• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
lockbit ransomware abuses windows defender to deploy cobalt strike payload

LockBit Ransomware Abuses Windows Defender to Deploy Cobalt Strike Payload

You are here: Home / General Cyber Security News / LockBit Ransomware Abuses Windows Defender to Deploy Cobalt Strike Payload
August 2, 2022

A danger actor connected with the LockBit 3. ransomware-as-a-support (RaaS) procedure has been observed abusing the Windows Defender command-line tool to decrypt and load Cobalt Strike payloads.

According to a report released by SentinelOne previous 7 days, the incident occurred right after obtaining first obtain by using the Log4Shell vulnerability in opposition to an unpatched VMware Horizon Server.

“The moment preliminary entry had been accomplished, the threat actors carried out a sequence of enumeration commands and attempted to operate numerous article-exploitation applications, such as Meterpreter, PowerShell Empire, and a new way to facet-load Cobalt Strike,” researchers Julio Dantas, James Haughom, and Julien Reisdorffer said.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

LockBit 3. (aka LockBit Black), which will come with the tagline “Make Ransomware Wonderful Yet again!,” is the future iteration of the prolific LockBit RaaS spouse and children that emerged in June 2022 to iron out critical weaknesses found out in its predecessor.

It’s notable for instituting what is actually the initial-at any time bug bounty for a RaaS application. Moreover showcasing a revamped leak website to title-and-shame non-compliant targets and publish extracted information, it also incorporates a new search resource to make it less complicated to obtain precise sufferer details.

LockBit Ransomware

The use of living-off-the-land (LotL) strategies by cyber intruders, wherein reputable program and features available in the technique are applied for write-up-exploitation, is not new and is commonly found as an try to evade detection by security computer software.

Before this April, a LockBit affiliate was located to have leveraged a VMware command-line utility referred to as VMwareXferlogs.exe to drop Cobalt Strike. What is actually different this time all over is the use of MpCmdRun.exe to attain the similar intention.

MpCmdRun.exe is a command-line tool for carrying out different capabilities in Microsoft Defender Antivirus, which include scanning for malicious computer software, gathering diagnostic information, and restoring the provider to a earlier version, among the other folks.

CyberSecurity

In the incident analyzed by SentinelOne, the preliminary accessibility was adopted by downloading a Cobalt Strike payload from a distant server, which was subsequently decrypted and loaded employing the Windows Defender utility.

“Instruments that should really get very careful scrutiny are any that both the firm or the organization’s security computer software have built exceptions for,” the researchers reported.

“Goods like VMware and Windows Defender have a substantial prevalence in the enterprise and a high utility to menace actors if they are authorized to run outside of the installed security controls.”

The conclusions come as preliminary entry brokers (IABs) are actively marketing accessibility to company networks, which includes managed provider companies (MSPs), to fellow danger actors for financial gain, in flip offering a way to compromise downstream buyers.

In May well 2022, cybersecurity authorities from Australia, Canada, New Zealand, the U.K., and the U.S. warned of attacks weaponizing susceptible managed service suppliers (MSPs) as an “first obtain vector to several victim networks, with globally cascading consequences.”

“MSPs continue to be an eye-catching offer chain target for attackers, specifically IABs,” Huntress researcher Harlan Carvey mentioned, urging corporations to safe their networks and put into action multi-factor authentication (MFA).

Found this report exciting? Abide by THN on Fb, Twitter  and LinkedIn to browse a lot more unique material we submit.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Credential Stealer Malware Raccoon Updated to Obtain Passwords More Efficiently
Next Post: UK’s Top 10 Universities Failing on DMARC Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.