HomeVulnerabilityMalicious electronic mail marketing campaign steals NTLM hashes

Malicious electronic mail marketing campaign steals NTLM hashes

A menace group that acts as an preliminary entry dealer is focusing on organizations with rogue electronic mail attachments that steal Microsoft Home windows NT LAN Supervisor (NTLM) authentication data when opened. The group’s campaigns final week focused a whole bunch of entities with 1000’s of electronic mail messages, researchers warn.

NTLM is the default authentication mechanism that’s used on Home windows networks when a pc tries to entry numerous community sources or companies, for instance file shares over the SMB protocol. NTLM credentials will not be despatched within the clear however as a cryptographic hash, however there are methods to doubtlessly recuperate the passwords from such hashes relying on how complicated the passwords are or to make use of the hashes immediately in assaults.

“Proofpoint usually observes TA577 conducting assaults to ship malware and has by no means noticed this menace actor demonstrating the assault chain used to steal NTLM credentials first noticed on 26 February,” researchers from security agency Proofpoint stated in a report. “Just lately, TA577 has been noticed delivering Pikabot utilizing quite a lot of assault chains.”

See also  A important Nvidia Container Toolkit bug can permit a whole host takeover

Thread hijacking results in rogue HTML information

TA577, additionally tracked within the security trade as Hive0118, is a financially motivated entry dealer with a protracted historical past of distributing trojan applications. The group was once one of many essential associates for the Qbot botnet earlier than it was disrupted, however has additionally been noticed distributing malware applications resembling IcedID, SystemBC, SmokeLoader, Ursnif, Cobalt Strike, and extra just lately Pikabot.

For the reason that group sells entry to computer systems to different cybercriminal gangs, the methods compromised by TA577 have had follow-on ransomware infections, most notably with Black Basta. TA577 additionally makes a speciality of a method referred to as thread hijacking the place their rogue electronic mail messages are crafted to look as replies to beforehand despatched authentic emails. The most recent campaigns seen by Proofpoint used messages wherein recipients had been requested if that they had time to take a look at a doc despatched beforehand.

See also  SHQ Response Platform and Danger Centre to Allow Administration and Analysts Alike

The emails contained a .zip archive along with a password wanted to unpack it. The archive in flip contained an innocuous trying HTML doc that was personalized for every sufferer. When opened, the HTML routinely triggers a connection try to a distant SMB server managed by attackers through a meta refresh within the file that factors to a file scheme URI ending in .txt.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular