www.microsoft.com
Open in
urlscan Pro
2a02:26f0:280:190::356e
Public Scan
Submitted URL: http://www.microsoft.com/en-us/security/blog/2024/05/28/moonstone-sleet-emerges-as-new-north-korean-threat-actor-with-new...
Effective URL: https://www.microsoft.com/en-us/security/blog/2024/05/28/moonstone-sleet-emerges-as-new-north-korean-threat-actor-with-new...
Submission: On June 05 via api from DE — Scanned from DE
Effective URL: https://www.microsoft.com/en-us/security/blog/2024/05/28/moonstone-sleet-emerges-as-new-north-korean-threat-actor-with-new...
Submission: On June 05 via api from DE — Scanned from DE
Form analysis
2 forms found in the DOMName: searchForm — GET https://www.microsoft.com/en-us/security/site-search
<form class="c-search" autocomplete="off" id="searchForm" name="searchForm" role="search" action="https://www.microsoft.com/en-us/security/site-search" method="GET" data-seautosuggest=""
data-seautosuggestapi="https://www.microsoft.com/msstoreapiprod/api/autosuggest"
data-m="{"cN":"GlobalNav_Search_cont","cT":"Container","id":"c3c1c9c2m1r1a1","sN":3,"aN":"c1c9c2m1r1a1"}" aria-expanded="false" style="overflow-x: visible;">
<div class="x-screen-reader" aria-live="assertive"></div>
<input id="cli_shellHeaderSearchInput" aria-label="Search Expanded" aria-autocomplete="list" aria-expanded="false" aria-controls="universal-header-search-auto-suggest-transparent" aria-owns="universal-header-search-auto-suggest-ul" type="search"
name="q" role="combobox" placeholder="Search Microsoft Security" data-m="{"cN":"SearchBox_nav","id":"n1c3c1c9c2m1r1a1","sN":1,"aN":"c3c1c9c2m1r1a1"}" data-toggle="tooltip"
data-placement="right" title="Search Microsoft Security" data-open="false" style="overflow-x: visible;">
<button id="search" aria-label="Search Microsoft Security" class="c-glyph" data-m="{"cN":"Search_nav","id":"n2c3c1c9c2m1r1a1","sN":2,"aN":"c3c1c9c2m1r1a1"}" data-bi-mto="true"
aria-expanded="false" style="overflow-x: visible;">
<span role="presentation" style="overflow-x: visible;">Search</span>
<span role="tooltip" class="c-uhf-tooltip c-uhf-search-tooltip" style="overflow-x: visible;">Search Microsoft Security</span>
</button>
<div class="m-auto-suggest" id="universal-header-search-auto-suggest-transparent" role="group" style="overflow-x: visible;">
<ul class="c-menu" id="universal-header-search-auto-suggest-ul" aria-label="Search Suggestions" aria-hidden="true" data-bi-dnt="true" data-bi-mto="true" data-js-auto-suggest-position="default" role="listbox" data-tel="jsll"
data-m="{"cN":"search suggestions_cont","cT":"Container","id":"c3c3c1c9c2m1r1a1","sN":3,"aN":"c3c1c9c2m1r1a1"}" style="overflow-x: visible;"></ul>
<ul class="c-menu f-auto-suggest-no-results" aria-hidden="true" data-js-auto-suggest-postion="default" data-js-auto-suggest-position="default" role="listbox" style="overflow-x: visible;">
<li class="c-menu-item" style="overflow-x: visible;"> <span tabindex="-1" style="overflow-x: visible;">No results</span></li>
</ul>
</div>
</form>
https://www.microsoft.com/en-us/security/blog/
<form role="search" id="searchform-1" action="https://www.microsoft.com/en-us/security/blog/" class="search-form" type="searchForm">
<meta itemprop="target" content="https://www.microsoft.com/en-us/security/blog/?s={s}">
<label for="searchform-1-field" class="sr-only"> Search the Microsoft security blog </label>
<div class="bg-white dark-bg-gray-900 dark-text-white dark-border-gray-700 border border-gray-300 d-flex">
<input itemprop="query-input" class="form-control form-control-sm border-0 flex-grow-1 h-100 py-2" type="search" id="searchform-1-field" name="s" placeholder="Search the blog" value="">
<button class="btn btn-link-secondary m-0 py-1" type="submit">
<span class="sr-only">Submit</span>
<span class="svg" aria-hidden="true">
<svg xmlns="http://www.w3.org/2000/svg" width="13" height="12" fill="none" viewBox="0 0 12 13">
<path fill="#4C4C51" d="M4.833.097a4.833 4.833 0 0 1 3.753 7.879l3.268 3.267a.5.5 0 0 1-.651.756l-.057-.049L7.88 8.683A4.833 4.833 0 1 1 4.833.097m0 1a3.833 3.833 0 1 0 0 7.666 3.833 3.833 0 0 0 0-7.666"></path>
</svg> </span>
</button>
</div>
</form>
Text Content
We use optional cookies to improve your experience on our websites, such as through social media connections, and to display personalized advertising based on your online activity. If you reject optional cookies, only cookies necessary to provide you the services will be used. You may change your selection by clicking “Manage Cookies” at the bottom of the page. Privacy Statement Third-Party Cookies Accept Reject Manage cookies Skip to main content Microsoft Microsoft Security Microsoft Security Microsoft Security * Home * Solutions * AI for cybersecurity * Cloud security * Cloud workload protection * Data security * Identity & network access * Privacy & risk management * Unified SecOps * XDR * Zero Trust * Products * Product families Product families * Microsoft Defender * Microsoft Entra * Microsoft Intune * Microsoft Priva * Microsoft Purview * Microsoft Sentinel * Security AI Security AI * Microsoft Copilot for Security * Identity & access Identity & access * Microsoft Entra ID (Azure Active Directory) * Microsoft Entra External ID * Microsoft Entra ID Governance * Microsoft Entra ID Protection * Microsoft Entra Internet Access * Microsoft Entra Private Access * Microsoft Entra Permissions Management * Microsoft Entra Verified ID * Microsoft Entra Workload ID * Microsoft Entra Domain Services * Azure Key Vault * SIEM & XDR SIEM & XDR * Microsoft Sentinel * Microsoft Defender for Cloud * Microsoft Defender XDR * Microsoft Defender for Endpoint * Microsoft Defender for Office 365 * Microsoft Defender for Identity * Microsoft Defender for Cloud Apps * Microsoft Security Exposure Management * Microsoft Defender Vulnerability Management * Microsoft Defender Threat Intelligence * Cloud security Cloud security * Microsoft Defender for Cloud * Microsoft Defender Cloud Security Posture Mgmt * Microsoft Defender External Attack Surface Management * Azure Firewall * Azure Web App Firewall * Azure DDoS Protection * GitHub Advanced Security * Endpoint security & management Endpoint security & management * Microsoft Defender for Endpoint * Microsoft Defender XDR * Microsoft Defender for Business * Microsoft Intune core capabilities * Microsoft Defender for IoT * Microsoft Defender Vulnerability Management * Microsoft Intune Advanced Analytics * Microsoft Intune Endpoint Privilege Management * Microsoft Intune Enterprise Application Management * Microsoft Intune Remote Help * Microsoft Cloud PKI * Risk management & privacy Risk management & privacy * Microsoft Purview Insider Risk Management * Microsoft Purview Communication Compliance * Microsoft Purview eDiscovery * Microsoft Purview Compliance Manager * Microsoft Purview Audit * Microsoft Priva Risk Management * Microsoft Priva Subject Rights Requests * Information protection Information protection * Microsoft Purview Information Protection * Microsoft Purview Data Lifecycle Management * Microsoft Purview Data Loss Prevention * Services * Microsoft Security Experts * Microsoft Defender Experts for XDR * Microsoft Defender Experts for Hunting * Microsoft Incident Response * Microsoft Security Enterprise Services * Partners * Resources * Get started Get started * Cybersecurity awareness * Customer stories * Security 101 * Product trials * How we protect Microsoft * Reports and analysis Reports and analysis * Industry recognition * Microsoft Security Insider * Microsoft Digital Defense Report * Security Response Center * Community Community * Microsoft Security Blog * Microsoft Security Events * Microsoft Tech Community * Documentation and training Documentation and training * Documentation * Technical Content Library * Training & certifications * Additional sites Additional sites * Compliance Program for Microsoft Cloud * Microsoft Trust Center * Security Engineering Portal * Service Trust Portal * Microsoft Secure Future Initiative * Contact Sales * Start free trial * More * All Microsoft * GLOBAL * Microsoft Security * Azure * Dynamics 365 * Microsoft 365 * Microsoft Teams * Windows 365 * Tech & innovation Tech & innovation * Microsoft Cloud * AI * Azure Space * Mixed reality * Microsoft HoloLens * Microsoft Viva * Quantum computing * Sustainability * Industries Industries * Education * Automotive * Financial services * Government * Healthcare * Manufacturing * Retail * All industries * Partners Partners * Find a partner * Become a partner * Partner Network * Find an advertising partner * Become an advertising partner * Azure Marketplace * AppSource * Resources Resources * Blog * Microsoft Advertising * Developer Center * Documentation * Events * Licensing * Microsoft Learn * Microsoft Research * View Sitemap Search Search Microsoft Security * No results Cancel Light Dark 1. Blog home 2. Threat intelligence Search the Microsoft security blog Submit * Research * Threat intelligence * Microsoft Defender for Endpoint * Threat actors 14 min read MOONSTONE SLEET EMERGES AS NEW NORTH KOREAN THREAT ACTOR WITH NEW BAG OF TRICKS * By Microsoft Threat Intelligence May 28, 2024 * * * * Microsoft Defender * Microsoft Defender Threat Intelligence * Microsoft Defender XDR * Microsoft Sentinel * Attacker techniques, tools, and infrastructure * Ransomware * Sleet more Microsoft has identified a new North Korean threat actor, now tracked as Moonstone Sleet (formerly Storm-1789), that uses both a combination of many tried-and-true techniques used by other North Korean threat actors and unique attack methodologies to target companies for its financial and cyberespionage objectives. Moonstone Sleet is observed to set up fake companies and job opportunities to engage with potential targets, employ trojanized versions of legitimate tools, create a fully functional malicious game, and deliver a new custom ransomware. DeTankWar Malicious tank game Moonstone Sleet uses tactics, techniques, and procedures (TTPs) also used by other North Korean threat actors over the last several years, highlighting the overlap among these groups. While Moonstone Sleet initially had overlaps with Diamond Sleet, the threat actor has since shifted to its own infrastructure and attacks, establishing itself as a distinct, well-resourced North Korean threat actor. FakePenny Moonstone Sleet ransomware This blog describes several notable TTPs used by this threat actor as well as recommendations to defend against related attacks. As with any observed nation-state actor activity, Microsoft directly notifies customers that have been targeted or compromised, providing them with the necessary information to secure their environments. PROTECTION INFO Get mitigation, detection, and hunting guidance WHO IS MOONSTONE SLEET? Moonstone Sleet is a threat actor behind a cluster of malicious activity that Microsoft assesses is North Korean state-aligned and uses both a combination of many tried-and-true techniques used by other North Korean threat actors and unique attack methodologies. When Microsoft first detected Moonstone Sleet activity, the actor demonstrated strong overlaps with Diamond Sleet, extensively reusing code from known Diamond Sleet malware like Comebacker and using well-established Diamond Sleet techniques to gain access to organizations, such as using social media to deliver trojanized software. However, Moonstone Sleet quickly shifted to its own bespoke infrastructure and attacks. Subsequently, Microsoft has observed Moonstone Sleet and Diamond Sleet conducting concurrent operations, with Diamond Sleet still utilizing much of its known, established tradecraft. Moonstone Sleet has an expansive set of operations supporting its financial and cyberespionage objectives. These range from deploying custom ransomware to creating a malicious game, setting up fake companies, and using IT workers. MOONSTONE SLEET TRADECRAFT Microsoft has observed Moonstone Sleet using the TTPs discussed in the following sections in various campaigns. TROJANIZED PUTTY In early August 2023, Microsoft observed Moonstone Sleet delivering a trojanized version of PuTTY, an open-source terminal emulator, via apps like LinkedIn and Telegram as well as developer freelancing platforms. Often, the actor sent targets a .zip archive containing two files: a trojanized version of putty.exe and url.txt, which contained an IP address and a password. If the provided IP and password were entered by the user into the PuTTY application, the application would decrypt an embedded payload, then load and execute it. Notably, before Moonstone Sleet used this initial access vector, Microsoft observed Diamond Sleet using a similar method – trojanized PuTTY and SumatraPDF — with comparable techniques for anti-analysis, as we reported in 2022: Figure 1. Code from PuTTY executable The trojanized PuTTY executable drops a custom installer which kicks off execution of a series of stages of malware, as described below: 1. Stage 1 – Trojanized PuTTY: Decrypts, decompresses, and then executes the embedded stage 2 payload. 2. Stage 2 – SplitLoader installer/dropper: Decrypts, decompresses, and writes the Stage 3 payload, the SplitLoader DLL file, to disk. The installer also drops two encrypted files to disk, then executes SplitLoader via a scheduled task or registry run key. 3. Stage 3 – SplitLoader:Decrypts and decompresses the two encrypted files dropped by the stage 2 payload, then combines them to create the next-stage, another portable executable (PE) file. 4. Stage 4 – Trojan loader: Expects a compressed and encrypted PE file from the C2. Once received, the trojan loader decompresses, decrypts, and executes this file. Figure 2. Moonstone Sleet attack chain using trojanized PuTTY Microsoft has also observed Moonstone Sleet using other custom malware loaders delivered by PuTTY that behaved similarly and had argument overlap with previously observed Diamond Sleet malware artifacts, such as the following: MALICIOUS NPM PACKAGES Microsoft has observed Moonstone Sleet targeting potential victims with projects that used malicious npm packages. Often, the threat actor delivered these projects through freelancing websites or other platforms like LinkedIn. In one example, the threat actor used a fake company to send .zip files invoking a malicious npm package under the guise of a technical skills assessment. When loaded, the malicious package used curl to connect to an actor-controlled IP and drop additional malicious payloads like SplitLoader. In another incident, Moonstone Sleet delivered a malicious npm loader which led to credential theft from LSASS. Microsoft collaborated with GitHub to identify and remove repositories associated with this activity. MALICIOUS TANK GAME Since February 2024, Microsoft has observed Moonstone Sleet infecting devices using a malicious tank game it developed called DeTankWar (also called DeFiTankWar, DeTankZone, or TankWarsZone). DeTankWar is a fully functional downloadable game that requires player registration, including username/password and invite code. In this campaign, Moonstone Sleet typically approaches its targets through messaging platforms or by email, presenting itself as a game developer seeking investment or developer support and either masquerading as a legitimate blockchain company or using fake companies. To bolster the game’s superficial legitimacy, Moonstone Sleet has also created a robust public campaign that includes the websites detankwar[.]com and defitankzone[.]com, and many X (Twitter) accounts for the personas it uses to approach targets and for the game itself. Figure 3. Example of a Moonstone Sleet X (Twitter) account for its DeTankWar game Moonstone Sleet used a fake company called C.C. Waterfall to contact targets. The email presented the game as a blockchain-related project and offered the target the opportunity to collaborate, with a link to download the game included in the body of the message. More details about C.C. Waterfall and another fake company that Moonstone Sleet set up to trick targets are included below: Figure 4. Moonstone Sleet using CC Waterfall to email a link to their game When targeted users launch the game, delfi-tank-unity.exe, additional included malicious DLLs are also loaded. The payload is a custom malware loader that Microsoft tracks as YouieLoad. Similarly to SplitLoader, YouieLoad loads malicious payloads in memory and creates malicious services that perform functions such as network and user discovery and browser data collection. For compromised devices of particular interest to the group, the threat actor launches hands-on-keyboard commands with further discovery and conducts credential theft. Figure 5. Page from the DeTankWar website RANSOMWARE RANSOMWARE AND EXTORTION Learn how you can better protect your organization In April 2024, Microsoft observed Moonstone Sleet delivering a new custom ransomware variant we have named FakePenny against a company it previously compromised in February. FakePenny includes a loader and an encryptor. Although North Korean threat actor groups have previously developed custom ransomware, this is the first time we have observed this threat actor deploying ransomware. Microsoft assesses that Moonstone Sleet’s objective in deploying the ransomware is financial gain, suggesting the actor conducts cyber operations for both intelligence collection and revenue generation. Of note, the ransomware note dropped by FakePenny closely overlaps with the note used by Seashell Blizzard in its malware NotPetya. The ransom demand was $6.6M USD in BTC. This is in stark contrast to the lower ransom demands of previous North Korea ransomware attacks, like WannaCry 2.0 and H0lyGh0st. Figure 6. FakePenny ransomware note Figure 7. NotPetya ransomware note FAKE COMPANIES Since January 2024, Microsoft has observed Moonstone Sleet creating several fake companies impersonating software development and IT services, typically relating to blockchain and AI. The actor has used these companies to reach out to potential targets, using a combination of created websites and social media accounts to add legitimacy to their campaigns. STARGLOW VENTURES From January to April 2024, Moonstone Sleet’s fake company StarGlow Ventures posed as a legitimate software development company. The group used a custom domain, fake employee personas, and social media accounts, in an email campaign targeting thousands of organizations in the education and software development sectors. In the emails