blog.extremehacking.org Open in urlscan Pro
43.225.55.205  Public Scan

URL: http://blog.extremehacking.org/blog/2019/04/30/powershell-the-gandcrab-infection-and-the-long-forgotten-server/
Submission: On April 27 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET http://blog.extremehacking.org/

<form role="search" class="searchform" method="get" action="http://blog.extremehacking.org/">
  <div class="search-table">
    <div class="search-field">
      <input type="text" value="" name="s" class="s" placeholder="Search ...">
    </div>
    <div class="search-button">
      <input type="submit" class="searchsubmit" value="">
    </div>
  </div>
</form>

GET http://blog.extremehacking.org/

<form role="search" class="searchform" method="get" action="http://blog.extremehacking.org/">
  <div class="search-table">
    <div class="search-field">
      <input type="text" value="" name="s" class="s" placeholder="Search ...">
    </div>
    <div class="search-button">
      <input type="submit" class="searchsubmit" value="">
    </div>
  </div>
</form>

GET http://blog.extremehacking.org/

<form role="search" class="searchform" method="get" action="http://blog.extremehacking.org/">
  <div class="search-table">
    <div class="search-field">
      <input type="text" value="" name="s" class="s" placeholder="Search ...">
    </div>
    <div class="search-button">
      <input type="submit" class="searchsubmit" value="">
    </div>
  </div>
</form>

Text Content

Extreme Hacking Blog | Cyber Suraksha Abhiyan|sadik.shaikh@extremehacking.org


 * Hackers Charity
 * Main Website
 * Cyber News
 * Exploits
 * White Papers
 * Google Hacking Database
 * 

Go to...

 * Hackers Charity
 * Main Website
 * Cyber News
 * Exploits
 * White Papers
 * Google Hacking Database


POWERSHELL, THE GANDCRAB INFECTION AND THE LONG-FORGOTTEN SERVER

Home/Cyber News/Powershell, the Gandcrab infection and the long-forgotten server
Previous Next
Powershell, the Gandcrab infection and the long-forgotten server

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune –
India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan



Credits: The Register

CyberUK 2019 If your hair isn’t already grey enough, GCHQ staff have revealed a
handful of infosec incidents that, in their words, “surprised us”.

During a talk at CyberUK 2019, the annual shindig of the spy agency’s
public-facing offshoot, the National Cyber Security Centre (NCSC), a
bespectacled and bearded chap who was introduced only as “Toby L” told an
enthralled audience one of his “favourite war stories”.

The NCSC is part of GCHQ’s drive since 2013 to rebuild public trust and convince
industry that the government is also interested in their economic wellbeing. As
part of that, NCSC occasionally gets called in to help with particularly
pernickety problems involving malware infections on corporate networks.

“This specific instance of Gandcrab was not the most exciting,” said “Toby”.
“It’s ransomware that’s relatively well-understood in the community. It’s
relatively easy to recover from one of those compromises. It’s not the
ransomware that’s interesting, though, but how it got where it was.”

A look over the company’s logs revealed that Gandcrab had been introduced via a
download from Pastebin – an encoded Base64 binary summoned through a Powershell
command, no less.

“Base64 on Powershell is a perfectly legit function. It provides a mechanism to
run your Powershell scripts without a dedicated commandlet or a dedicated script
file,” commented Toby. “It does look pretty weird and dodgy when you’ve got
encoded commands being sent to Powershell but it’s a legitimate use of it.”

What ran Powershell, then? NCSC traced that back to a file called agentmon.exe –
and this was where it got interesting.

“It’s a legit file from Kaseya, an IT vendor. They sell products that allow
remote management monitoring. If you have an outsourced IT vendor managing your
network remotely from their office somewhere in the world, chances are they use
a tool like Kaseya. They log into your network, access controls on RDP [remote
desktop], SSH, whatever you might be using. Coming in through a backdoor if you
like, a custom protocol.”

Agentmon.exe was running on that particular network with system-level privs,
deploying Powershell commands across it daily – “adding to the noise ratio a
bit”, as Toby put it. Digging into Kaseya’s logs revealed something even more
intriguing: the server issuing the commands had been run by an outsourced IT
provider, and that provider’s contract with the infected company had ended quite
a while ago.

