ics-cert.kaspersky.com Open in urlscan Pro
185.105.225.103  Public Scan

URL: https://ics-cert.kaspersky.com/publications/reports/2023/08/10/common-ttps-of-attacks-against-industrial-organizations-implants...
Submission: On August 14 via api from DE — Scanned from DE

Form analysis 4 forms found in the DOM

<form class="header__search-form">
  <input type="text" class="header__input">
</form>

<form class="header__search-form">
  <input type="text" class="header__input">
</form>

POST #

<form class="modal-m__form form-subscription" method="POST" action="#">
  <input type="hidden" name="Услуга" id="advisories_info">
  <span class="modal-m__title">Подписка на рассылку</span>
  <label class="modal-m__label">
    <span>E-mail</span>
    <input type="text" class="modal-m__input field__input input" id="email">
    <div class="input--info"></div>
  </label>
  <div class="arcs-modal__field-wrapper_checkbox field_checkbox checkbox modal-m__privacy form-check">
    <label for="vulnerabilities" class="checkbox__label modal-m__text"> Данные по уязвимостямо </label>
    <input type="checkbox" class="checkbox__input visually-hidden" name="vulnerabilities" checked="" id="vulnerabilities">
    <span class="checkbox__input-fake"></span>
  </div>
  <div class="arcs-modal__field-wrapper_checkbox field_checkbox checkbox modal-m__privacy">
    <label for="threats" class="checkbox__label modal-m__text"> Информация об угрозах </label>
    <input type="checkbox" class="checkbox__input visually-hidden" name="threats" checked="" id="threats">
    <span class="checkbox__input-fake"></span>
  </div>
  <div class="arcs-modal__field-wrapper_checkbox field_checkbox checkbox modal-m__privacy">
    <label for="condition" class="checkbox__label modal-m__text"> I agree to provide my contact information to Kaspersky Lab (first name, last name, email address, phone, country postal code) to be contacted by Kaspersky Lab sales representatives by
      phone for a personalized offer that could be based, in particular, on geography and company size information provided; to receive information via email about Kaspersky Lab products and services including promotional offers, product updates and
      premium assets like white papers, webcasts, videos, events etc.; to participate in surveys to vocalize opinion on various aspects of Kaspersky Lab business, in particular, about products, and technical support. I understand that I can withdraw
      this consent at any time via unsubscribe link from email or via <a href="#" class="modal-m__link">
                                         Privacy Policy                                         </a>
    </label>
    <input type="checkbox" class="checkbox__input visually-hidden" name="condition" id="condition">
    <span class="checkbox__input-fake"></span>
  </div>
  <div class="g-recaptcha" data-sitekey="6Lc4EwkUAAAAAMHZJ47EcbYQ2SNuyT-nYvVtRfqq">
    <div style="width: 304px; height: 78px;">
      <div><iframe title="reCAPTCHA"
          src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Lc4EwkUAAAAAMHZJ47EcbYQ2SNuyT-nYvVtRfqq&amp;co=aHR0cHM6Ly9pY3MtY2VydC5rYXNwZXJza3kuY29tOjQ0Mw..&amp;hl=de&amp;v=3kTz7WGoZLQTivI-amNftGZO&amp;size=normal&amp;cb=a1fycqi8rwu5"
          width="304" height="78" role="presentation" name="a-9uiwkbq4ucnd" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
      </div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
        style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
    </div><iframe style="display: none;"></iframe>
  </div>
  <br>
  <button class="arcs-modal__form-button button-ajax" type="submit">
    <span class="button__text">Подписаться</span>
  </button>
</form>

POST https://ics-cert.kaspersky.com/wp-content/themes/new_ics_cert/ajax/cookie-usage.php

<form action="https://ics-cert.kaspersky.com/wp-content/themes/new_ics_cert/ajax/cookie-usage.php" class="notification_form js-cookie-notification" method="post">
  <input type="hidden" id="_wpnonce" name="_wpnonce" value="cbde7fa9ed"><input type="hidden" name="_wp_http_referer" value="/publications/reports/2023/08/10/common-ttps-of-attacks-against-industrial-organizations-implants-for-uploading-data/"> <input
    type="hidden" name="agree" value="true">
  <div class="notification_description">
    <p>We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking
      on&nbsp;<a class="external-link" href="https://www.kaspersky.com/web-privacy-policy" rel="nofollow">more information</a>.</p>
  </div>
  <button class="footer__download-key button_hover" style="border: none" type="submit">Accept and Close</button>
</form>

Text Content

 * Publications
 * Services
 * Advisories
 * Events
 * Statistics

English English Русский
English
English
Русский

 * Publications
 * Services
 * Advisories
 * Events
 * Statistics

English English Русский
English
English
Русский
Contents:
 * Stack of implants used to upload files to Dropbox
 * Tools for manual exfiltration of stolen files
 * Implant used to upload files via the Yandex email service
 * Conclusion
 * Recommendations
 * Appendix I – Indicators of compromise
 * Appendix II – MITRE ATT&CK Mapping





Filter


 * Main
 * Publications
 * Reports
 * Common TTPs of attacks against industrial organizations. Implants for
   uploading data
 * Common TTPs of attacks against industrial organizations. Implants for
   uploading data

10 August 2023


COMMON TTPS OF ATTACKS AGAINST INDUSTRIAL ORGANIZATIONS. IMPLANTS FOR UPLOADING
DATA

 * 
 * 
 * 
 * 

Download PDF
 * Stack of implants used to upload files to Dropbox
 * Tools for manual exfiltration of stolen files
   * Tool used to upload files to Yandex Disk
   * Tool used to upload files to temporary file sharing services
   
   
 * Implant used to upload files via the Yandex email service
 * Conclusion
 * Recommendations
 * Appendix I – Indicators of compromise
   * Stack of implants used to upload files to Dropbox
     * MD5
   * Tool used to upload files to Yandex Disk
     * MD5
   * Tool used to upload files to temporary file sharing services
     * MD5
     * IP/URL
   * Implant used to upload files via the Yandex email service
     * MD5
   
   
 * Appendix II – MITRE ATT&CK Mapping

This is the third part of our research based on an investigation of a series of
attacks against industrial organizations in Eastern Europe.

The attackers aimed to establish a permanent channel for data exfiltration,
including data stored on air-gapped systems.

In total we have identified over 15 implants and their variants planted by the
threat actor(s) in various combinations.

The entire stack of implants used in attacks can be divided into three
categories based on their roles:

 * First-stage implants for persistent remote access and initial data gathering
 * Second-stage implants for gathering data and files, including from air-gapped
   systems
 * Third-stage implants and tools used to upload data to C2

In this part we present information on the four types of implants and two tools
used during the last (third) stage of the attacks discovered. The third-stage
implants were deployed by the threat actor(s) via the first-stage, as well as
the second-stage, implant.

Third-stage implants have much in common with the first-stage implants,
including the use of a cloud-based data storage (e.g. Dropbox, Yandex Disk),
code obfuscation, and the implementation of DLL hijacking techniques.

The full report is available on the Kaspersky Threat Intelligence portal.

For more information please contact ics-cert@kaspersky.com.


STACK OF IMPLANTS USED TO UPLOAD FILES TO DROPBOX

In the course of our research, we identified a stack of implants for uploading
files to Dropbox, designed to work in tandem with a second-stage file-gathering
implant.

The malware stack consists of three implants forming a straight execution chain
(which consists of three steps).

The first step is used for persistence, the deployment and startup of the
second-step malware module, which is responsible for uploading the files
collected to the server by calling the third-step implant and cleaning up.

This architecture allows the threat actor to change the execution flow by
replacing a single module in the chain. During our analysis, we identified five
variants of third-step and two variants of second-step implants deployed a few
months after the initial attack.

The very first variants of second-step implants in the chain were designed to
decrypt a third-step payload and inject it into a legitimate process (e.g.,
“msiexec.exe”). All variants of third-step payloads in this chain were almost
identical, except for the C2 address.

Second-step implant creating “msiexec.exe” to host the malicious payload

The C2 IP address in one of the third-step variants caught our attention because
it was a local IP address. This means that the threat actor deployed a C2 inside
the corporate perimeter and apparently used it as a proxy to exfiltrate data
from hosts that didn’t have direct access to the internet.

Third-step implant variant sending “.rar” files to some local C2

Later, the threat actor deployed a new variant of the second-step implant, whose
capabilities included looking up file names in the Outlook folder (i.e., email
account names), executing remote commands and uploading local or remote “.rar”
files to Dropbox by calling the third-step implant.

The table below summarizes all commands with which this second-step implant
expects to be executed (it terminates if called with no command-line arguments):

Command Parameters Description uploadlocal   Call third-step implant to upload
local .rar files from “C:\ProgramData\NetWorks\ZZ” to a Dropbox folder and clean
up. Uploadremote [username] [domain] [SID] [host] [ntlm-hash] Copy .rar files
from ”C:\ProgramData\NetWorks\ZZ” on a remote machine to a local folder, then
delete files on the remote machine and call third-stage implant to upload local
.rar files to a Dropbox folder, then clean up checkoutlook [username] [domain]
[SID] [host] [ntlm-hash] Search for an Outlook folder on a local or remote host
and print file listing to stdout. Wmic [username] [domain] [SID] [host]
[ntlm-hash] [command] Execute a cmd command locally or remotely and log output
to the file “c:\windows\debug\out.txt”, then read the file and print its
contents to stdout, then delete the file “out.txt” (locally or remotely)

Before executing any remote command, the implant checks if the privileges are
sufficient to access the remote host by calling a tool named “libvlc.exe”, which
was not identified in the course of the research, with the following parameters:
username, domain, SID, hostname, and ntlm hash.

Using some unknown tool to check privileges to access a remote host

To upload local files, the second-step implant calls a third-step implant, which
is supposed to be already deployed on the machine either at the statically
defined path “c:/users/public/” or at the same path as the second-step implant.

Second-step implant starts a third-step implant (named “cl.exe”) to upload
“.rar” files to Dropbox

It should be noted that before calling the third-step implant to upload files,
the second-step implant prepends a custom header to each “.rar” file. The header
contains the name of the host which is the source of the file and the original
file name (which is simply the file creation date and a time). The threat actor
does this to avoid losing such metadata: when a file is uploaded to Dropbox, the
implant changes its name to a pseudorandom sequence of numbers.

All the third-step variants are designed to upload the “.rar” files collected to
Dropbox from “C:\ProgramData\NetWorks\ZZ” on the local machine. This operation
is performed as follows:

 * Connect to Dropbox using an embedded OAuth token, create a folder with a name
   matching that of the local machine.
 * Upload a small “host” file, which contains basic information about the local
   machine (machine name, user name, IP address, MAC address) encrypted with
   RC4.
 * Encrypt all “.rar” files with RC4 and upload them to Dropbox.
 * Remove all “.rar” files located in “C:\ProgramData\NetWorks\ZZ” on the local
   machine.

Along with the stack of implants described above, we have discovered a “.bat”
script file used to delete intermediate steps and artifacts in
“c:\Users\Public”. The script was probably used before updating the stack of
implants or if the threat actor decided to abandon an infected machine.

Batch CMD script used for cleanup


TOOLS FOR MANUAL EXFILTRATION OF STOLEN FILES

Along with various other implants, we discovered two tools used by the threat
actor for manual data exfiltration.


TOOL USED TO UPLOAD FILES TO YANDEX DISK

One tool, named “AuditSvc.exe”, was designed for uploading and downloading
arbitrary files to and from Yandex Disk. The OAuth token, file path and some
other parameters could be passed as command line arguments. Alternatively, the
parameters could be defined in a config file named “MyLog.ini”. 

Tool used to upload data to Yandex Disk


TOOL USED TO UPLOAD FILES TO TEMPORARY FILE SHARING SERVICES

The second tool discovered, named “transfer.exe”, was designed to upload and
download arbitrary files to and from any of 16 supported temporary file sharing
services.

Service URL address imgonl(onl) https://img[.]onl/api/upload.php litterbox(lit)
https://litterbox.catbox[.]moe/resources/internals/api.php imgbb(ibb)
https://imgbb[.]com/ transfer(trs) https://transfer[.]sh schollz
https://share.schollz[.]com null(0x0) https://0x0[.]st/ tinyimg(tin)
https://tinyimg[.]io/upload gifyu(gif) https://gifyu[.]com/ imgshare(ims)
https://imgshare[.]io/ imgpile(imp) https://imgpile[.]com/ zippyimage(zip)
https://zippyimage[.]com/ extraimage(ext) https://extraimage[.]info/
picpaster(pic) https://upload.picpaste[.]me/ imaurupload(imu)
https://imgurupload[.]org sm.ms(sms) https://sm[.]ms/api/v2/upload
easycaptures(esy) https://easycaptures[.]com/upload_file_new.php

Along with various parameters designed for flexibility and optimization, the
tool can generate and use a client-side RSA key.

Commands and parameters accepted by “transfer.exe”

After uploading data, the tool creates a JSON file with the “upload_” prefix,
which contains a URL generated by the file sharing service to access the data
stored.

JSON log produced by the tool

The threat actor most probably used the tool manually or semi-manually to upload
logs and other files to file sharing services, while the resulting JSON
containing URLs could be uploaded by any of the first-stage implants described
in the first part of the article or by the implant designed to send a single
file, “111.log”, as an email attachment via the Yandex email service (that
implant is described below).


IMPLANT USED TO UPLOAD FILES VIA THE YANDEX EMAIL SERVICE

The implant designed to send files via the Yandex email service was downloaded
from Yandex Disk. It was also statically linked with libcurl.dll.

The implant is designed to exfiltrate a single file located at the static path
“C:\Users\Public\Downloads\111.log” (which was hard-coded into the implant). The
“.log” file is sent as an attachment to an email with the text “Download the
attachment pls.”. The implant formatted the email body and used the
“curl_perform” API of libcurl.dll to send the email via smtp.yandex.ru on TCP
465.

The file “111.log” is most probably produced by one of the previous-stage
implants and can contain the output of CMD commands or URLs for files uploaded
to a temporary data sharing service by a tool described above.

Code fragment from the implant’s main function

After a single attempt to send an email, the implant terminates. Such straight
execution flow and the absence of persistence capabilities may mean that the
implant was expected to be used as a tool rather than a self-sufficient service.
Nevertheless, the threat actor may possibly have used a simple task scheduling
technique to make it persistent and to have it executed periodically, as in the
case of FourteenHi variant “E”. 


CONCLUSION

In this research we analyzed a broad set of implants used by the threat actor(s)
for remote access, to gather data and to upload data.

Abusing popular cloud-based data storages may allow the threat actor(s) to evade
security measures. At the same time, it opens up the possibility for stolen data
to be leaked a second time in the event that a third party gets access to a
storage used by the threat actor(s).


RECOMMENDATIONS

 * Install security software with support for centralized security policy
   management on all servers and workstations and keep the antivirus databases
   and program modules of your security solutions up-to-date.
 * Check that all security solution components are enabled on all systems and
   that a policy is in place which requires the administrator password to be
   entered in the event of attempts to disable protection.
 * Consider using Allowlisting and Application Control technologies to prevent
   unknown applications from being executed.
 * Check that Active Directory policies include restrictions on user attempts to
   log in to systems. Users should only be allowed to log in to those systems
   which they need to access in order to perform their job responsibilities.
 * Restrict network connections, including VPN, between systems on the OT
   network; block connections on all those ports the use of which is not
   required by the industrial process.
 * Use smart cards (tokens) or one-time codes as the second authentication
   factor when establishing a VPN connection. In cases where this is applicable,
   use the Access Control List (ACL) technology to restrict the list of IP
   addresses from which a VPN connection can be initiated.
 * Train employees of the enterprise to use the internet, email, and other
   communication channels securely and, specifically, explain the possible
   consequences of downloading and executing files from unverified sources.
 * Restrict the use of accounts with local administrator and domain
   administrator privileges, with the exception of cases where such privileges
   are necessary to perform the job responsibilities.
 * Consider using a password management solution to manage the passwords of
   local administrator accounts on all systems.
 * Enforce a password policy that has password complexity requirements and
   requires passwords to be changed on a regular basis.
 * Consider using Managed Detection and Response class services to gain quick
   access to high-level knowledge and expertise of security professionals.
 * Use dedicated protection for the industrial process. Kaspersky Industrial
   CyberSecurity protects industrial endpoints and enables network monitoring on
   the OT network to identify and block malicious activity.


APPENDIX I – INDICATORS OF COMPROMISE

Note: The indicators in this section are valid at the time of publication.

The full version of indicators of compromise, including Yara rules, is available
in a .ioc file on the Kaspersky Threat Intelligence portal.


STACK OF IMPLANTS USED TO UPLOAD FILES TO DROPBOX

MD5

Plain text
Copy to clipboard
Open code in new window
EnlighterJS 3 Syntax Highlighter
1A1B8EFE8D72984C4744662D2D233C02 (CrashReport.dll)
03C74722A8E6E5E7EA0A5ED0C9F23696 (a.exe)
19BC4620FB5DA10192676F01C3DC71B3 (cl.exe)
EE8AFC6F3BB68F86A64FC6389F2EDC3F (cl.exe)
F8553382DE7E1E349D8E91EDB7C57953 (cu.exe)
5137C61734E2096018CEE99149DAC009 (conhost.exe)
5660CB556D856D081A3DCD497549F47A (Rar2.exe)
976B59F170136B9C3C88BD9A8FC4CE4E (Rar3.exe)
D6CC6A4AF4720DAF8EEE0835D6E5D374 (Rar4.exe)
1A1B8EFE8D72984C4744662D2D233C02 (CrashReport.dll)
03C74722A8E6E5E7EA0A5ED0C9F23696 (a.exe) 19BC4620FB5DA10192676F01C3DC71B3
(cl.exe) EE8AFC6F3BB68F86A64FC6389F2EDC3F (cl.exe)
F8553382DE7E1E349D8E91EDB7C57953 (cu.exe) 5137C61734E2096018CEE99149DAC009
(conhost.exe) 5660CB556D856D081A3DCD497549F47A (Rar2.exe)
976B59F170136B9C3C88BD9A8FC4CE4E (Rar3.exe) D6CC6A4AF4720DAF8EEE0835D6E5D374
(Rar4.exe)


1A1B8EFE8D72984C4744662D2D233C02 (CrashReport.dll)
03C74722A8E6E5E7EA0A5ED0C9F23696 (a.exe)
19BC4620FB5DA10192676F01C3DC71B3 (cl.exe)
EE8AFC6F3BB68F86A64FC6389F2EDC3F (cl.exe)
F8553382DE7E1E349D8E91EDB7C57953 (cu.exe)
5137C61734E2096018CEE99149DAC009 (conhost.exe)
5660CB556D856D081A3DCD497549F47A (Rar2.exe)
976B59F170136B9C3C88BD9A8FC4CE4E (Rar3.exe)
D6CC6A4AF4720DAF8EEE0835D6E5D374 (Rar4.exe)


TOOL USED TO UPLOAD FILES TO YANDEX DISK

MD5

Plain text
Copy to clipboard
Open code in new window
EnlighterJS 3 Syntax Highlighter
5C3A88073824A1BCE4359A7B69ED0A8D (AuditSvc.exe)
5C3A88073824A1BCE4359A7B69ED0A8D (AuditSvc.exe)


5C3A88073824A1BCE4359A7B69ED0A8D (AuditSvc.exe)


TOOL USED TO UPLOAD FILES TO TEMPORARY FILE SHARING SERVICES

MD5

Plain text
Copy to clipboard
Open code in new window
EnlighterJS 3 Syntax Highlighter
8BA9EE9FD6BD4B9304F7FB868CE975D8 (transfer.exe)
8BA9EE9FD6BD4B9304F7FB868CE975D8 (transfer.exe)


8BA9EE9FD6BD4B9304F7FB868CE975D8 (transfer.exe)

IP/URL

Plain text
Copy to clipboard
Open code in new window
EnlighterJS 3 Syntax Highlighter
img[.]onl/api/upload.php
litterbox.catbox[.]moe/resources/internals/api.php
imgbb[.]com
transfer[.]sh
share.schollz[.]com
0x0[.]st/
tinyimg[.]io/upload
gifyu[.]com/
imgshare[.]io
imgpile[.]com/
zippyimage[.]com
extraimage[.]info
upload.picpaste[.]me
imgurupload[.]org
sm[.]ms/api/v2/upload
easycaptures[.]com/upload_file_new.php
img[.]onl/api/upload.php litterbox.catbox[.]moe/resources/internals/api.php
imgbb[.]com transfer[.]sh share.schollz[.]com 0x0[.]st/ tinyimg[.]io/upload
gifyu[.]com/ imgshare[.]io imgpile[.]com/ zippyimage[.]com extraimage[.]info
upload.picpaste[.]me imgurupload[.]org sm[.]ms/api/v2/upload
easycaptures[.]com/upload_file_new.php


img[.]onl/api/upload.php
litterbox.catbox[.]moe/resources/internals/api.php
imgbb[.]com
transfer[.]sh
share.schollz[.]com
0x0[.]st/
tinyimg[.]io/upload
gifyu[.]com/
imgshare[.]io
imgpile[.]com/
zippyimage[.]com
extraimage[.]info
upload.picpaste[.]me
imgurupload[.]org
sm[.]ms/api/v2/upload
easycaptures[.]com/upload_file_new.php


IMPLANT USED TO UPLOAD FILES VIA THE YANDEX EMAIL SERVICE

MD5

Plain text
Copy to clipboard
Open code in new window
EnlighterJS 3 Syntax Highlighter
971B0687C8281778B28721239801084E (qclite.dll)
971B0687C8281778B28721239801084E (qclite.dll)


971B0687C8281778B28721239801084E (qclite.dll)


APPENDIX II – MITRE ATT&CK MAPPING

The table below contains all the TTPs identified in the analysis of the activity
described in this report.

Tactic Technique Number Technique Name and Description Initial Access T1566.001
Phishing: Spearphishing Attachment
Threat actors used lure documents to deploy off-the-shelf spyware. Execution
T1204.002 User Execution: Malicious File
A system is infected when the user runs the malware believing it to be a
legitimate document. T1059.003 Command and Scripting Interpreter: Windows
Command Shell
Uses cmd.exe to execute multiple commands. T1106 Native API
Uses CreateProcessW function to execute Windows Command Line T1053.005 Scheduled
Task/Job: Scheduled Task
Malware is executed via a Windows task created by the threat actor. Persistence
T1547.001 Registry Run Keys / Startup Folder:
Malware achieves persistence by adding itself to the Registry as a startup
program. T1543.003 Create or Modify System Process: Windows Service
Installs itself as a service to achieve persistence. T1053.005 Scheduled
Task/Job: Scheduled Task
Malware is executed via a Windows task created by the threat actor. Defense
Evasion T140 Deobfuscate/Decode Files or Information
Uses an RC4 key to decrypt the malware configuration as well as communication.
T1055.002 Process Injection: Portable Executable Injection
Malware injects itself into various legitimate processes upon execution
(msiexec.exe, svchost.exe). T1497.001 System Checks
Employs various system checks to detect and avoid virtualization and analysis
environments. T1497.003 Time Based Evasion
Employs various time-based methods to detect and avoid virtualization and
analysis environments. T1574.002 Hijack Execution Flow: DLL Side-Loading
Threat actors abused a legitimate application binary to load a malicious DLL.
Discovery T1083 File and Directory Discovery
The malware attempts to discover files of various types (.doc, .docx, .xls,
.xlsx, .ppt, .pptx, .pdf, .rtf, .eml). T1016 System Network Configuration
Discovery
Threat actors use the netstat and ipconfig utilities to get local network
interface configuration and enumerate open ports. T1033 System Owner/User
Discovery
Threat actors use the systeminfo, whoami, and net utilities to get information
about the user and the infected system. T1057 Process Discovery
Threat actors use tasklist to enumerate running processes. Command and Control
T1071.001 Application Layer Protocol: Web Protocols
Malware uses HTTPS and raw TCP for communication with C2. T1573.001 Encrypted
Channel: Symmetric Cryptography
Malware uses RC4 and SSL TLS v3 (by libssl.dll) to encrypt communication.
Credential Access T1003.004 OS Credential Dumping: Cached Domain Credentials
Threat actors use Mimikatz and Reg to extract cached credentials. Collection
T1005 Data from Local System
Malware designed to collect and exfiltrate arbitrary data, including air-gapped
systems, by abusing removable devices. Exfiltration T1041 Exfiltration Over C2
Channel
Threat actors exfiltrate data using Dropbox, Yandex Disk, Yandex email and
temporary file sharing services as a C2 channel

Authors

 * Kirill Kruglov
   
   Senior Research Developer, Kaspersky ICS CERT

 * Vyacheslav Kopeytsev
   
   Senior Security Researcher, Kaspersky ICS CERT

 * Artem Snegirev
   
   Security Researcher, Kaspersky ICS CERT

DLL hijacking
FourteenHi
cloud services
APT
 * 
 * 
 * 
 * 

DLL hijacking
FourteenHi
cloud services
APT
Download PDF

See also

 * Common TTPs of attacks against industrial organizations. Implants for
   gathering data
   
   31 July 2023

 * Common TTPs of attacks against industrial organizations. Implants for remote
   access
   
   20 July 2023

 * Why APTs are so successful – stories from IR trenches
   
   30 May 2023

Back to top

See also

 * Common TTPs of attacks against industrial organizations. Implants for
   gathering data
   
   31 July 2023

 * Common TTPs of attacks against industrial organizations. Implants for remote
   access
   
   20 July 2023

 * Why APTs are so successful – stories from IR trenches
   
   30 May 2023

Подписка на рассылку E-mail

Данные по уязвимостямо
Информация об угрозах
I agree to provide my contact information to Kaspersky Lab (first name, last
name, email address, phone, country postal code) to be contacted by Kaspersky
Lab sales representatives by phone for a personalized offer that could be based,
in particular, on geography and company size information provided; to receive
information via email about Kaspersky Lab products and services including
promotional offers, product updates and premium assets like white papers,
webcasts, videos, events etc.; to participate in surveys to vocalize opinion on
various aspects of Kaspersky Lab business, in particular, about products, and
technical support. I understand that I can withdraw this consent at any time via
unsubscribe link from email or via Privacy Policy


Подписаться

A global project run by Kaspersky to coordinate the efforts of industrial
automation system vendors and industrial facility owners and operators.

   RSS feed

 * Publications
 * Services
 * Advisories
 * Statistics
 * Events
 * About

Download PGP/GPG key

Authorized to Use CERT™

CERT is a mark owned by
Carnegie Mellon University

© 2023 AO Kaspersky Lab

Privacy policy
If you have any questions remaining, please email us at ics-cert@kaspersky.com



We use cookies to make your experience of our websites better. By using and
further navigating this website you accept this. Detailed information about the
use of cookies on this website is available by clicking on more information.

Accept and Close
We'd like to show you notifications for the latest news and updates.


AllowCancel