Moonstone Sleet sent as part of this campaign, the actor complimented the work of the targeted organization and offered collaboration and support for upcoming projects, citing expertise in the development of web apps, mobile apps, blockchain, and AI. Figure 8. Example of an email from Moonstone Sleet’s StarGlow Ventures campaign These emails also contained a 1×1 tracking pixel, which likely enabled Moonstone Sleet to track which targets engaged with the emails, and a link to a dummy unsubscribe page hosted on the StarGlow Ventures domain. While the emails did not contain any malicious links, Microsoft assesses Moonstone Sleet likely used this campaign to establish a relationship with target organizations. Although the purpose of these relationships is unclear, they may afford the actor access to organizations of interest or be used as revenue generation opportunities. Microsoft notified customers who were impacted by this Moonstone Sleet campaign. Figure 9. Unsubscribe page on the StarGlow Ventures website Figure 10. Informational pages for the StarGlow Ventures website C.C. WATERFALL In a similar campaign, Moonstone Sleet sent emails using its fake company C.C. Waterfall, a purported IT consulting organization. Figure 11. The landing page for C.C. Waterfall In this campaign, Moonstone Sleet emailed higher education organizations, claiming the company was either hiring new developers or looking for business collaboration opportunities. This campaign likely had similar goals to the StarGlow Ventures campaign: to build relationships with organizations which could be leveraged for revenue generation or malicious access. Figure 12. Example of an email from C.C. Waterfall As previously mentioned, Moonstone Sleet also used C.C. Waterfall to contact targets and invite them to download the actor’s tank game, highlighting that this is a coordinated and concerted effort for which Moonstone Sleet can leverage multiple facets of its operations in overlapping campaigns. WORK-FOR-HIRE In addition to creating fake companies, Microsoft has observed Moonstone Sleet pursuing employment in software development positions at multiple legitimate companies. This activity could be consistent with previous reporting from the United States Department of Justice that North Korea was using highly skilled remote IT workers to generate revenue. On the other hand, this Moonstone Sleet activity may also be another approach to gaining access to organizations. MOONSTONE SLEET TARGETS Moonstone Sleet’s primary goals appear to be espionage and revenue generation. Targeted sectors to date include both individuals and organizations in the software and information technology, education, and defense industrial base sectors. SOFTWARE COMPANIES AND DEVELOPERS Since early January 2024, Moonstone Sleet has used the above fake software development companies to solicit work or cooperation. This actor has also targeted individuals looking for work in software development, sending candidates a “skills test” that instead delivers malware via a malicious NPM package. AEROSPACE In early December 2023, we observed Moonstone Sleet compromising a defense technology company to steal credentials and intellectual property. In April 2024, the actor ransomed the organization using FakePenny. The same month, we observed Moonstone Sleet compromise a company that makes drone technology. In May 2024, the threat actor compromised a company that makes aircraft parts. FITTING INTO THE NORTH KOREAN THREAT ACTOR LANDSCAPE Sleet Actors Read about North Korean threat actors Moonstone Sleet’s diverse set of tactics is notable not only because of their effectiveness, but because of how they have evolved from those of several other North Korean threat actors over many years of activity to meet North Korean cyber objectives. For example, North Korea has for many years maintained a cadre of remote IT workers to generate revenue in support of the country’s objectives. Moonstone Sleet’s pivot to conduct IT work within its campaigns indicates it may not only be helping with this strategic initiative, but possibly also expanding the use of remote IT workers beyond just financial gain. Additionally, Moonstone Sleet’s addition of ransomware to its playbook, like another North Korean threat actor, Onyx Sleet, may suggest it is expanding its set of capabilities to enable disruptive operations. Microsoft reported on Onyx Sleet’s and Storm-0530’s h0lyGhost ransomware in 2022. Moonstone Sleet’s ability to conduct concurrent operations across multiple campaigns, the robustness of the malicious game, and the use of a custom new ransomware