Connect with us

Press Release

Malware is now being concealed by hackers in Windows Event Logs.

Published

on

Malware is now being concealed by hackers in Windows Event Logs.

Undocumented publicly for attacks in the wild, security researchers have discovered a malicious operation that leveraged Windows event logs to contain malware.

The assault’s threat actor was able to use the technology to introduce fileless malware into the file system as part of a covert attack using a variety of techniques and modules.

Payloads are added to Windows event logs.
After being recognised as a threat on a customer’s computer by a commercial product equipped with technologies for behavior-based detection and anomaly control, researchers at Kaspersky collected a sample of the virus.

According to the study, the malware utilised a sizable number of both custom-made and commercially available tools as part of a “highly targeted” effort.
One of the most intriguing aspects of the attack is the bespoke malware dropper’s injection of shellcode payloads into Windows event logs for the Key Management Services (KMS).

According to Kaspersky’s lead security researcher Denis Legezo, the malicious campaign marked the first time this technique had been deployed “in the field.”

At order to load malicious code via DLL search order hijacking, the dropper copies the genuine OS error handling programme WerFault.exe to “C:WindowsTasks” before dropping an encrypted binary resource to the “wer.dll” (Windows Error Reporting) in the same location.

A hacking method called DLL hijacking uses weak security checks in normal programmes to load a malicious Dynamic Link Library (DLL) into memory from any location.

According to Legezo, the dropper’s functions include looking for specific entries in the event logs (category 0x4142, or ‘AB’ in ASCII), as well as putting data onto the disc for the side-loading procedure. In the absence of such a record, it generates 8KB chunks of encrypted shellcode that are then merged to create the code for the subsequent stager.

Given that the source code for injecting payloads into Windows event logs has been publicly available for a short while, the new technique examined by Kaspersky is probably on its way to becoming more well-known.

Advanced technical actor
Legezo states that the overall campaign “looks remarkable” based on the numerous methods and modules (pen-testing suites, personalised anti-detection wrappers, and final stage trojans) utilised in it.

He claimed to an APT-level adversary, saying to BleepingComputer that “the actor behind the campaign is pretty adept by itself, or at least has a good set of quite sophisticated commercial tools.”

The commercial penetration testing frameworks Cobalt Strike and NetSPI were among the tools utilised in the attack (the former SilentBreak).

Although the researcher believes that some of the attack’s modules are original, they may really be a part of the NetSPI platform, which testing required a paid licence for.

For instance, two trojans with the names ThrowbackDLL.dll and SlingshotDLL.dll could represent tools that belong to the SilentBreak penetration testing framework and are known to use those names.

According to the research, the attack started in September 2021 when the victim fell for a scam to download a RAR archive from the file-sharing website file.io.

The Cobalt Strike module, which was signed with a certificate from the business Fast Invest ApS, was subsequently distributed by the threat actor. 15 files were signed with the certificate, but none of them were genuine.

According to the researcher, the ultimate goal of targeted malware with such last stager functionality is typically to collect some valuable data from the victims.

When analysing the attack, Kaspersky did not discover any resemblances to earlier efforts linked to a recognised threat actor.

The researchers label the new activity SilentBreak, after the name of the tool most frequently employed in the attack, until a connection with a known opponent is made.

 

Continue Reading

Press Release

Dramaindo

Published

on

Dramaindo

If you’re looking for Moenime? After that, this is where you can find various sources that provide thorough information.

Nonton Streaming Drama Sub Indo at Dramaindo.moe
Dramaindo.moe is a site where you can stream and download Indonesian dramas in 240p, 360p, 480p, and 720p HD. Tempat Nonton Drama Sub Indo Terlengkap, Dramaindo.moe.

https://163.172.111.222/
Extracurricular Drama in Indonesian – Dramaindo.moe
Extracurricular can be seen online and downloaded in HD in the following resolutions: 240p, 360p, 480p, and 720p. Dramaindo.moe is the only site where you can access Extracurricular complete episodes with subtitles in Indonesian.

https://163.172.111.222/series/extracurricular/
I hope the sources mentioned above give you with information about Dramaindo. If not, you can contact me through the comments.

Continue Reading

Press Release

T-Mobile data leak revealed call logs and phone numbers

Published

on

T-Mobile data leak revealed call logs and phone numbers

T-Mobile has disclosed a data breach that exposed customer proprietary network information (CPNI), which includes phone numbers and call history.

T-Mobile started texting consumers about a “security incident” that revealed the details of their accounts yesterday.

T-Mobile claims that recently, their systems had “malicious, unauthorised access” uncovered by their security staff. T-Mobile hired a cybersecurity company to conduct an investigation, and the results showed that threat actors had gotten access to CPNI, or customer-generated network information, used for telecommunications.

Phone numbers, call history, and the number of lines on an account are among the data compromised in this attack.

“The Federal Communications Commission (FCC) regulations’ definition of customer proprietary network information (CPNI) was accessed. The CPNI that was accessed might have included your phone number, the number of lines you have subscribed to, and, in some cases, call-related data gathered as part of your wireless service’s routine operation “T-Mobile claimed in a notification of a data breach.

According to T-Mobile, the compromised data did not include the names, addresses, email addresses, financial information, credit card information, social security numbers, tax IDs, passwords, or PINs of account holders.

T-Mobile claimed that this hack only affected a “small number of consumers (less than 0.2%)” in a statement to BleepingComputer. There are roughly 200,000 persons who have been impacted by this breach out of T-estimated Mobile’s 100 million customers.

“Less than 0.2% of our clients are now receiving notifications that some account information may have been improperly accessed. Names connected to the account, financial information, credit card details, social security numbers, passwords, PINs, and physical or email addresses were NOT among the data obtained. Phone numbers, the number of lines a user subscribes to, and, in a few rare situations, call-related data gathered as part of routine operation and service, were among the data that may have been accessed “Tells BleepingComputer, T-Mobile.

Anyone who has received a text alert about this incident should be on the watch for any suspicious texts that seem to be from T-Mobile and ask for information or contain links to websites that are not owned by T-Mobile.

Threat actors frequently employ information they have obtained from other targeted phishing and smishing efforts in an effort to obtain sensitive data such login names and passwords.

Prior data breaches at T-Mobile occurred in 2018, 2019 for prepaid customers, and in March 2020, which exposed personal and financial information.

Continue Reading

Press Release

MASSACHUSETTS COURT SUPPORTS A REQUEST FROM THE IRS TO OBTAIN THE RECORDS OF ALL CIRCLE CUSTOMERS WHO HAD $20K+ IN CRYPTO TRANSACTIONS BETWEEN 2016 AND 2020 (ZACK SEWARD/COINDESK)

Published

on

MASSACHUSETTS COURT

Massachusetts court supports a request from the IRS to obtain the records of all Circle customers who had $20K+ in crypto transactions between 2016 and 2020  —  A Massachusetts court is supporting a request from the IRS to obtain the records Circle customers, the Department of Justice said.

Continue Reading

Trending