dependencies, further spreading the malware.

By deploying a fake Python package mirror and utilizing typosquatting techniques, the attackers could deceive users and systems into downloading poisoned versions of popular packages like “Colorama.

“The malicious payload delivered through these packages is designed to harvest sensitive information, including passwords, credentials, and data from various software applications.

Malicious Package

The malware targets web browsers, Discord, cryptocurrency wallets, and Telegram, and even includes a keylogging component to capture victims’ keystrokes.

The final stage of the malware reveals its data-stealing capabilities, targeting not only personal and financial information but also attempting to gain unauthorized access to victims’ social media and communication platforms.

This attack campaign highlights the critical vulnerabilities within the software supply chain, particularly in open-source ecosystems like Python’s.

The sophistication and success of the attackers in exploiting these vulnerabilities underscore the need for heightened vigilance and robust security practices among developers and organizations.

Through continuous monitoring, collaboration, and information sharing, the cybersecurity community can mitigate risks and protect the integrity of open-source software.

Python for Cybersecurity: Using Python for Cyber Offense and Defense 

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory

Tags: supply chain attack


Next Page »