Newly Discovered Threat Actor Tools Able to Evade Antivirus Software and Delete Backup Files

Published:

spot_img

Threat Actor Tools Found in Open Directory: Analysis and Indicators of Compromise

Security researchers have unearthed a goldmine of threat actor tools capable of circumventing top-notch security defenses like Windows Defender and Malwarebytes. These malicious tools can wipe out backups, disable critical systems, and execute various nefarious activities undetected.

The threat actors have been leveraging tools such as SLiver, Ngrok, SystemBC, and PoshC2 to establish communication with their Command-and-control servers. It is believed that these tools have been instrumental in ransomware attacks that have been ongoing since September 2023, with the latest incidents reported in August 2024.

In a groundbreaking discovery in December 2023, DFIR threat researchers stumbled upon an open directory housing a plethora of batch scripts specifically designed for defense evasion and executing command and control payloads. These scripts are proficient at disabling security measures, halting essential services, and establishing command and control channels on both Windows and Linux systems.

The researchers dissected the scripts into three distinct attack phases: Defense Evasion, Persistence and Privilege Escalation, and Command and Control. Each set of scripts focuses on different tactics to infiltrate and maintain control over compromised environments.

Cyble threat researchers emphasized the critical importance of analyzing these scripts to gain insight into the attackers’ strategies and to develop effective countermeasures. The open directory contains 24 batch scripts that are instrumental in executing various attack techniques, including disabling security software, deleting backups, and establishing communication channels with C2 servers.

The researchers also identified several indicators of compromise (IoCs) and MITRE ATT&CK techniques associated with PoshC2 threat actors, shedding light on the sophisticated nature of their operations and the need for robust cybersecurity defenses to combat such threats effectively.

spot_img

Related articles

Recent articles

Delhi Police Crack ₹47.20 Lakh Cyber Fraud Network, Arrest Three Accused

Delhi Police Crack ₹47.20 Lakh Cyber Fraud Network, Arrest Three Accused In a significant operation against cyber financial crime, the Crime Branch of Delhi Police...

Samsung Advances Mid-Range Smartphone Experience in UAE with Galaxy A57 5G and A37 5G Featuring Enhanced AI Capabilities

Samsung Advances Mid-Range Smartphone Experience in UAE with Galaxy A57 5G and A37 5G Featuring Enhanced AI Capabilities Samsung Gulf Electronics has recently unveiled the...

KraneShares Strengthens Abu Dhabi Market with Launch of AI ETF (AGIX) and Shari’ah-Compliant Income ETF (KWIN)

KraneShares Strengthens Abu Dhabi Market with Launch of AI ETF (AGIX) and Shari’ah-Compliant Income ETF (KWIN) Abu Dhabi, UAE: In a significant development for the...

Lucknow Cyber Fraud: ₹11 Lakh Withdrawn Without Consent, Court Intervenes

Lucknow Cyber Fraud: ₹11 Lakh Withdrawn Without Consent, Court Intervenes A significant cyber fraud case has emerged from Lucknow, the capital of Uttar Pradesh, raising...