Thursday, April 15, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Microsoft: WinRAR exploit gives attackers ‘full control’ of Windows PC

April 11, 2019
in Internet Security
Microsoft: WinRAR exploit gives attackers ‘full control’ of Windows PC
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Microsoft to organizations: How to secure your network
In its annual security intelligence report, Microsoft offers up its top tips for blocking out hackers.

Microsoft has detailed a March attack on Windows customers in the satellite and communications sectors using “unusual, interesting techniques” that bear the hallmarks of APT group MuddyWater. 

You might also like

Microsoft Defender for Endpoint now protects unmanaged BYO devices

Cyber criminals are installing cryptojacking malware on unpatched Microsoft Exchange servers

ASIO boss says he’s not concerned with Australian Parliament’s March outage

The company’s Office 365 ATP picked up archive (ACE) files loaded with the recently discovered WinRAR flaw, CVE-2018-20250, which has become widely used among cybercrime groups and nation-state hackers in recent months. 

The bug was co-opted for hacking after a February 20 report from Israeli security firm Check Point revealed that a malicious ACE file could place malware anywhere on a Windows PC after being extracted by WinRAR. Locations include the Windows Startup folder, where the malware would automatically execute on each reboot. 

A month before Check Point’s report, WinRAR developers released a new version that dropped support for ACE because it was unable to update a library in WinRAR called Unacev2.dll that contained a directory traversal flaw.  

However, by March, when this attack was detected by Microsoft, it’s likely a large chunk of the world’s 500 million WinRAR users hadn’t updated to the non-ACE version or hadn’t removed the vulnerable DLL.   

The MuddyWater group’s activities were first spotted in 2017. It is known to target users in the Middle East, Europe, and the US. The group frequently doctors up phishing documents to appear as if they’re from security arms of various governments.  

The attack detailed by Rex Plantado of the Office 365 ATP Research Team used spear-phishing email supposedly from the Ministry of Foreign Affairs (MFA) of the Islamic Republic of Afghanistan. The email asked “very specific targets” for resources, telecommunications services, and satellite maps. 

The social engineering used in the campaign was crafted to ensure full remote compromise of a machine within the limitations of the WinRAR exploit. 

An attached Word document suggests the user download another document from a OneDrive link with no macros included – a choice probably made to avoid detection. 

If the link is clicked, it downloads an archive file with the second Word document, this time with a malicious macro. If the victim ignores the security warning about macros, the malware payload is delivered to the PC. 

The document also contains a ‘Next page’ button that displays a bogus warning that a certain DLL file is missing and claims the computer needs to restart. 

Once the macro is enabled, a PowerShell script collects information about the system, tags it with a unique ID, and sends that to a remote server. The script is also the key mechanism for fetching the malicious ACE file with the exploit for CVE-2018-20250, which drops a payload called dropbox.exe. 

While Check Point suggested that the Startup folder would be an ideal location to plant the malware, Microsoft notes that it is possible to drop the file to known or pre-determined SMB folders. 

However, in this case dropbox.exe is dropped to the Startup folder as soon as the user attempts to extract any of three JPEG files within the ACE archive. 

The lie about a missing DLL file and the need to restart the computer is because CVE-2018-20250 only allows the malware to write files to a specified folder, but it can’t run immediately, explains Plantado. That’s why dropping the payload into the Startup folder was ideal, since it will launch after the computer restarts. 

“The payload dropbox.exe performs the same actions as the malicious macro component, which helps ensure that the PowerShell backdoor is running,” explains Plantado.

“The PowerShell backdoor could allow a remote attacker to take full control of the compromised machine and make it a launchpad for more malicious actions. Exposing and stopping the attacks at the early stages is critical in preventing additional, typically more damaging impact of undetected malware implants.”     

The Microsoft security analyst notes that the malicious macro used advanced techniques to evade detection, including the use of Microsoft’s own scripting engine. 

At one stage, the macro runs wscript.exe to launch the PowerShell script at runtime. 

“The PowerShell script itself does not touch the disc, making it a fileless component of the attack chain. Living-off-the-land, the technique of using resources that are already available on the system (eg, wscript.exe) to run malicious code directly in memory, is another way that this attack tries to evade detection,” writes Plantado.  

More on Microsoft, WinRAR and Windows security

Credit: Source link

Previous Post

An Introduction to Machine Learning Training Data

Next Post

What People Think about Tech Brands Apple, Facebook, Google

Related Posts

Microsoft Defender for Endpoint now protects unmanaged BYO devices
Internet Security

Microsoft Defender for Endpoint now protects unmanaged BYO devices

April 15, 2021
Cyber criminals are installing cryptojacking malware on unpatched Microsoft Exchange servers
Internet Security

Cyber criminals are installing cryptojacking malware on unpatched Microsoft Exchange servers

April 14, 2021
ASIO boss says he’s not concerned with Australian Parliament’s March outage
Internet Security

ASIO boss says he’s not concerned with Australian Parliament’s March outage

April 14, 2021
‘FLoC off!’ Vivaldi declares as it says no to Google’s tracking system
Internet Security

‘FLoC off!’ Vivaldi declares as it says no to Google’s tracking system

April 14, 2021
Microsoft April patch download covers 114 CVEs including new Exchange Server bugs
Internet Security

Microsoft April patch download covers 114 CVEs including new Exchange Server bugs

April 14, 2021
Next Post
What People Think about Tech Brands Apple, Facebook, Google

What People Think about Tech Brands Apple, Facebook, Google

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Microsoft Defender for Endpoint now protects unmanaged BYO devices
Internet Security

Microsoft Defender for Endpoint now protects unmanaged BYO devices

April 15, 2021
New JavaScript Exploit Can Now Carry Out DDR4 Rowhammer Attacks
Internet Privacy

New JavaScript Exploit Can Now Carry Out DDR4 Rowhammer Attacks

April 15, 2021
Sailthru Announces Machine Learning Features for Improved Lifecycle Optimization
Machine Learning

Sailthru Announces Machine Learning Features for Improved Lifecycle Optimization

April 14, 2021
Data Labeling Service — How to Get Good Training Data for ML Project? | by ByteBridge | Apr, 2021
Neural Networks

Data Labeling Service — How to Get Good Training Data for ML Project? | by ByteBridge | Apr, 2021

April 14, 2021
The Search Engine Land Awards are open: Wednesday’s daily brief
Digital Marketing

The Search Engine Land Awards are open: Wednesday’s daily brief

April 14, 2021
Six courses to build your technology skills in 2021 – IBM Developer
Technology Companies

IBM joins Eclipse Adoptium and offers free certified JDKs with Eclipse OpenJ9 – IBM Developer

April 14, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Microsoft Defender for Endpoint now protects unmanaged BYO devices April 15, 2021
  • New JavaScript Exploit Can Now Carry Out DDR4 Rowhammer Attacks April 15, 2021
  • Sailthru Announces Machine Learning Features for Improved Lifecycle Optimization April 14, 2021
  • Data Labeling Service — How to Get Good Training Data for ML Project? | by ByteBridge | Apr, 2021 April 14, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates