• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers using self extracting archives exploit for stealthy backdoor attacks

Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks

You are here: Home / General Cyber Security News / Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks
April 5, 2023

An unknown risk actor made use of a malicious self-extracting archive (SFX) file in an try to establish persistent backdoor entry to a victim’s environment, new conclusions from CrowdStrike show.

SFX documents are capable of extracting the data contained within them with no the have to have for dedicated computer software to display screen the file contents. It achieves this by which include a decompressor stub, a piece of code that is executed to unpack the archive.

“Even so, SFX archive files can also incorporate hidden malicious features that may well not be immediately noticeable to the file’s recipient, and could be skipped by technology-based detections by itself,” CrowdStrike researcher Jai Minton reported.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In the circumstance investigated by the cybersecurity organization, compromised qualifications to a process were being applied to operate a authentic Windows accessibility software known as Utility Manager (utilman.exe) and subsequently launch a password-shielded SFX file.

This, in transform, is created doable by configuring a debugger method (yet another executable) in the Windows Registry to a specific plan (in this scenario, utilman.exe) so that the debugger is routinely started out every single time the method is launched.

The abuse of utilman.exe is also noteworthy as it can be released straight from the Windows login screen by utilizing the Windows emblem crucial + U keyboard shortcut, potentially enabling risk actors to configure backdoors by using the Image File Execution Possibilities Registry important.

“Nearer inspection of the SFX archive revealed that it functions as a password-secured backdoor by abusing WinRAR setup selections relatively than made up of any malware,” Minton explained.

Self-Extracting Archives

Exclusively, the file is engineered to operate PowerShell (powershell.exe), Command Prompt (cmd.exe), and Undertaking Supervisor (taskmgr.exe) with NT AUTHORITYSYSTEM privileges by giving the correct password to the archive.

“This form of attack is probably to keep on being undetected by classic antivirus software package that is hunting for malware within of an archive (which is frequently also password-protected) rather than the habits from an SFX archive decompressor stub,” Minton additional.

Upcoming WEBINARLearn to Protected the Identification Perimeter – Verified Strategies

Strengthen your company security with our impending qualified-led cybersecurity webinar: Investigate Id Perimeter approaches!

Will not Skip Out – Preserve Your Seat!

This is not the very first time SFX documents have been employed in attacks as a signifies for attackers to stay undetected. In September 2022, Kaspersky disclosed a malware campaign that used inbound links to such password-shielded files to propagate RedLine Stealer.

A thirty day period later, the infamous Emotet botnet was observed sending out an SFX archive that, as soon as opened by a user, would routinely extract a 2nd password-shielded SFX archive, enter the password, and execute its content without having even more consumer interaction applying a batch script.

To mitigate threats posed by this attack vector, it truly is encouraged that SFX archives are analyzed through unarchiving computer software to recognize any prospective scripts or binaries that are set to extract and run on execution.

Found this report fascinating? Observe us on Twitter  and LinkedIn to read more exceptional written content we put up.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «google tag warns of north korean linked archipelago cyberattacks Google TAG Warns of North Korean-linked ARCHIPELAGO Cyberattacks
Next Post: FBI Leads International Effort to Seize Domains for Notorious Genesis Market Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • US and Korean Agencies Issue Warning on North Korean Cyber-Attacks
  • Malicious PyPI Packages Use Compiled Python Code to Bypass Detection
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • The Importance of Managing Your Data Security Posture
  • Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
  • Insurers Predict $33bn Bill for Catastrophic “Cyber Event”
  • Chinese Phishing Gang “PostalFurious” Expands Campaign
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks
  • MOVEit Transfer Under Attack: Zero-Day Vulnerability Actively Being Exploited

Copyright © TheCyberSecurity.News, All Rights Reserved.