CVE-2017-18362 explained half the story. The critical vuln allows anyone with
access to the Kaseya server’s ManagedIT.asmx page through its web interface to
execute arbitrary SQL queries. As Toby put it: “No whitelisting, no
blacklisting, no password entry… send SQL commands and HTTP POST and it’ll just
run it.”

But Powershell? Easy if you know about CVE-2018-20753, which allows (yup, you
guessed it) unprivileged remote attackers to execute Powershell payloads on all
managed devices.

When the external MSP’s contract had ended, post-contract cleanup by both
parties hadn’t included the Kaseya deployment on all the devices across the
network. Left unpatched, unoperated and unremembered, the Kaseya server had been
found by a baddie who’d made use of two relatively old CVEs to compromise the
entire network and distribute ransomware across it.

“One of those weird tech issues,” shrugged Toby.


MALWARELESS MALIGNANCY

Another NCSC bod, “Harry W”, as equally descript as his colleague Toby, took to
the podium.

An executive at a company got a WhatsApp invite to a conference call from a
personal assistant. After establishing comms, the PA said: “We use Viber
[another cross-platform VoIP app] now.”

“It’s a legitimate product,” said Harry. “A perfectly fine messaging platform.”

The PA sent the exec a crafted link. But this was no URL made up of dodgy ASCII
lookalike characters, or substituting 1 for I, or even to a suspect domain. This
was a URL to viber.com/activate-secondary/[string of random characters].

“Activate secondary is a very specific feature of Viber,” said Harry. “It allows
you to sync your Viber accounts on one device with another; for example, a
desktop. You can sync messages between different systems. Make phone calls off
one and send messages off the other. Enables users to use it a bit more
flexibly.”

A useful feature, then. For both good and bad users.

“What we saw was a number of individuals in this organisation who did click this
link,” said Harry. “They would activate secondary, paired their device with
another – I think it was on the African continent somewhere. What happens? Full
address book popped over. Not just the Viber address book; the entire address
book on the phone. You might have personal info on there about job titles. Makes
the next pivot for social engineering that bit easier.”

It gets worse.

“If you’ve paired your device, it also allows you to spoof phone calls as the
person you’ve just synced with,” revealed Harry. “The attacker can now use your
caller ID. If you’ve got a credit card synced, you can make Viber-to-landline
calls – much more lucrative! You can also, rather than just ringing friends,
ring your own 091 hotline number to bring in extra money.”

“Malwareless,” he continued. “It wasn’t using anything particularly
sophisticated, but still, a really interesting channel in which they were trying
to get that extra information from targets.”

As he pointed out, no mobile device management platform would have picked up
this attack; Viber is a legitimate messaging app present in the various app
stores. “Again, when you’ve got legit functions from an app, how can you monitor
and detect those?”


SECURITY LOCKING OUT YOUR ATTACK? NEVER MIND – JUST ENROL FOR A COMPANY VPN

Another cautionary tale came from an attack by Iran-based hacking crew APT35,
aka “Newscaster”.

The targeted company had been hit a couple of months previously. Diligently, the
firm did all the right things: beefed up security, briefed non-techie staff on
things to do and not to do, and the rest of it. All exactly by the book.

Except for their VPN implementation.

Users across the company were told to register for access to the new
company-wide VPN. No VPN, no access to business-critical stuff. The VPN itself
was protected by 2FA.

“What they had missed out was the enrolment to the 2FA VPN authentication was
initiated by the users,” said the NCSC bod. “Not all users, particularly those
based in offices, need 2FA. So they didn’t enrol, right? All the [threat] actor
did was target a bunch of accounts, figure out a user who wasn’t enrolled and
then enrolled themselves instead.”

The hackers were literally signing themselves up to the new access-all-areas
corporate VPN. They were eventually discovered and shut out again, but not
before they had gained access to a critical proof-of-concept deployment where
access had been locked down to just four specific accounts.

