“Our experts suspected something was wrong after the discovery of a sharp surge in the use of the Windows Management Instrumentation Command-line (WMIC) tool”, – says team member Andrea Lelli.
WMIC is a legitimate tool in modern versions of Windows, but a sudden increase in its use clearly indicated a malicious campaign. Looking closed, experts discovered a large-scale operation to send fishing emails with a link to the website containing the .LNK file.
After downloading and opening the file, WMIC and a number of other legitimate Windows tools were launched, which loaded additional code, transferred the data one to another, and executed the code exclusively in memory (the so-called fileless execution). Since no files were saved to the disk, the usual security solutions did not detect the attack.At the final stage of the attack on the system was downloaded Astaroth malware, which is an infostealer for stealing credentials for a number of applications. The first attacks with its use were discovered in 2018. In February of this year, malware attacked users in Europe and Brazil.
Microsoft experts have fixed a new campaign in May and June. Over 95% of all affected users live in Brazil.
Read also: The new version of the Dridex banker slipping from antiviruses
As noted by Lelly, at any stage of the attack are not used files that would be saved in the system. This type of attack, when only tools that are already present on the system are used, is called “living off the land”. Over the past three years, attacks of this type are being used more and more, forcing manufacturers of antivirus solutions to develop new ways to detect them.
“Using invisible techniques and being actually invisible are two different things. Being invisible may help you for some things, but you should not be under the illusion that you are invincible. The same applies to fileless malware: abusing fileless techniques does not put malware beyond the reach or visibility of security software. On the contrary, some of the fileless techniques may be so unusual and anomalous that they draw immediate attention to the malware”, — argues Andrea Lelli.
Additionally, Microsoft expert calls for the use of advanced developments in the field of detection of viruses and malware, until they managed to cause maximum damage.
About Pbmsoultions.com Pbmsoultions.com pop-ups can not launch out of the blue. If you have actually…
About Prizestash.com Prizestash.com pop-ups can not expose out of the blue. If you have actually…
About Verifiedbreaking.com Verifiedbreaking.com pop-ups can not launch out of nowhere. If you have actually clicked…
About Themoneyminutes.com Themoneyminutes.com pop-ups can not launch out of the blue. If you have actually…
About News-xcidizi.com News-xcidizi.com pop-ups can not introduce out of nowhere. If you have clicked some…
About Everytraffic-flow.com Everytraffic-flow.com pop-ups can not launch out of nowhere. If you have actually clicked…