Hackers Steal NTLMv2 Hashes using Custom Powershell Scripts

A new sophisticated stealing campaign named  “Steal-It”  has been discovered that exfiltrates NTLMv2 hashes using customized versions of Nishang’s Start-CaptureServer PowerShell script.

It is believed that the Steal-It campaign may be attributed to APT28 (aka Fancy Bear) based on its similarities with the APT28 cyber attack.

Fancy Bear is a Russian cyber espionage group that uses zero-day exploits, spear phishing, and malware to compromise targets.

Zscaler Threat Labs recently discovered the campaign’s tactics and infection chain and shared its report.

NTLMv2 Hash Stealing Infection Chain

The NTLMv2 hash stealing infection chain steals NTLMv2 hashes by utilizing a customized Nishang’s Start-CaptureServer PowerShell script and transmitting the stolen hashes via mocky APIs to Mockbin.

SystemInfo Stealing Infection Chain

The Systeminfo stealing infection chain uses the OnlyFans brand to entice users into downloading the later stages of the chain, which exfiltrate command outputs to Mockbin.

Fansly Whoami Exfil Infection Chain

The Fansly whoami exfil infection chain uses the Fansly brand to entice users into downloading the later stages of the chain, which exfiltrate command outputs to Mockbin. 

Windows Update Exfil Infection Chain

ZIP archive bundled with an LNK file that uses geofencing techniques to target users in Belgium unknowingly downloads multiple stages of a PowerShell script that executes system commands to collect basic information for nefarious purposes. 

Among all the infection chains, the threat actor utilized customized scripts from the Nishang framework to steal and exfiltrate NTLM hashes by executing system commands.

Finally, mock APIs are used to exfiltrate the captured data from the compromised device.

Explicit images of models are used to entice victims to execute the initial payload in The Fansly Whoami Exfil and Exfil Sysinfo OnlyFans infection chain.

Threat actors use a geofencing strategy specifically targeting regions including Australia, Poland, and Belgium. 

Mockbin API, an endpoint-generating tool, and mock APIs are used to transfer stolen data, such as NTLM hashes and command output.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

9 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

9 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

12 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

15 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

16 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

16 hours ago