Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Security

7/9/2019
10:30 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

An Attack Using Only System Tools Is Not Invisible – You Just Have to Look Harder

Microsoft's team behind Windows Defender ATP has identified a new 'fileless' malware campaign that can bypass standard antivirus tools.

Microsoft's team behind Windows Defender ATP (the commercial version of the company's Windows Defender free antivirus) has identifieda new "fileless" malware campaign that can bypass standard antivirus tools. Andrea Lelli wrote up a blog post about how they did it.

Everything started when telemetry to WD ATP showed a sharp increase at the end of May/beginning of June in the use of the Windows Management Instrumentation Command-line (WMIC) tool to run a script (a technique that MITRE refers to XSL Script Processing), indicating a fileless attack. This was their first tip-off that something was going on.

They then found the object of all this was to install the backdoor called "Astaroth" directly into memory. The backdoor was first found in 2018. This info-stealing malware is known for stealing sensitive information such as credentials, keystrokes and other data, which it then exfiltrates and can send to a remote attacker. It was previously seen by Cybereason in a campaign against Brazilian and European users in February of this year.

Microsoft identified the path of attack thusly: "A malicious link in a spear-phishing email leads to an LNK file" they said. "When double-clicked, the LNK file causes the execution of the WMIC tool with the '/Format' parameter, which allows the download and execution of a JavaScript code. The JavaScript code in turn downloads payloads by abusing the Bitsadmin tool."

After the payload is decrypted into DLLs, the Regsvr32 tool is used to load one of the decoded DLLs, which in turn decrypts and loads other files until the final payload, Astaroth, is injected into the Userinit process.

The attack uses no external tools. It uses legitimate tools that are already present on the target system to obscure what is going on as regular activity. The results of this kind of attack leaves no disk files that traditional AV products can scan.

Microsoft strongly makes the point that being fileless doesn't mean being invisible; and it certainly doesn't mean being undetectable. They think that some of the fileless techniques can be so unusual and anomalous that they will draw immediate attention to the malware, in the same way that a bag of money moving by itself would.

In some ways, Microsoft's alert is a way to show off their Defender ATP product. By being able to detect a "fileless" attack they are trying to show what they perceive as a technological superiority compared to other products.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-36239
PUBLISHED: 2021-07-29
Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 e...
CVE-2021-37578
PUBLISHED: 2021-07-29
Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malic...
CVE-2021-23416
PUBLISHED: 2021-07-28
This affects all versions of package curly-bracket-parser. When used as a template library, it does not properly sanitize the user input.
CVE-2021-23417
PUBLISHED: 2021-07-28
All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function.
CVE-2021-23415
PUBLISHED: 2021-07-28
This affects the package elFinder.AspNet before 1.1.1. The user-controlled file name is not properly sanitized before it is used to create a file system path.