variant are strong indications that this threat actor may be well-resourced. Moreover, given that Moonstone Sleet’s initial attacks mirrored Diamond Sleet methodologies and heavily reused Diamond Sleet’s code in their payloads, Microsoft assesses this actor is equipped with capabilities from prior cyber operations conducted by other North Korean actors. Microsoft has identified several techniques used by Moonstone Sleet that have previously been used by other North Korean threat actors. For example, since late 2023, an actor that Microsoft tracks as Storm-1877 used malicious npm packages in a campaign targeting software developers with JavaScript-based malware. This campaign was reported publicly by PaloAlto as Contagious Interview. Additionally, in 2023, GitHub reported that Jade Sleet used malicious npm packages in a campaign consisting of fake developer and recruiter personas that operated on LinkedIn, Slack, and Telegram. This shared use of a relatively uncommon tactic across multiple distinct North Korean groups may suggest sharing of expertise and TTPs among North Korean threat actors. In recent months, Microsoft and other security researchers have reported on North Korean threat actors’ use of software supply chain attacks to conduct widespread malicious operations. In November 2023, Microsoft reported on Diamond Sleet’s supply chain compromise of CyberLink, a multimedia application. While Microsoft has not yet identified any Moonstone Sleet supply chain attacks, the actor has extensively targeted software development firms in its campaigns. Large-scale access to software companies would pose a particularly high risk for future supply chain attacks against those organizations. Moonstone Sleet’s appearance is an interesting development considering that North Korea has carried out a series of changes in its foreign relations and security apparatus. In November 2023, North Korea closed embassies in several countries, and in March 2024, may have dissolved the United Front Department (UFD), an agency believed to be responsible for reunification and propaganda. Despite being new, Moonstone Sleet has demonstrated that it will continue to mature, develop, and evolve, and has positioned itself to be a preeminent threat actor conducting sophisticated attacks on behalf of the North Korean regime. RECOMMENDATIONS Microsoft recommends the following mitigations defend against attacks by Moonstone Sleet: * Detect human-operated ransomware attacks with Microsoft Defender XDR. * Enable controlled folder access. * Ensure that tamper protection is enabled in Microsoft Dender for Endpoint. * Enable network protection in Microsoft Defender for Endpoint. * Follow the credential hardening recommendations in our on-premises credential theft overview to defend against common credential theft techniques like LSASS access. * Run endpoint detection and response (EDR) in block mode so that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus does not detect the threat or when Microsoft Defender Antivirus is running in passive mode. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post-breach. * Configure investigation and remediation in full automated mode to let Microsoft Defender for Endpoint take immediate action on alerts to resolve breaches, significantly reducing alert volume. * Turn on cloud-delivered protection in Microsoft Defender Antivirus, or the equivalent for your antivirus product, to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block a majority of new and unknown variants. Microsoft Defender XDR customers can turn on the following attack surface reduction rule to prevent common attack techniques used by Moonstone Sleet. * Block executable content from email client and webmail * Block executable files from running unless they meet a prevalence, age, or trusted list criterion * Use advanced protection against ransomware * Block credential stealing from the Windows local security authority subsystem (lsass.exe) DETECTION DETAILS MICROSOFT DEFENDER ANTIVIRUS Microsoft Defender Antivirus detects threat components as the following malware: * Behavior:Win64/PennyCrypt * HackTool:Win32/Mimikatz * HackTool:Win64/Mimikatz * TrojanDropper:Win32/SplitLoader * TrojanDropper:Win64/YouieLoad MICROSOFT DEFENDER FOR ENDPOINT Alerts with the following titles in the security center can indicate threat activity on your network: * Moonstone Sleet actor activity detected * Suspicious activity linked to a North Korean state-sponsored threat actor has been detected * Diamond Sleet Actor activity detected The following alerts might also indicate threat activity associated with this threat. These alerts, however, can be triggered by unrelated threat activity and are not monitored in the status cards provided with this report. * Malicious credential theft tool execution detected * Mimikatz credential theft tool * Ransomware-linked threat actor detected * Suspicious access to LSASS service HUNTING QUERIES MICROSOFT DEFENDER XDR Microsoft Defender XDR customers can run the following query to find related activity in their networks: Detect Procdump dumping LSASS credentials: DeviceProcessEvents | where (FileName has_any ("procdump.exe", "procdump64.exe") and ProcessCommandLine has "lsass") or (ProcessCommandLine has "lsass.exe" and (ProcessCommandLine has "-accepteula" or ProcessCommandLine contains "-ma")) Detect connectivity with C2 infrastructure: let c2servers = dynamic(['mingeloem.com','matrixane.com']); DeviceNetworkEvents | where RemoteUrl has_any (c2servers) | project DeviceId, LocalIP, DeviceName, RemoteUrl, InitiatingProcessFileName, InitiatingProcessCommandLine, Timestamp Detect connectivity to DeTank websites: let c2servers = dynamic(['detankwar.com','defitankzone.com']); DeviceNetworkEvents | where RemoteUrl has_any (c2servers) | project DeviceId, LocalIP, DeviceName, RemoteUrl, InitiatingProcessFileName, InitiatingProcessCommandLine, Timestamp MICROSOFT SENTINEL Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with ‘TI map’) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the Microsoft Sentinel Content Hub to have the analytics rule deployed in their Sentinel workspace. Microsoft Sentinel customers can also use the queries below to detect activity detailed in this blog. This query detects the installation of a Windows service that contains artifacts from credential dumping tools such as Mimikatz: * Credential Dumping Tools – Service Installation This query detects the use of Procdump to dump credentials from LSASS memory: * Dump credential using procdump Microsoft Sentinel customers can also use the following query, which looks for Microsoft Defender AV detections related to the Moonstone Sleet. In Microsoft Sentinel, the SecurityAlerts table includes only the DeviceName of the affected device. This query joins the DeviceInfo table to connect other information such as device group, IP, signed-in users, etc., allowing analysts to have more context related to the alert, if available: let MoonStoneSleet_threats = dynamic(["Behavior:Win64/PennyCrypt", "HackTool:Win32/Mimikatz", "HackTool:Win64/Mimikatz ", "TrojanDropper:Win32/SplitLoader", "TrojanDropper:Win64/YouieLoad" ]); SecurityAlert | where ProviderName == "MDATP" | extend ThreatName = tostring(parse_json(ExtendedProperties).ThreatName) | extend ThreatFamilyName = tostring(parse_json(ExtendedProperties).ThreatFamilyName) | where ThreatName in~ (MoonStoneSleet_threats) or ThreatFamilyName in~ (MoonStoneSleet_threats) | extend CompromisedEntity = tolower(CompromisedEntity) | join kind=inner ( DeviceInfo | extend DeviceName = tolower(DeviceName) ) on $left.CompromisedEntity == $right.DeviceName | summarize arg_max(TimeGenerated, *) by DisplayName, ThreatName, ThreatFamilyName, PublicIP, AlertSeverity, Description, tostring(LoggedOnUsers), DeviceId, TenantId, CompromisedEntity, ProductName, Entities | extend HostName = tostring(split(CompromisedEntity, ".")[0]), DomainIndex = toint(indexof(CompromisedEntity, '.')) | extend HostNameDomain = iff(DomainIndex != -1, substring(CompromisedEntity, DomainIndex + 1), CompromisedEntity) | project-away DomainIndex | project TimeGenerated, DisplayName, ThreatName, ThreatFamilyName, PublicIP, AlertSeverity, Description, LoggedOnUsers, DeviceId, TenantId, CompromisedEntity, ProductName, Entities, HostName, HostNameDomain INDICATORS OF COMPROMISE Malicious files FileSHA-256 hashputty.exe (drops SplitLoader)f59035192098e44b86c4648a0de4078edbe80352260276f4755d15d354f5fc58putty.exe (drops SplitLoader)cb97ec024c04150ad419d1af2d1eb66b5c48ab5f345409d9d791db574981a3fb[random].dat (SplitLoader)39d7407e76080ec5d838c8ebca5182f3ac4a5f416ff7bda9cbc4efffd78b4ff5Package.db, thumbs.db (YouieLoad via npm)70c5b64589277ace59db86d19d846a9236214b48aacabbaf880f2b6355ab5260adb.bin, u.bin, Id.bin (YouieLoad)cafaa7bc3277711509dc0800ed53b82f645e86c195e85fbf34430bbc75c39c24data.tmp (YouieLoad)9863173e0a45318f776e36b1a8529380362af8f3e73a2b4875e30d31ad7bd3c1delfi-tank-unity.exef66122a3e1eaa7dcb7c13838037573dace4e5a1c474a23006417274c0c8608beDeTankWar.exe56554117d96d12bd3504ebef2a8f28e790dd1fe583c33ad58ccbf614313ead8c ecce739b556f26de07adbfc660a958ba2dca432f70a8c4dd01466141a6551146NVUnityPlugin.dll, Unityplayer.dll (YouieLoad via tank