Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home News

What Security Leaders Need to Know

admin by admin
Apr 16, 2024
in News
0 0
A A
0
FacebookTwitterLinkedIn

Stolen credentials are the most common way for hackers to access an organization, according to the 2023 DBIR report. As an analyst for CyOps, Cynet’s team of experts to monitor threat actor activities and protect Cynet clients, I’ve seen how cybercriminals pilfer usernames and passwords, then ruthlessly leverage those lifted logins to wreak havoc on target organizations.

The damage can be especially disastrous for small-to-medium enterprises (SMEs) that lack the big budgets and sprawling security teams to respond rapidly to a breach. Therefore, it is crucial for SME I.T. security leaders to ensure that their organizations are secure through affordable measures to reduce their exposure to compromise.

For a deeper technical dive into the mechanics and mitigations of credential stealing, plus hackers’ other favorite points of entry, I highly encourage you to watch “Securing the Top 3 SME Attack Vectors.”

Now, in this piece, we’ll dissect a timely example of credential theft—StrelaStealer—to identify the malware’s characteristics and capabilities and the detections and preventions necessary to block it from affecting your organization. 

StrelaStealer’s New Tricks

A massive StrelaStealer campaign recently rocked hundreds of US- and EU-based companies. StrelaStealer, as its name suggests, is a stealer. Its goal is to swipe email login credentials from victim machines, focusing primarily on Thunderbird and Outlook email accounts.

When StrelaStealer was first observed in early November 2022, it was distributed as an ISO file that contained a .LNK file which either side-loaded the stealer’s DLL payload or, through a more sophisticated method, executed the payload as a DLL/HTML polyglot. 

That distribution method has evolved. In this most recent campaign, we see StrelaStealer delivered via phishing emails in several languages, depending on what their target speaks.

Here, in this phishing email, we can see how users are lured into opening a zip file attachment purporting to enclose a PDF invoice:

A screenshot of a computer

Description automatically generated

The zip file actually contains a JavaScript file named “18262829011200.js”:

A screenshot of a computer

Description automatically generated

Now, by performing static and dynamic analyses, we can assess that file and understand its functionality and capabilities.

Static Analysis

First up, static analysis. StrelaStealer’s source code can be parsed for signs of potential security issues.

Reviewing the file in a text editor reveals several exciting commands:

  1. The following commands look like an obfuscated script, replacing characters with variable names:
    A screenshot of a computer

Description automatically generated

De-obfuscating the code, we can see that it contains several commands using native Windows applications to create and ultimately run a DLL file named “returnready.dll”:

A screenshot of a computer

Description automatically generated

  1. Additional strings show more obfuscated code, using the same method of setting characters as variables:
    A screen shot of a computer screen

Description automatically generated

Once decoded, we can see how wscript’s ‘shell’ method is used to execute cmd.exe and create the file “trousersperpetual.bat” in the %temp% directory:

A screen shot of a computer code

Description automatically generated

  1. Finally, a very large base64 encoded string was observed in the file:
    A green text on a white background

Description automatically generated

Decoding the string, we can see that it is a portable executable (PE) file:

A screenshot of a computer

Description automatically generated

Dynamic Analysis 

Next, dynamic analysis. StrelaStealer can be run in a controlled environment to reveal its attack flow step-by-step.

Upon execution of the file “18262829011200.js” via wscript.exe, cmd.exe is used to create a copy of the .js file’s contents, which is then saved on the host as the file “C:Users*AppDataLocalTemptrousersperpetual.bat”:

A screenshot of a computer

Description automatically generated

Cmd.exe continues by running “findstr” on the file “C:Users*AppDataLocalTemptrousersperpetual.bat”, looking for all strings that do not contain the word “marrywise” and saving the result to the file “C:Users*AppDataLocalTempmagnificentdevelopment”.

This file ends up containing the large base64 string found in our static analysis:

A screenshot of a computer

Description automatically generated

Then certutil.exe is invoked to decode the newly created base64 encoded file “magnificentdevelopment” into the file “C:Users*AppDataLocalTempreturnready.dll”.

This is essentially StrelaStealer’s payload file:

A screenshot of a computer

Description automatically generated

The file “returnready.dll” is then executed via rundll32.exe, which proceeds to enumerate the host’s Outlook and Thunderbird email account data, before exfiltrating it to the threat actor’s command and control (C2) server. 

A screenshot of a computer

Description automatically generated
Initial Access Execution Defense Evasion  Collection Command and Control Exfiltration
Phishing  Command and Scripting Interpreter Deobfuscate/Decode Files or Information Email Collection Application Layer Protocol Automated Exfiltration
User Execution Obfuscated Files or Information Exfiltration Over C2 Channel
System Binary Proxy Execution

How to detect StrelaStealer

With an understanding of StrelaStealer’s characteristics and capabilities, cybersecurithttps://go.cynet.com/top-3-sme-attack-vectors?utm_source=gbhackers&utm_medium=sponsored_article&utm_campaign=Q2-sponsored-webinarsy teams can ensure their protections are able to block the stealer from compromising their organization.

Because Cynet is easily able to detect and prevent StrelaStealer, we’ll configure the all-in-one cybersecurity solution in detection mode (without prevention) to allow StrelaStealer to execute its full flow. This simulated execution lets Cynet detect and log each step of the attack, while highlighting how StrelaStealer triggers two specific Cynet detections.

1. File Dumped on the Disk

Cynet’s AV/AI engine detects that malicious files have been dumped on the disk or are attempting to run:


A screenshot of a computer

Description automatically generated
A screenshot of a computer

Description automatically generated
A screenshot of a computer

Description automatically generated

Process Monitoring

Cynet’s Process Monitoring mechanism detects the use of Certutil.exe to decode the malicious DLL file:

A screenshot of a computer

Description automatically generated

For further guidance to safeguard your SME, don’t miss “Securing the Top 3 SME Attack Vectors.” And make sure your team is empowered by an affordable, easy to use solution, such as Cynet’s all-in-one cybersecurity platform, which is purpose-built for small teams. After all, the future of your organization is too important to gamble.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Understanding the Implications & Guarding Privacy- Axios Security Group
News

Understanding the Implications & Guarding Privacy- Axios Security Group

Hackers Actively Using Pupy RAT to Attack Linux Systems
News

Hackers Actively Using Pupy RAT to Attack Linux Systems

Buckle Up_ BEC and VEC Attacks Target Automotive Industry
News

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
News

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems
News

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide
News

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Iran launched a Cyberattack Against Critical Infrastructure in Israel
News

Iran launched a Cyberattack Against Critical Infrastructure in Israel

PuTTY Client Vulnerability Lets Attackers Recover Private Keys
News

PuTTY Client Vulnerability Lets Attackers Recover Private Keys

PoC Released For Critical Zero-Click Windows Vulnerability
News

PoC Released For Critical Zero-Click Windows Vulnerability

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

What Security Leaders Need to Know

What Security Leaders Need to Know

Developer Of Hive RAT Arrested By Authorities

Developer Of Hive RAT Arrested By Authorities

DuckDuckGo Launches Privacy Pro : 3-In-1 Service With VPN

DuckDuckGo Launches Privacy Pro : 3-In-1 Service With VPN

Palo Alto Networks PAN-OS Zero-day Under Active Attack

Palo Alto Networks PAN-OS Zero-day Under Active Attack

Match Systems publishes report on the consequences of CBDC implementation

Match Systems publishes report on the consequences of CBDC implementation

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.