Carbanak Attackers Devise Clever New Persistence Trick

Discussion in 'malware problems & news' started by itman, May 5, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Another Windows vulnerability exploited.
    https://threatpost.com/carbanak-attackers-devise-clever-new-persistence-trick/125457/
     
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Mitigation recommendations per the referenced FireEye article:
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Interesting, but I assume this is blocked when you block execution of powershell.exe? If not, then sdbinst.exe should also be added to the vulnerable apps list. And I don't think that AutoRuns is monitoring the AppCompatFlags reg-key, so they might want to add this.
     
  4. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Sbinst.exe like most Win utility processes needs admin privileges. So if past malware "tricks" such as running it hidden were attempted, UAC set at max. level will trigger an alert.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.