game)09d152aa2b6261e3b0a1d1c19fa8032f215932186829cfcca954cc5e84a6cc38 Moonstone Sleet domains bestonlinefilmstudio[.]orgblockchain-newtech[.]comccwaterfall[.]comchaingrown[.]comdefitankzone[.]comdetankwar[.]comfreenet-zhilly[.]orgmatrixane[.]compointdnt[.]comstarglowventures[.]commingeloem[.]com REFERENCES * Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors (Palo Alto Unit 42) * Security alert: social engineering campaign targets technology industry employees (Github) LEARN MORE For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog: https://aka.ms/threatintelblog. To get notified about new publications and to join discussions on social media, follow us on LinkedIn at https://www.linkedin.com/showcase/microsoft-threat-intelligence, and on X (formerly Twitter) at https://twitter.com/MsftSecIntel. To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast: https://thecyberwire.com/podcasts/microsoft-threat-intelligence. RELATED POSTS * * Research * Threat intelligence * Microsoft Defender XDR * Supply chain attacks Published Nov 22, 2023 7 min read DIAMOND SLEET SUPPLY CHAIN COMPROMISE DISTRIBUTES A MODIFIED CYBERLINK INSTALLER Microsoft has uncovered a supply chain attack by the threat actor Diamond Sleet (ZINC) involving a malicious variant of an application developed by CyberLink Corp. This malicious file is a legitimate CyberLink application installer that has been modified to include malicious code that downloads, decrypts, and loads a second-stage payload. The file, which was signed using a valid certificate issued to CyberLink Corp., is hosted on legitimate update infrastructure owned by the organization. * * Research * Threat intelligence * Microsoft Defender XDR * Vulnerabilities and exploits Published Oct 18, 2023 10 min read MULTIPLE NORTH KOREAN THREAT ACTORS EXPLOITING THE TEAMCITY CVE-2023-42793 VULNERABILITY Since early October 2023, Microsoft has observed North Korean nation-state threat actors Diamond Sleet and Onyx Sleet exploiting the Jet Brains TeamCity CVE-2023-42793 remote-code execution vulnerability. Given supply chain attacks carried out by these threat actors in the past, Microsoft assesses that this activity poses a particularly high risk to organizations who are affected. * * Research * Threat intelligence * Threat actors Published Sep 29, 2022 13 min read ZINC WEAPONIZING OPEN-SOURCE SOFTWARE In recent months, Microsoft detected weaponization of legitimate open-source software by an actor the Microsoft Threat Intelligence Center (MSTIC) tracks as ZINC, targeting employees at media, defense and aerospace, and IT service provider organizations in the US, UK, India, and Russia. * * Research * Threat intelligence * Threat actors Published Jul 14, 2022 13 min read NORTH KOREAN THREAT ACTOR TARGETS SMALL AND MIDSIZE BUSINESSES WITH H0LYGH0ST RANSOMWARE A group of actors originating from North Korea that MSTIC tracks as DEV-0530 has been developing and using ransomware in attacks since June 2021. This group, which calls itself H0lyGh0st, utilizes a ransomware payload with the same name. GET STARTED WITH MICROSOFT SECURITY Microsoft is a leader in cybersecurity, and we embrace our responsibility to make the world a safer place. Learn more CONNECT WITH US ON SOCIAL * * * What's new * Surface Pro * Surface Laptop * Surface Laptop Studio 2 * Surface Laptop Go 3 * Microsoft Copilot * Copilot in Windows * Explore Microsoft products * Windows 11 apps Microsoft Store * Account profile * Download Center * Microsoft Store support * Returns * Order tracking * Certified Refurbished * Microsoft Store Promise * Flexible Payments Education * Microsoft in education * Devices for education * Microsoft Teams for Education * Microsoft 365 Education * How to buy for your school * Educator training and development * Deals for students and parents * Azure for students Business * Microsoft Cloud * Microsoft Security * Dynamics 365 * Microsoft 365 * Microsoft Power Platform * Microsoft Teams * Copilot for Microsoft 365 * Small Business Developer & IT * Azure * Developer Center * Documentation * Microsoft Learn * Microsoft Tech Community * Azure Marketplace * AppSource * Visual Studio Company * Careers * About Microsoft * Company news * Privacy at Microsoft * Investors * Diversity and inclusion * Accessibility * Sustainability English (United States) Your Privacy Choices Opt-Out Icon Your Privacy Choices Your Privacy Choices Opt-Out Icon Your Privacy Choices Consumer Health Privacy * Sitemap * Contact Microsoft * Privacy * Manage cookies * Terms of use * Trademarks * Safety & eco * Recycling * About our ads * © Microsoft 2024 Notifications