eSentire is aware of public Proof-of-Concept (PoC) exploit code for the ProxyNotShell Exchange vulnerabilities (CVE-2022-41040 [CVSS:8.8], CVE-2022-41082 [CVSS:8.0]). The publication of…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Global Cybersecurity Leader eSentire Partners with InfoTrust to Deliver 24/7 Multi-Signal MDR and IR Services Across Australia
Waterloo, ON and Sydney, Australia – November 9, 2022 – eSentire, Inc., the Authority in Managed Detection and Response (MDR), today announced it has expanded its presence in Australia via a strategic partnership with InfoTrust. InfoTrust is a leading specialized cybersecurity provider that combines next-generation security controls, with the InfoTrust “Connective Tissue” of customer success,…
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and Cyber Analysts who hunt, investigate, contain and respond to threats within minutes.
We have discovered some of the most dangerous threats and nation state attacks in our space – including the Kaseya MSP breach and the more_eggs malware.
Our Security Operations Centers are supported with Threat Intelligence, Tactical Threat Response and Advanced Threat Analytics driven by our Threat Response Unit – the TRU team.
In TRU Positives, eSentire’s Threat Response Unit (TRU) provides a summary of a recent threat investigation. We outline how we responded to the confirmed threat and what recommendations we have going forward.
Here’s the latest from our TRU Team…
What did we find?
Gootkit Loader, a malware threat distributed via drive-by attacks.
TRU has observed in uptick in Gootkit Loader attacks in May 2022, following a lull in activity in March – April 2022.
In recent cases, TRU identified Cobalt Strike as the secondary payload embedded in registry artifacts.
Cobalt Strike is a common tool used by operators (including ransomware) as a foothold to expand access within a network.
Analysis of the Cobalt Strike payload configuration details show similarities across separate incidents, suggesting common operator(s).
In a typical Gootkit Loader attack, unsuspecting users are lured to download fake documents that contain malicious payloads.
Gootkit Loader operators compromise legitimate websites and create various pages for topics that include the word “agreement” (Figure 1). Recently observed lures include:
Non-disclosure, Non-use and Non-circumvention Agreement For China
Aviation Safety Agreement
These website pages are seeded with keywords used to manipulate search results, increasing the likelihood they are found (Figures 2, 3).
When visited by an unsuspecting user, a fake forum is overlaid on the page with a link to a JScript file masquerading as the document they searched (Figure 4).
Once clicked, this script file is executed by default in Windows, launching the malicious code.
Our Threat Response Unit (TRU) team analyzed infection artifacts for detection opportunities.
What can you learn from this TRU positive?
Drive-by attacks present an alternative, yet highly effective, route for adversaries to deliver malicious code to victims since users may be less inclined to scrutinize a document downloaded from the internet as they would an executable file.
JScript (.js) files execute silently by default when double-clicked by a user. This default behavior in Windows is being increasingly exploited as other vectors (such as document macros) become more restrictive.
Expect this method to continue until defaults are changed/modified.
Adversaries use PowerShell as part of cyberattacks due to its availability and how difficult it is to detect. Malicious activity can easily blend in with legitimate administrative activity.
Gootkit Loader presents a significant risk as Cobalt Strike has been identified as a second-stage payload.
Cobalt Strike is a tool ubiquitous with follow-on network intrusions, particularly with ransomware actors.
Recommendations from our Threat Response Unit (TRU) Team:
Make sure you trust document sources. Even legitimate Word and Excel documents from the Internet can lead to malware infections.
Ensure standard procedures are in place for employees to submit potentially malicious content for review.
Are your employees aware of drive-by attacks and the cybersecurity risks associated with these new tactics?
Do you have controls in place to prevent user execution of web-sourced script files?
eSentire’s Threat Response Unit (TRU) is a world-class team of threat researchers who develop new detections enriched by original threat intelligence and leverage new machine learning models that correlate multi-signal data and automate rapid response to advanced threats.
If you are not currently engaged with an MDR provider, eSentire MDR can help you reclaim the advantage and put your business ahead of disruption.
Learn what it means to have an elite team of Threat Hunters and Researchers that works for you. Connect with an eSentire Security Specialist.