• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

“PowerDrop” PowerShell Malware Targets US Aerospace Industry

You are here: Home / General Cyber Security News / “PowerDrop” PowerShell Malware Targets US Aerospace Industry
June 7, 2023

A new PowerShell malware script named “PowerDrop” has been found to be utilised in attacks targeting the aerospace defense industry in the US.

The malware was identified by security scientists at Adlumin, who previous thirty day period uncovered a sample of the malware in a defense contractor’s network.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


On Tuesday, the Adlumin workforce published an advisory about PowerDrop, saying the malware “straddles the line between a ‘basic off-the-shelf threat’ and techniques applied by State-of-the-art Persistent Threat Groups (APTs).”

PowerDrop depends on state-of-the-art techniques to evade detection, which includes deception, encoding and encryption.

“The code for PowerDrop seems to be tailor made, designed to be stealthy and evade detection, executed by way of WMI, does not reside on disk, takes advantage of uncommon techniques for communication and exfiltration of details and is not offered as an off-the-shelf products,” explained James Lively, endpoint security exploration specialist at Tanium.

“[However], centered on the abilities of PowerDrop, how they are executed, and how the threat actor is making use of PowerDrop in the aerospace industry, it is indicative of State-of-the-art Persistent Danger (APT) action.”

Andrew Barratt, vice president at Coalfire, extra that legal actors ordinarily make use of PowerShell mainly because of its substantial assortment of functions and its capacity to stay clear of detection by leveraging current infrastructure in usually utilized computing environments.

“These are practical for the reason that they can be very easily dropped into a doing work environment by email or USB and don’t demand a complex zero-working day to be burned as element of the attack,” Barratt additional.

“The US and allies’ primary weapons system’s brands should really be on high alert for this exercise and be critically checking their source chains in circumstance they become a supply of attack.”

Read through a lot more on PowerShell malware: Microsoft Blames Clop Affiliate for PaperCut Attacks

Adlumin said in their advisory that the perpetrator at the rear of PowerDrop experienced not been exclusively discovered, but they suspect that nation-state hackers may well be associated. 

“The absence of a crystal clear attribution to a certain menace actor additional deepens the secret bordering PowerDrop,” said Craig Jones, vice president of security operations at Ontinue.

“Currently, the local community has refrained from pointing fingers suspicions place to nation-state adversaries because of to the ongoing conflict in Ukraine and their intensified aim on aerospace and missile applications.”

No matter of attribution, Adlumin cautioned folks in the aerospace defense market to manage a state of alertness concerning the recent malware. 

In individual, the organization implies conducting vulnerability scans on Windows programs as an critical precaution and keeping attentive to any irregular pinging exercise originating from their networks to exterior sources.

Editorial picture credit score: VanderWolf Images / Shutterstock.com


Some sections of this posting are sourced from:
www.infosecurity-journal.com

Previous Post: «microsoft to pay $20 million penalty for illegally collecting kids' Microsoft to Pay $20 Million Penalty for Illegally Collecting Kids’ Data on Xbox
Next Post: North Korean APT Group Kimsuky Expands Social Engineering Tactics Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.