A rash of invisible, fileless malware is infecting banks around the globe

Discussion in 'malware problems & news' started by lotuseclat79, Feb 8, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    FIN7 Hackers Use LNK Embedded Objects in Fileless Attacks
    http://www.securityweek.com/fin7-hackers-use-lnk-embedded-objects-fileless-attacks
     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Good find:thumb: Missed this one.
    On the other hand, everyone by now is monitoring Powershell script execution locally so the attack would have to be run remotely.
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    I'm not sure what you mean with remotely. If you block sdbinst.exe from running, or if you block modification of the involved registry keys, the attack won't work. BTW, here are some other interesting showcases of how Barkly and Cybereason block certain file-less attacks.

    https://www.cybereason.com/blog-cyb...-malware-utilizing-the-exploit-cve-2017-8759/
    https://blog.barkly.com/blocking-sorebrect-ransomware-fileless-infection-technique
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    @Rasheed187 after I posted previously, the "light went of in my head" in regards to app shimming in Win 10. Most of its functionality has been removed: https://reverseengineering.stackexc...shims-sdbs-no-longer-functional-in-windows-10 .

    Additional ref. here: https://github.com/evil-e/sdb-explorer/issues/2

    A few other points in regards to shims:
    https://attack.mitre.org/wiki/Technique/T1138

    Folks using Win 7 and 8 are strongly advised to apply KB3045645 if not previously done so.
     
    Last edited: Sep 30, 2017
  6. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    FIN7 Hackers Change Attack Techniques
    http://www.securityweek.com/fin7-hackers-change-attack-techniques
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.