By finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation. Read More
Related Posts
A week in security (March 18 – March 24)
A week in security (March 18 – March 24)
[[{“value”:”
Last week on Malwarebytes Labs:
New Go loader pushes Rhadamanthys stealer
Canada revisits decision to ban Flipper Zero
Patch Ivanti Standalone Sentry and Ivanti Neurons for ITSM now
19 million plaintext passwords exposed by incorrectly configured Firebase instances
Apex Legends Global Series plagued by hackers
Tax scammer goes after small business owners and self-employed people
The ‘AT&T breach’—what you need to know
Upcoming webinar: How a leading architecture firm approaches cybersecurity
Social media influencers targeted by identity thieves
Store manager admits SIM swapping his customers
Stay safe!
“}]] Read More
Malwarebytes
Hackers Deliver Weaponized LNK Files Through Legitimate Websites
Hackers Deliver Weaponized LNK Files Through Legitimate Websites
LNK files are shortcut files in Windows that link to a program or file. Hackers may exploit LNK files to deliver malicious payloads by disguising them as legitimate shortcuts, taking advantage of users who unknowingly click on them, and allowing for the execution of malicious code.
Over the years, malware distribution methods have evolved and become more sophisticated in the realm of cyber threats. Recent data analysis reveals that cybercriminals no longer rely solely on Microsoft Office document files to distribute malware.
Instead, there has been a significant increase in the use of Windows Help files (*.chm) and LNK files, which have become the preferred medium for delivering malware.
Recently, cybersecurity experts at AhnLab Security Emergency Response Center (ASEC) discovered a malware strain that was deceiving users into launching it by disguising itself as a different file name and propagating through hacked legitimate websites.
Document
Protect Your Storage With SafeGuard
Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard
StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.
Distributed File Names
Here below, we have mentioned all the distributed file names:-
Pomerium Project Related Inquiry Data.txt.lnk
Data Regarding Application for Changes Before the 2023 Iris Agreement.txt.lnk
Suyeon Oh Statement Data.txt.lnk
On Inquiry Confirmation.txt.lnk
Deep Brain AI Interview Guide.txt.lnk
Recruitment Related Information.txt.lnk
Weaponized LNK Files
The malware spreads via compressed files with identical names, urging users to download and run them. Hackers breach legit websites for distribution, favoring non-PE files for easy modification.
Identical file names (Source – ASEC)
To stay safe, users need EDR with behavior-based logging and detection as the threat hides in normally-operated websites.
The decompressed downloaded file spawns a disguised .txt.lnk file with a Notepad icon that houses:-
A script
A CAB file
The LNK file triggers the HTML script via mshta, leading to obfuscated VBS script execution. Both mshta commands from LNK and decrypted VBS script commands within HTML run sequentially.
The key actions involve PowerShell reading LNK file, dropping the embedded CAB file, and executing it via expand process. Detection focuses on the expanded process of decompressing the dropped CAB file.
Decompressed CAB script exhibits malicious features that we have mentioned below:-
Executes another script
Gathers system data
Registers in autorun
Sends data
Further actions involve downloading files, decoding, and executing via a command-line program known as “certutil,” among other features.
Threat actors trick the users into executing files with diverse names on breached legit websites, and this makes the malware downloads hard to detect.
Activate behavior detection in V3 endpoint anti-malware to spot such distribution methods. However, if infected then make sure to analyze the details via EDR and take necessary security measures to mitigate the threat.
IOCs
[Behavior Detection]
Execution/MDP.Powershell.M2514
Injection/EDR.Behavior.M3695
Fileless/EDR.Powershell.M11335
[File Detection]
Downloader/BAT.Agent.SC194060
Infostealer/BAT.Agent.SC194061
Downloader/BAT.Agent.SC194060
[HASH]
04d9c782702add665a2a984dfa317d49
453e8a0d9b6ca73d58d4742ddb18a736
8f3dcf4056be4d7c8adbaf7072533a0a
c2aee3f6017295410f1d92807fc4ea0d
Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.
The post Hackers Deliver Weaponized LNK Files Through Legitimate Websites appeared first on Cyber Security News.
Cyber Security News
Clorox says cyberattack caused $49 million in expenses
Clorox says cyberattack caused $49 million in expenses
Clorox has confirmed that a September 2023 cyberattack has so far cost the company $49 million in expenses related to the response to the incident. […] Read More
BleepingComputer