Sunday, February 9, 2025
HomeCyber AttackHackers Weaponizing MSC Files In Targeted Attack Campaign

Hackers Weaponizing MSC Files In Targeted Attack Campaign

Published on

SIEM as a Service

Follow Us on Google News

Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that enable them to perform different administrative tasks on the target system. 

By mimicking legitimate files, MSC files can evade various security properties and access overview and control of the vulnerable system with privileges, consequently resulting in unauthorized access to its data and other malicious deeds.

Cybersecurity researchers at NTT recently identified that hackers are weaponizing the MSC files in targeted attack campaigns.

Hackers Weaponizing MSC Files

In late May 2024, DarkPeony took over the MSC file exploitation already reported on by Kimsuky through Operation Control Plug.

With ANYRUN You can Analyze any URL, Files & Email for Malicious Activity : Start your Analysis

These attacks could have been against military and government organizations in Myanmar, the Philippines, Mongolia as well as Serbia.

By taking advantage of the fact that MSC file abuse is not easily detected and is obscurely carried out, the attackers devised several stages for infection, in which deserves to be looked at

Attack flow (Source – NTT)

Operation Control Plug initiates its attack chain through malicious MSC files that, when opened, display a screen prompting users to click a link executing a PowerShell script. 

This script fetches and runs an MSI package containing a legitimate executable capable of DLL side-loading.

The side-loaded DLL decodes and loads a malicious DAT payload, ultimately deploying the PlugX malware. 

Threat actors abuse the innocuous-looking MSC (Microsoft Common Console Document) format by leveraging its “Console Taskpad” feature to camouflage malicious PowerShell commands as seemingly harmless links, tricking users into enabling the infection sequence.

Websites distributing MSI files with Operation Control Plug may use Cloudflare to control access, presumably to block researchers and analysis engines from accessing the MSI files while distributing them to targeted organizations. 

This article introduced DarkPeony’s Operation Control Plug, which uses MSC files as the starting point of attacks and infects computers with PlugX to carry out intrusions. 

Although there are few attacks using MSC files, they are used by multiple targeted attack groups and may become more active in the future.

Researchers recommend that you verify whether your organization can detect attacks.

IoCs

MSC File

  • 1cbf860e99dcd2594a9de3c616ee86c894d85145bc42e55f4fed3a31ef7c2292
  • 54549745868b27f5e533a99b3c10f29bc5504d01bd0792568f2ad1569625b1fd
  • f0aa5a27ea01362dce9ced3685961d599e1c9203eef171b76c855a3db41f1ec6
  • 8c9e1f17e82369d857e5bf3c41f0609b1e75fd5a4080634bc8ae7291ebe2186c
  • e81982e40ee5aaed85817343464d621179a311855ca7bcc514d70f47ed5a2c67

MSI File Download Site

  • versaillesinfo[.]com
  • lifeyomi[.]com
  • profilepimpz[.]com
  • lebohdc[.]com

PlugX C2 Server

  • shreyaninfotech[.]com
  • buyinginfo[.]org
  • gulfesolutions[.]com

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo 

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...