Thursday, March 28, 2024

Hackers Launch Olympic Destroyer Malware to Attack Financial Organizations using Obfuscated Scripts to Evade Detection

Olympic Destroyer Malware raised again through weaponized documents and currently targeting various Financial Organization with upgraded capabilities and evade the detection of flying under the radar.

Olympic Destroyer is a self-replicating and self-modifying destructive network worm that spreads to reconnaissance and infiltration into target networks.

Few months before Lazarus Hacking Group actively spreading Olympic Destroyer malware which was targetted Olympics website and took down the IT systems.

Its current attack is focusing on Financial organizations in Russia and biological and chemical threat prevention laboratories in Europe and Ukraine.

Researchers believe that Lazarus APT that behind the Olympic Destroyer malware to be associated with North Korea.

It also spreading with sophisticated technique and they continue to use a non-binary executable infection vector and obfuscated scripts to evade detection.

Based on several target profiles and limited victim reports, researchers believe that the recent operation by Olympic Destroyer targets Russia, Ukraine, and several other European countries.

Olympic Destroyer Malware Infection Process

Olympic Destroyer using different technologies and very complex infection process with various scripts such as mixing VBA code, MS HTA, and more Powershell inside of the JScript.

Initially distributed through office document and it is heavily obfusticated, that contain embedded VBA macro which helps to execute the Powershell command.

Later it started the new obfuscated Powershell scriptlet via the command line which is used to rearranging the original code and protect all commands and strings such as the command and control (C2) server address.

                   Obfuscated command line Powershell scriptlet

Also, Attacker using some script that helps to disable Powershell script logging to avoid leaving traces. and second stages of the Payload also execute the another PowerShell script.

After the deobfuscation, it downloads the next stage payload from the same server address and the final payload is the Powershell Empire agent.

According to Kaspersky. Powershell Empire is free to post exploitation tool and its open-source framework written in Python and Powershell that allows fileless control of the compromised hosts, has a modular architecture and relies on encrypted communication.

This framework is widely used by penetration-testing companies in legitimate security tests for lateral movement and information gathering.

Also, Olympic Destroyer malware handled by an attacker using compromised web server to hosting and controlling malware.

Website

Latest articles

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...

ZENHAMMER – First Rowhammer Attack Impacting Zen-based AMD Platforms

Despite AMD's growing market share with Zen CPUs, Rowhammer attacks were absent due to...

Airbus to Acquire INFODAS to Strengthen its Cybersecurity Portfolio

Airbus Defence and Space plans to acquire INFODAS, a leading cybersecurity and IT solutions...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles