Skip to main content

Microsoft Blocks Credential Theft Attack Targeting Dozens of Orgs - By Sergiu Gatlan



However, as Microsoft's Defender ATP Research team which spotted the attack says, "behavioral blocking and containment capabilities in Microsoft Defender ATP detected and foiled the attack in its early stages, protecting customers from damage."

Credential theft attack chain
To distribute the Lokibot payloads, the attackers used highly-targeted spear-phishing emails with contents specifically tailored to the targeted organization.

For instance, in the case of a pharmaceutical firm, they "used pharmaceutical industry jargon to improve the credibility of the email and in one case requested a quote on an ingredient that the target company was likely to produce."
Phishing email samples
Phishing email samples
To compromise the victims' systems, the phishing email attachments would load malicious code from an attacker-controlled WordPress website when the targets would open the lure documents.
In the next step, the CVE-2017-11882 remote code execution vulnerability in the Microsoft Office Equation Editor component would be abused by the remotely loaded exploit code and, after successful exploitation, the Lokibot malware would be downloaded and dropped.
LokiBot collects as much sensitive info as possible, info that subsequently gets delivered to the malware operators' command and control (C2) servers via an HTTP POST request.
The LokiBot malware is known for stealing a wide range of credentials including but not limited to email account passwords, FTP credentials, browser-stored passwords, and more.

Attacks blocked by Microsoft Defender ATP



However, as Microsoft says, "the behavior-based machine learning models built into Microsoft Defender ATP caught attacker techniques at two points in the attack chain."
More exactly, it managed to detect the malicious attack's exploit behavior and the process hollowing technique used to inject malicious code into a running process after unmapping its memory.
Attack chain
Attack chain
Last month, Microsoft's researchers also spotted a new fileless malicious campaign, dubbed Nodersok by the Microsoft Defender ATP Research Team and Divergent by Cisco Talos, and observed it while dropping LOLBins to infect Windows systems using a Node.js-based malware that turned the devices into proxies.
During July, Microsoft discovered yet another fileless malware campaign dropping the information-stealer Astaroth Trojan into the memory of compromised computers.

Just like in the case of the Nodersok campaign detected in September, the attacks delivering Astaroth payloads used various fileless techniques and a multi-stage infection chain, with the initial vector being a spear-phishing email with malicious links.

Comments

Popular posts from this blog

Lebanese Protesters Are Using This ‘Bridgefy’ Messaging App - What is it?

Bridgefy is an offline messaging app that lets you communicate with friends and family when you don't have access to the Internet, by simply turning on your Bluetooth antenna. Due to WhatsApp outage and the poor internet services, a new offline messaging app known as Bridgefy has started to gain traction among Lebanese protesters. The people are recommending using this app in case there is a shutdown of internet services. Did you know that: 1 billion people aren’t covered by 3G or 4G networks. 3.3 billion people live in areas where the mobile Internet can be accessed but remain without a mobile Internet subscription. 1 billion people own a smartphone but don’t own a data plan. 40% of the world population is forecast to remain unconnected by 2025. These numbers represent huge amounts of potential users that aren’t being reached by mobile apps. Bridgefy keeps your app working even when people do not have access to the Internet. T...

WhatsApp Users Exchanged Over 100 Billion Messages on New Year’s Eve, A New Record

WhatsApp is one of the most widely used communication apps on the planet and as such, clocks an insane number of messages and media exchanges on a daily basis. But the New Year's Eve broke a record that has been standing since WhatsApp's debut a decade ago. WhatsApp has revealed that users exchanged over 100 billion messages on New Year's eve. And out of that number, more than 20 billion messages were shared by Indian users alone. Moreover, around 12 billion out of the 100 billion+ messages shared on the platform were images. WhatsApp wrote in a press release that over 100 billion messages were shared globally on December 31 in the 24-hour duration leading up to the midnight of New Year's Eve. This is a record-breaking volume and is the highest number of messages exchanged in a single day ever since WhatsApp kicked off its services ten years ago. Out of those 100 billion+ messages shared on New Year's eve, WhatsApp says over 12 billion were images. Meanwhile...

Facebook updates iOS app to fix issues that let the camera open in the background

The issues were first reported this month This month, some users of Facebook’s iOS app  found that  that, in at least two situations, the app appeared to be activating the camera in the background without a user’s knowledge. Facebook said yesterday that it was submitting fixes for the issues to Apple, and the company tells us that, as of this morning, the updated app is now available for download on the App Store. I’ve downloaded the update to my iPhone 11 Pro, and I can’t get the camera to accidentally activate in either of the scenarios that were reported — but I also couldn’t get it to activate yesterday, so I can’t personally confirm that the issues are fixed. But if we take Facebook at its word that everything is resolved, it’s nice to see that the company acted quickly. Article reference:  https://www.theverge.com/2019/11/13/20963791/facebook-issue-fix-camera-open-background-update-ios-app-store