Thursday, June 1, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Ransomware Groups Use New AuKill Tool to Slip Under the Radar

Researcher by Researcher
April 21, 2023
in Cybersecurity
0
Threat Actors Abuse InterPlanetary File System Protocol to Spread Malware
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Threat groups are abusing a signed but outdated version of the driver from Microsoft’s Process Explorer utility in order to disable endpoint security software, before they deploy ransomware on already compromised systems.

The newly discovered defense evasion tool, AuKill, has been utilized in at least three ransomware attacks since the start of the year, including a Medusa Locker ransomware attack in January and February and a LockBit ransomware attack in February. Researchers with Sophos found six different versions of AuKill dating back to last year.

“Disabling EDR clients using drivers, whether they are legitimate and abused for malicious purposes (BYOVD), or signed by a stolen/leaked certificate, continues to be popular among adversaries who want to disable defense mechanisms,” said Andreas Klopsch, threat researchers with Sophos, in an analysis this week.

Drivers can access critical security components in kernel memory, so as a security measure Windows uses a process called Driver Signature Enforcement to ensure that only signed drivers can load onto user systems. Attackers have used various methods to bypass this protection, including leveraging malicious drivers signed by a previously stolen certificate, or drivers that are legitimate – created by and signed by Microsoft – but out of date.

The threat actors utilizing AuKill relied on the latter tactic, using an outdated, exploitable version of Process Explorer. Process Explorer is part of Microsoft’s Windows Sysinternals administration toolset and shows data on what handles or DLLs processes have been loaded. Sophos has informed Microsoft about the incidents leveraging the outdated Process Explorer driver.

“AuKill drops a driver named PROCEXP.SYS (from the release version 16.32 of process Explorer) into the C:\Windows\System32\drivers path,” said Klopsch. “The legitimate Process Explorer driver is named PROCEXP152.sys, and normally is found in the same location. Both drivers can be present on a machine that has a copy of Process Explorer running. The AuKill installer also drops an executable copy of itself to either the System32 or the TEMP directory, which it runs as a service.”

Notably, the AuKill tool requires existing administrative privileges to work, and researchers said it’s likely that the ransomware actors using the tool previously accessed these privileges, through other means, before launching the malware.

After being executed, AuKill makes sure it has administrative privileges, and if not it attempts to gain SYSTEM privileges by impersonating the “TrustedInstaller.exe” service. AuKill also starts several threads targeting different components to make sure that endpoint detection and response processes stay disabled.

Klopsch said that driver-based attacks against security products are on the rise, with several of these attacks previously abusing vulnerable Process Explorer drivers. Last year, for instance, the Backstab utility was observed using outdated versions of this driver in a LockBit ransomware attack, and in February MalVirt loaders also relied on Process Explorer drivers in malvertising attacks.

“Last year, the security community reported about multiple incidents, where drivers have been weaponized for malicious purposes,” said Klopsch. “The discovery of such a tool confirms our assumption that adversaries continue to weaponize drivers, and we expect even more development in this area [in] the upcoming months.”



Source link

Related articles

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
Tags: AuKillgroupsradarRansomwareSliptool
Share76Tweet47

Related Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
0

Threat actors are exploiting a critical-severity Zyxel flaw in order to add vulnerable devices to a Mirai botnet variant. While...

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
0

Cisco on Wednesday announced that it’s acquiring California-based cybersecurity firm Armorblox for its artificial intelligence (AI) technology. Armorblox specializes in...

8 best practices for securing your Mac from hackers in 2023

8 best practices for securing your Mac from hackers in 2023

June 1, 2023
0

Best practices for securing your Mac against potential hacks and security vulnerabilities include enabling the firewall, using strong passwords and...

ZuoRAT Malware Found Hitting Home Routers

New SeroXen RAT Emerges | Decipher

June 1, 2023
0

Security researchers are tracking a new fileless RAT named SeroXen that has the capability to evade many EDR systems and...

Sentra Raises $30 Million for DSPM Technology

Chrome 114 Released With 18 Security Fixes

May 31, 2023
0

Google this week announced the release of Chrome 114 to the stable channel with a total of 18 security fixes...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup /

June 1, 2023

Recent Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved