Saturday, April 13, 2024

Hackers Using a Custom Malware to Steal Sensitive Data From a U.S. Organization

An organization in the DIB sector was compromised by state-funded hackers using a custom malware program, CovalentStealer, and the Impacket framework.

It took approximately ten months for the compromise to be resolved. There is a good chance that the organization was compromised by multiple APT groups. Last January, some of the perpetrators gained access to the victim’s Microsoft Exchange Server after they breached the victim’s security.

Defense Industrial Base Sector (DIB) entities are involved in the production, development, and provision of products and services that are required in support of military operations.

It has been recommended by the CISA, the FBI, and the NSA that critical infrastructure organizations and organizations in the DIB sector implement all the recommended mitigations.

Use of custom malware

Using the HyperBro RAT and more than a dozen samples of the ChinaChopper webshell, the hackers combined custom malware called CovalentStealer with Python classes from Impacket, an open-source Python library.

During the period when Microsoft released an emergency security update to resolve the set of four ProxyLogon vulnerabilities in Exchange Server, the threat actors also exploited them.

Here below we have mentioned those four ProxyLogon vulnerabilities:-

  • CVE-2021-26855
  • CVE-2021-26857
  • CVE-2021-26858
  • CVE-2021-27065

In mid-January of 2021, hackers were able to access the organization’s Exchange Server via an unknown access point and gain unauthorized access to the system.


For detection, the experts have recommended to following things:-

Ensure that your logs are monitored for unusual VPSs and VPN connections.

Make sure you are monitoring your account for any suspicious activity.

MAR-10365227-1 contains the YARA rules that need to be reviewed.

Make sure that no unauthorized software is installed on your computer.

Make sure that command-line activity is monitored for anomalous or known malicious activity.

The user accounts should be monitored for changes that are unauthorized.


Here below we have mentioned all the recommended mitigations:-

  • In order to separate the network segments based on roles and functions, network segmentation must be implemented.
  • Identify similar systems and isolate them
  • Provide granular access control and policy restrictions through micro-segmentation
  • Ensure that the systems are kept up to date
  • Create a process for controlling configuration changes
  • Utilize cybersecurity analytics and visibility tools
  • Ensure that scripting languages are being used appropriately
  • Make sure that the number of remote access tools is limited
  • Protect network communications by using encrypted services
  • The administration services for clear text should be disabled
  • Ensure that sensitive data and resources are protected by stringent access controls.
  • Keep an eye on VPN logins to make sure that no suspicious activity is taking place
  • Ensure that the use of administrative accounts is closely monitored.
  • Check that no elevated privileges are assigned to standard user accounts

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates


Latest articles

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...

Hackers Employ Deepfake Technology To Impersonate as LastPass CEO

A LastPass employee recently became the target of an attempted fraud involving sophisticated audio...

Sisence Data Breach, CISA Urges To Reset Login Credentials

In response to a recent data breach at Sisense, a provider of data analytics...

DuckDuckGo Launches Privacy Pro: 3-in-1 service With VPN

DuckDuckGo has launched Privacy Pro, a new subscription service that promises to enhance user...

Cyber Attack Surge by 28%:Education Sector at High Risk

In Q1 2024, Check Point Research (CPR) witnessed a notable increase in the average...

Midnight Blizzard’s Microsoft Corporate Email Hack Threatens Federal Agencies: CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive concerning a...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles