Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 3 July, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

New Phishing Attack Infects Devices With Cobalt Strike

Cobalt Strike is a penetration testing suite that is frequently used by threat actors for lateral movement and to drop additional payloads.

by Guru Writer
June 22, 2022
in Cyber Bites
Gloved fingers type on keyboard
Share on FacebookShare on Twitter

Security researchers have discovered a new malicious spam campaign that delivers the ‘Matanbuchus’ malware to drop Cobalt Strike beacons on compromised machines.

Cobalt Strike is a penetration testing suite that is frequently used by threat actors for lateral movement and to drop additional payloads.

First spotted in February 2021 in advertisements on the dark web, Matanbuchus is a malware-as-a-service (MaaS) project that was promoted as a $2,500 loader that launches executables directly into system memory.

Palo Alto Networks’ Unit 42 analysed the malware in June 2021 and mapped extensive parts of its operational infrastructure. The malware’s features include launching PowerShell commands, establishing persistence via the addition of task schedules, and leveraging standalone executables to load DLL payloads.

Threat analyst Brad Duncan captured and examined (in a lab environment) a sample of the malware.

The malspam campaign uses lures that pretend to be replies to previous email conversations, so they feature a ‘Re:’ in the subject line.

These emails carry a ZIP attachment that contains an HTML file that generates a new ZIP ar5chive. This then extracts an MSI package digitally signed with a valid certificate issued by DigiCert for “Westeast Tech Consulting Corp.”

Running the MSI installer supposedly initiates an Adobe Acrobat font catalogue update that ends with an error message, aiming to distract the victim.

In the background, two Matanbuchus DLL payloads (“main.dll”) are dropped in two different locations, a scheduled task is created to maintain persistence across system reboots, and communication with the command and control (C2) server is established.

Finally, the malware loads the Cobalt Strike payload from the C2 server.

Cobalt Strike as a second-stage payload in Matanbuchus malspam campaign was first reported by DCSO, a German security company, on 23rd May 2022. The also noticed that Qakbot was also delivered in some cases.

Duncan has also posted on his website traffic samples, artefacts, indicators of compromise (IoCs), and examples.

 

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Former Amazon Employee Found Guilty in 2019 Capital One Data Breach

Next Post

China-linked APT Flew Under Radar for Decade

Recent News

A Vulnerability Management Program is Nothing Without Identity Risk Protection

A Vulnerability Management Program is Nothing Without Identity Risk Protection

July 1, 2022
SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

A Research of Threat Actor Activity & Myths Busted by Cato Networks

July 1, 2022
SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

July 1, 2022
Over a Decade in Software Security: What Have We learned?

Over a Decade in Software Security: What Have We learned?

July 1, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information