--------------------------------------------------------------------------------

As well as telling some fascinating stories, the point of this session was a bit
wider: NCSC, even as an arm of GCHQ, is getting out there and helping industry
with its infosec headaches. While some chunks of industry will doubtless need a
lot more convincing than this to give people from a state spy agency access to
their sensitive internal networks, it’s a real shift from the days of 2013 and
the Snowden revelations.




WWW.EXTREMEHACKING.ORG


SADIK SHAIKH | CYBER SURAKSHA ABHIYAN, ETHICAL HACKING TRAINING
INSTITUTE, CEHV10,CHFI,ECSAV10,CAST,ENSA, CCNA, CCNA
SECURITY,MCITP,RHCE,CHECKPOINT, ASA
FIREWALL,VMWARE,CLOUD,ANDROID,IPHONE,NETWORKING HARDWARE,TRAINING INSTITUTE IN
PUNE, CERTIFIED ETHICAL HACKING,CENTER FOR ADVANCED SECURITY TRAINING IN INDIA,
CEH V10 COURSE IN PUNE-INDIA, CEH CERTIFICATION IN PUNE-INDIA, CEH V10 TRAINING
IN PUNE-INDIA, ETHICAL HACKING COURSE IN PUNE-INDIA

    

 


By Sadik Shaikh|2019-04-30T09:53:31+00:00April 30th, 2019|Cyber News|

SHARE THIS STORY, CHOOSE YOUR PLATFORM!




RECENT POSTS

 * Houston consulate one of worst offenders in Chinese espionage, say U.S.
   officials
 * Shocked I am. Shocked to find that underground bank-card-trading forums are
   full of liars, cheats, small-time grifters
 * Vint Cerf suggests GDPR could hurt coronavirus vaccine development
 * Brit defense contractor hacked, up to 100,000 past and present employees’
   details siphoned off – report
 * US officially warns China is launching cyberattacks to steal coronavirus
   research


ARCHIVES

 * July 2020
 * May 2020
 * November 2019
 * September 2019
 * August 2019
 * July 2019
 * June 2019
 * May 2019
 * April 2019
 * March 2019
 * February 2019
 * January 2019
 * December 2018
 * November 2018
 * October 2018
 * September 2018
 * August 2018
 * July 2018
 * June 2018
 * May 2018
 * April 2018
 * March 2018
 * February 2018
 * January 2018
 * December 2017
 * November 2017
 * October 2017
 * September 2017
 * August 2017
 * July 2017
 * June 2017
 * May 2017
 * April 2017
 * March 2017
 * February 2017
 * January 2017
 * December 2016
 * November 2016
 * October 2016
 * September 2016
 * August 2016
 * July 2016
 * June 2016
 * May 2016
 * April 2016
 * March 2016
 * February 2016
 * January 2016
 * December 2015
 * November 2015
 * October 2015
 * September 2015
 * August 2015
 * July 2015
 * June 2015


CATEGORIES

 * Big Billion Days
 * CYBER CRIME HELPLINE
 * CYBER CRIME HELPLINE AWARD
 * Cyber News
 * Exploits
 * Files containing juicy info
 * Files containing passwords
 * Google Hacking Database
 * Hackers Charity
 * Hacking
 * job
 * Metasploit
 * NSA Hacked
 * Papers
 * Pokemon Go Hacks and Tricks
 * Reliance Jio 4G Services
 * Sensitive Directories
 * torrentz
 * torrentz.eu is back
 * Tracking Proxy IP
 * Uncategorized
 * White Papers
 * XPath Injection


PAGES

 * Hackers Charity
 * Main Website
 * Cyber News
 * Exploits
 * White Papers
 * Google Hacking Database


EXTREME HACKING





CYBER SURAKSHA ABHIYAN

Email: sadik.shaikh@extremehacking.org

Web: Cyber Suraksha Abhiyan



April 2019 M T W T F S S 1234567 891011121314 15161718192021 22232425262728 2930
 

« Mar   May »



OUR BELIEF…

"One machine can do the work of fifty ordinary men. No machine can do the work
of one extraordinary man."



Copyright 2015 Extreme Hacking | All Rights Reserved | Cyber Suraksha Abhiyan |
Site Protected by Sadik Shaikh |


ShareThis Copy and Paste