Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Hackers Using Weaponized ZIP File To Steal NTLM Hashes

admin by admin
Feb 29, 2024
in News
A A
0

Threat actors use ZIP files to weaponize them since they can easily convey malicious payloads within compressed archives, making it difficult for security systems to detect and study the file’s contents. 

These files can be used to deliver multiple files to the target users so that attackers can take advantage of vulnerabilities or perform a number of other malicious operations as soon as these files are extracted.

Recently, the cybersecurity analysts at ANY.RUN discovered that hackers actively use the weaponized ZIP file to steal NTLM hashes.

You can analyze a malware file, network, module, and registry activity with the ANY.RUN malware sandbox, and the Threat Intelligence Lookup that will let you interact with the OS directly from the browser.

Weaponized ZIP File Steal NTLM Hashes

Cybersecurity researchers warned of a new threat between February 23, 2024, and the present moment, when they observed a mass attack on users.

Here, the complete scenario begins with the receipt of an email having a ZIP attachment and an inquiry in both English and German that says, “I sent material to your side last day have you able to get it?” Among these compressed files are two different documents, one of which turns out to be a weaponized HTML page”.

⚠️ Please beware of a new threat ⚠️

We have observed a mass attack on users between February 23, 2024, and the present moment.

⚙️ Treat Details:

– The initial vector is an email with a ZIP attachment and the question, “I sent a material your side last day, have you able to get… pic.twitter.com/MnJqS4tUtm

— ANY.RUN (@anyrun_app) February 28, 2024

The trick here is that this HTML page is very much intricately crafted upon a 450-byte template. More specifically, redirection transfers encrypted HTTP traffic through several nodes. 

This is done with the help of Google App Script (GAS) as it receives requests from compromised systems, and this item employs the SMB protocol for its implementation. 

However, these attackers have implemented impacket-smbserver tool on their servers. It adds complexity and sophistication that points to a well-planned strategy in their cyber activities.

The following user data is obtained by the attackers when the HTML content is opened:-

  • IP address
  • NTLM challenge data
  • Username
  • Victim’s computer name

MITRE

  • Phishing (T1566)
  • User and PC name enumeration (T1589)
  • NTLM compromise (T1187)

Queries

Here below, we have mentioned all the queries that the experts recommend:-

  • SuricataID:”8001377″
  • SuricataID:”8001065″
  • SuricataID:”8000547″

Besides this, researchers will keep an eye on the progression of this attack in the hopes that it may enable users to examine their email attachments on the platform.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.