A well-coordinated cyber intrusion, spanning 11 days, culminated in the deployment of LockBit ransomware across a corporate environment.
The attack, which began with the execution of a malicious file posing as a Windows Media Configuration Utility, displayed a sophisticated playbook leveraging Cobalt Strike, advanced persistence mechanisms, lateral movement, data exfiltration tools, and an eventual ransomware payload.
The attack commenced in January 2024 with a targeted phishing lure.
The victim downloaded and executed a malicious file (setup_wm.exe
) mimicking the Windows Media Configuration Utility.
This file acted as a loader for a Cobalt Strike beacon, a prominent threat actor tool for post-exploitation, establishing an initial Command and Control (C2) connection.
Within 30 minutes, the attackers escalated their foothold, deploying discovery commands to identify domain controllers and leveraging elevated privileges of the compromised user.
The attackers installed two proxy tools, SystemBC and GhostSOCKS, on the domain controller.
While GhostSOCKS was detected and blocked by Windows Defender, SystemBC remained operational, enabling continued command and control communications.
Sophisticated persistence techniques were observed throughout the intrusion.
Scheduled tasks were widely deployed to trigger malicious binaries like SystemBC and GhostSOCKS.
Additionally, registry-based run keys ensured the automatic execution of payloads on user login.
To evade detection, the adversaries manipulated group policies to disable Windows Defender protections and employed process injection techniques to blend malicious activities into legitimate processes such as WUAUCLT.exe
.
The attackers demonstrated advanced lateral movement capabilities. Using Remote Desktop Protocol (RDP), Windows Remote Management (WinRM), and SMB, they spread across the network, deploying secondary payloads on file servers and backup servers.
Notably, they leveraged tools such as Rclone for data exfiltration. Despite initial failed attempts to use FTP servers for exfiltration, the adversaries pivoted to Mega.io, achieving large-scale data transfers over 16 hours.
The attackers also accessed sensitive documents containing stored credentials and executed scripts like Veeam-Get-Creds.ps1
to extract backup software passwords.
They employed reconnaissance tools such as Seatbelt and SharpView to map the Active Directory environment and identify high-value targets.
After a 15-hour operational lull, the attackers shifted focus to their objective—ransomware deployment.
On the eleventh day, they staged the LockBit ransomware binary on a backup server and executed batch scripts to propagate the payload across all networked Windows hosts.
Tools like PsExec and WMI were used to distribute and execute the ransomware, while additional scripts disabled security mechanisms such as Windows Defender.
According to The DFIR Report, the deployment achieved complete encryption of targeted hosts within two hours.
Affected systems displayed a ransom note from LockBit, instructing victims to initiate negotiations.
This operation highlights the evolving sophistication of ransomware campaigns, where attackers integrate data exfiltration with ransomware deployment, amplifying the pressure on victims.
Key indicators of compromise (IoCs) in this intrusion include:
compdatasystems.com
, retailadvertisingservices.com
The coordinated use of Cobalt Strike, persistence mechanisms, and advanced lateral movement tactics underscores the necessity of layered cybersecurity defenses.
Organizations are advised to implement active monitoring of scheduled tasks, registry changes, and network traffic, alongside regular patching and incident response simulations to mitigate such high-impact incidents.
Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free
Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a previously…
A groundbreaking technique for exploiting Windows systems has emerged, combining the "Bring Your Own Vulnerable…
Microsoft has taken a significant step toward enhancing cybersecurity by introducing a new phishing attack…
Apple has responded to a newly discovered zero-day vulnerability affecting its operating systems by releasing…
The masterminds behind the revolutionary network analyzer Wireshark have unveiled a new tool, Stratoshark, designed…
In a detailed analysis published on January 27, 2025, Zimperium's zLabs team uncovered a sophisticated…