• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
warning: thread hijacking attack targets it networks, stealing ntlm hashes

Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes

You are here: Home / General Cyber Security News / Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes
March 5, 2024

The danger actor regarded as TA577 has been observed using ZIP archive attachments in phishing e-mail with an aim to steal NT LAN Supervisor (NTLM) hashes.

The new attack chain “can be applied for delicate facts accumulating needs and to permit abide by-on exercise,” enterprise security agency Proofpoint reported in a Monday report.

At least two campaigns getting benefit of this tactic were being observed on February 26 and 27, 2024, the business included. The phishing waves disseminated thousands of messages and targeted hundreds of businesses throughout the environment.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The messages themselves appeared as responses to preceding email messages, a recognized approach named thread hijacking, in a bid to raise the likelihood of the attacks’ success.

The ZIP attachments come with an HTML file that’s developed to call an actor-managed Server Message Block (SMB) server.

“TA577’s goal is to capture NTLMv2 Obstacle/Response pairs from the SMB server to steal NTLM hashes based mostly on characteristics of the attack chain and tools made use of,” the business claimed, which could then be made use of for go-the-hash (PtH) kind attacks.

Thread Hijacking Attack

This means that adversaries who are in possession of a password hash do not want the fundamental password to authenticate a session, eventually enabling them to go as a result of a network and get unauthorized accessibility to useful information.

TA577, which overlaps with an exercise cluster tracked by Craze Micro as Drinking water Curupira, is just one of the most subtle cybercrime groups. It has been linked to the distribution of malware households like QakBot and PikaBot in the earlier.

Cybersecurity

“The rate at which TA577 adopts and distributes new ways, procedures, and methods (TTPs) indicates the risk actor probable has the time, resources, and working experience to rapidly iterate and test new supply procedures,” Proofpoint mentioned.

It also explained the threat actor as acutely mindful of the shifts in the cyber risk landscape, speedily adapting and refining its tradecraft and shipping and delivery solutions to bypass detection and drop a wide variety of payloads. Organizations are remarkably recommended to block outbound SMB to stop exploitation.

Identified this article appealing? Observe us on Twitter  and LinkedIn to read much more unique material we post.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «critical jetbrains teamcity on premises flaws could lead to server takeovers Critical JetBrains TeamCity On-Premises Flaws Could Lead to Server Takeovers
Next Post: Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets over 225,000 compromised chatgpt credentials up for sale on dark»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.