Wednesday, June 7, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Play Ransomware Attacks Utilize New Custom Tools

Researcher by Researcher
April 19, 2023
in Cybersecurity
0
Play Ransomware Attacks Utilize New Custom Tools
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Researchers have discovered two new custom tools being leveraged in Play ransomware attacks, as different threat actors increasingly adopt proprietary tools in order to gain a competitive advantage and better tailor their attacks to victims’ environments.

Symantec’s threat hunter team found the group behind the Play ransomware using a customized networking-scanning tool Grixba in order to enumerate all computers and users in the domain and a .NET executable that allows attackers to copy files from the Volume Shadow Copy Service (VSS) that are normally locked by the operating system.

“The use of proprietary tools… gives ransomware operators more control over their operations,” said researchers in a Wednesday analysis. “If a tool is widely available, it can be reverse-engineered or adapted by other attackers, potentially weakening the initial attack’s effectiveness. By keeping their tools proprietary and exclusive, ransomware gangs can maintain their competitive advantage and maximize their profits.”

The Balloonfly group that develops the Play ransomware, which launched in June 2022, has carried out several double extortion attacks, including a recent cyberattack on the city of Oakland, Calif. The group has previously targeted Microsoft Exchange flaws, such as an elevation of privilege bug (CVE-2022-41080) and remote code execution flaw (CVE-2022-41082).

The group does not appear to operate Play as a ransomware-as-a-service, and its custom tools uncovered this week can give it a competitive advantage over other groups. Balloonfly developed both tools using a popular .NET development tool called Costura, which allows users to embed application dependencies into a single executable.

“By keeping their tools proprietary and exclusive, ransomware gangs can maintain their competitive advantage and maximize their profits.”

The .NET Grixba infostealer checks for and enumerates software, remote administration tools, several security programs and more, and compiles this information for exfiltration. The other tool leverages the AlphaVSS library – a .NET framework for interacting with VSS – in order to copy files from VSS snapshots prior to encryption.

More groups are shifting away from publicly available tools or simple scripts to instead use fully custom tools, including the Exmatter data exfiltration tool used in several 2021 BlackMatter ransomware attacks, the custom data exfiltration tool Exbyte developed last year by BlackByte, and a PowerShell-based tool used by Vice Society.

Custom exfiltration tools like these improve the speed of attacks, but as exemplified by the Play ransomware custom tools, they can also increase the complexity and capabilities of attacks, said Dick O’Brien, principal intelligence analyst for the Symantec threat hunter group.

“It’s possible that attacks are becoming ever more complex to perform thus necessitating the automation of some steps,” said O’Brien. “Things like copying locked files are something we’re not sure if attackers would have bothered doing a few years ago.”

Outside of exfiltration tools, threat actors have been developing other types of toolsets to expand their attack chain and add additional layers of complexity to their attacks. Since 2022, for instance, a subgroup of known Iranian actor APT35 has been using two custom implants in order to persist in compromised environments, evade detection and deploy second-stage malware.

“In some ways, it may be a positive sign because it suggests attackers are feeling that heat and too many attacks are being uncovered before they can be completed,” said O’Brien. “We’re also seeing attackers put a greater degree of effort into attempting to disable security software, which also suggests that they’re being stymied more frequently.”



Source link

Related articles

CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
Sentra Raises $30 Million for DSPM Technology

KeePass Update Patches Vulnerability Exposing Master Password

June 6, 2023
Tags: AttacksCustomplayRansomwareToolsUtilize
Share76Tweet47

Related Posts

CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
0

North Korean threat group Kimsuky has recently launched a social engineering campaign against a number of experts specializing in North...

Sentra Raises $30 Million for DSPM Technology

KeePass Update Patches Vulnerability Exposing Master Password

June 6, 2023
0

Open source password manager KeePass was updated over the weekend to patch a vulnerability allowing attackers to retrieve the cleartext...

Zero-day MOVEit Transfer vulnerability exploited in the wild

Zero-day MOVEit Transfer vulnerability exploited in the wild

June 6, 2023
0

Shodan search engine results for internet-facing MOVEit instances. Image: Shodan The Cybersecurity & Infrastructure Security Agency has issued an alert...

New DDoS Attack Vector Abuses Content Filtering Systems

UNC4857 Exploits MOVEit Transfer Flaw in Data Extortion Attacks

June 6, 2023
0

A newly discovered threat campaign has been observed exploiting the recently uncovered, critical-severity MOVEit Transfer vulnerability in order to launch...

Sentra Raises $30 Million for DSPM Technology

Dozens of Malicious Extensions Found in Chrome Web Store

June 6, 2023
0

Security researchers recently identified more than 30 malicious extensions that had made their way into the Chrome web store, potentially...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Money20/20 Europe 2023: Day One TFT Roundup

Money20/20 Europe 2023: Day One TFT Roundup

June 7, 2023
Release date, price and more

Release date, price and more

June 7, 2023
CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
7 tips for spotting a fake mobile app

7 tips for spotting a fake mobile app

June 6, 2023

Recent Posts

Money20/20 Europe 2023: Day One TFT Roundup

Money20/20 Europe 2023: Day One TFT Roundup

June 7, 2023
Release date, price and more

Release date, price and more

June 7, 2023
CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved