An organization in the DIB sector was compromised by state-funded hackers using a custom malware program, CovalentStealer, and the Impacket framework.
It took approximately ten months for the compromise to be resolved. There is a good chance that the organization was compromised by multiple APT groups. Last January, some of the perpetrators gained access to the victim’s Microsoft Exchange Server after they breached the victim’s security.
Defense Industrial Base Sector (DIB) entities are involved in the production, development, and provision of products and services that are required in support of military operations.
It has been recommended by the CISA, the FBI, and the NSA that critical infrastructure organizations and organizations in the DIB sector implement all the recommended mitigations.
Using the HyperBro RAT and more than a dozen samples of the ChinaChopper webshell, the hackers combined custom malware called CovalentStealer with Python classes from Impacket, an open-source Python library.
During the period when Microsoft released an emergency security update to resolve the set of four ProxyLogon vulnerabilities in Exchange Server, the threat actors also exploited them.
Here below we have mentioned those four ProxyLogon vulnerabilities:-
In mid-January of 2021, hackers were able to access the organization’s Exchange Server via an unknown access point and gain unauthorized access to the system.
For detection, the experts have recommended to following things:-
Ensure that your logs are monitored for unusual VPSs and VPN connections.
Make sure you are monitoring your account for any suspicious activity.
MAR-10365227-1 contains the YARA rules that need to be reviewed.
Make sure that no unauthorized software is installed on your computer.
Make sure that command-line activity is monitored for anomalous or known malicious activity.
The user accounts should be monitored for changes that are unauthorized.
Here below we have mentioned all the recommended mitigations:-
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…