The recent malware attack on an unnamed target was a primary wake-up call for companies worldwide. The IcedID malware has been wreaking havoc on businesses of all sizes, compromising their Active Directory domain and giving hackers access to sensitive information.
This time, however, the attack was particularly concerning because it was able to compromise the business’s entire Active Directory domain within just 24 hours. This is a concise amount of time for a malicious attack to gain complete access, showing just how sophisticated this new malware has become.
“Throughout the attack, the attacker followed a routine of recon commands, credential theft, lateral movement by abusing Windows protocols, and executing Cobalt Strike on the newly compromised host,” Cybereason researchers stated in a report published this week.
The said malware was first discovered in 2017 as a banking trojan. It is likely similar to Emotet, TrickBot, and Rasberry Robin.
A ZIP archive containing an ISO image file causes the IcedID payload to be executed, ultimately infecting the host. The malicious software establishes persistence on the host through a scheduled job. It connects to a remote server to obtain next-stage payloads, such as Cobalt Strike Beacon, for subsequent surveillance operations.
Additionally, it moves laterally throughout the network. Then, it executes the same Cobalt Strike Beacon in all those workstations. After that, it proceeds to install Atera agent, a legitimate remote administration tool, as a redundant remote access mechanism.
“Utilising IT tools like this allows attackers to create an additional ‘backdoor’ for themselves in the event their initial persistence mechanisms are discovered and remediated,” the researchers said.
“These tools are less likely to be detected by antivirus or EDR and are also more likely to be written off as false positives.”
The threat actor can then proceed laterally to a Windows Server with domain admin capabilities by using the Cobalt Strike Beacon as a conduit to download the C# program Rubeus for credential theft.
Other tools also include netscan.exe. It is a legitimate utility used in ransomware operations with the Atgera agent by Conti and LockBit.
The information is released at the same time as Team Cymru researchers are shedding further insight on the BackConnect (BC) protocol, which IcedID uses to supply additional functionality after compromise, including a VNC module that offers a remote-access channel.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...