ADVERTISEMENT
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
mercoledì, Maggio 6, 2026
No Result
View All Result
Global News 24
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment
No Result
View All Result
Global News 24
No Result
View All Result
Home Tech

Researchers spot cryptojacking attack that disables endpoint protections

by admin
22 Maggio 2024
in Tech
0 0
0
Hackers infect users of antivirus service that delivered updates over Hypertext Transfer Protocol
0
SHARES
7
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT


Researchers spot cryptojacking attack that disables endpoint protections

Getty Images

Malware recently spotted sopra the wild uses sophisticated measures to disable antivirus protections, destroy evidence of infection, and permanently infect machines with cryptocurrency-mining software, researchers said Tuesday.

Key to making the unusually complex system of malware operate is a function sopra the main payload, named GhostEngine, that disables Microsoft Defender any other antivirus endpoint-protection software that may be running the targeted elaboratore elettronico. It also hides any evidence of compromise. “The first objective of the GhostEngine malware is to incapacitate endpoint security solutions and disable specific Windows event logs, such as Security and System logs, which process creation and service registration,” said researchers from Elastic Security Labs, who discovered the attacks.

When it first executes, GhostEngine scans machines for any EDR, endpoint protection and response, software that may be running. If it finds any, it loads drivers known to contain vulnerabilities that allow attackers to gain access to the kernel, the of all operating systems that’s heavily restricted to prevent tampering. One of the vulnerable drivers is an anti-rootkit file from Avast named aswArPots.sys. GhostEngine uses it to terminate the EDR security agent. A malicious file named smartscreen.exe then uses a driver from IObit named iobitunlockers.sys to delete the security agent binary.

“Once the vulnerable drivers are loaded, detection opportunities decrease significantly, and organizations must find compromised endpoints that stop transmitting logs to their SIEM,” the researchers wrote, using the abbreviation for security information and event management. Their research overlaps with recent findings from Antiy.

Once the EDR has been terminated, smartscreen.exe goes to download and install XMRig, a legitimate application for mining the monero cryptocurrency that’s often abused by threat actors. A configuration file included causes all coins created to be deposited into an attacker-controlled wallet.

The infection chain starts with the execution of a malicious binary that masquerades as the legitimate Windows file TiWorker.exe. That file runs a PowerShell script that retrieves an obfuscated script, titled get.png, which downloads additional tools, modules, and configurations from an attacker-controlled server. Elastic Security Labs provided the following graphic that illustrates the entire execution flow:

Advertisement

Execution flow of a cryptojacking campaign detected by Elastic Security Labs.
Enlarge / Execution flow of a cryptojacking campaign detected by Elastic Security Labs.

Elastic Security Labs

GhostEngine also runs several files that allow the malware to gain persistence, meaning it loads each time the infected machine restarts. To do this, the file responsible, name get.png, creates the following scheduled tasks with SYSTEM, the highest system privileges sopra Windows:

  • OneDriveCloudSync using msdtc to run the malicious service DLL C:WindowsSystem32oci.dll every 20 minutes (described later)
  • DefaultBrowserUpdate to run C:UsersPublicrun.bat, which downloads the get.png script and executes it every 60 minutes
  • OneDriveCloudBackup to execute C:WindowsFontssmartsscreen.exe every 40 minutes.

A separate component can act as a backdoor that allows the attackers to further download and execute malware the infected machine. A PowerShell script titled backup.png “functions like a backdoor, enabling remote command execution the system,” the researchers wrote. “It continually sends a Base64-encoded JSON object containing a unique ID, derived from the current time and the elaboratore elettronico name while awaiting base64-encoded commands. The results of those commands are then sent back.”

The researchers extracted the file the malware used to configure XMRig. It established a payment ID of:

468ED2Qcchk4shLbD8bhbC3qz2GFXqjAUWPY3VGbmSM2jfJw8JpSDDXP5xpkMAHG98FHLmgvSM6ZfUqa9gvArUWP59tEd3f

The ID allowed the researchers to view the worker and pool statistics one of the Monero Mining Pool sites listed sopra the configuration.

A dashboard showing the work pool an infected machine was configured to use.
Enlarge / A dashboard showing the work pool an infected machine was configured to use.

Elastic Security Labs

The payment ID showed XMRig had netted the attackers only a little more than $60. The researchers, however, noted that other machines infected sopra the same campaign would be given different IDs that may have generated larger amounts of monero.

Because the campaign successfully disables an array of EDR protections, administrators must rely other means to discover infections inside their networks. The researchers have released a set of YARA rules that will flag infections. They work primarily by detecting the presence of the GhostEngine malware and the installation of the Avast and IOBit drivers. Tuesday’s post also provides a list of file hashes, IP addresses, and domain names that will indicate targeting infection.

ADVERTISEMENT


Researchers spot cryptojacking attack that disables endpoint protections

Getty Images

Malware recently spotted sopra the wild uses sophisticated measures to disable antivirus protections, destroy evidence of infection, and permanently infect machines with cryptocurrency-mining software, researchers said Tuesday.

Key to making the unusually complex system of malware operate is a function sopra the main payload, named GhostEngine, that disables Microsoft Defender any other antivirus endpoint-protection software that may be running the targeted elaboratore elettronico. It also hides any evidence of compromise. “The first objective of the GhostEngine malware is to incapacitate endpoint security solutions and disable specific Windows event logs, such as Security and System logs, which process creation and service registration,” said researchers from Elastic Security Labs, who discovered the attacks.

When it first executes, GhostEngine scans machines for any EDR, endpoint protection and response, software that may be running. If it finds any, it loads drivers known to contain vulnerabilities that allow attackers to gain access to the kernel, the of all operating systems that’s heavily restricted to prevent tampering. One of the vulnerable drivers is an anti-rootkit file from Avast named aswArPots.sys. GhostEngine uses it to terminate the EDR security agent. A malicious file named smartscreen.exe then uses a driver from IObit named iobitunlockers.sys to delete the security agent binary.

“Once the vulnerable drivers are loaded, detection opportunities decrease significantly, and organizations must find compromised endpoints that stop transmitting logs to their SIEM,” the researchers wrote, using the abbreviation for security information and event management. Their research overlaps with recent findings from Antiy.

Once the EDR has been terminated, smartscreen.exe goes to download and install XMRig, a legitimate application for mining the monero cryptocurrency that’s often abused by threat actors. A configuration file included causes all coins created to be deposited into an attacker-controlled wallet.

The infection chain starts with the execution of a malicious binary that masquerades as the legitimate Windows file TiWorker.exe. That file runs a PowerShell script that retrieves an obfuscated script, titled get.png, which downloads additional tools, modules, and configurations from an attacker-controlled server. Elastic Security Labs provided the following graphic that illustrates the entire execution flow:

Advertisement

Execution flow of a cryptojacking campaign detected by Elastic Security Labs.
Enlarge / Execution flow of a cryptojacking campaign detected by Elastic Security Labs.

Elastic Security Labs

GhostEngine also runs several files that allow the malware to gain persistence, meaning it loads each time the infected machine restarts. To do this, the file responsible, name get.png, creates the following scheduled tasks with SYSTEM, the highest system privileges sopra Windows:

  • OneDriveCloudSync using msdtc to run the malicious service DLL C:WindowsSystem32oci.dll every 20 minutes (described later)
  • DefaultBrowserUpdate to run C:UsersPublicrun.bat, which downloads the get.png script and executes it every 60 minutes
  • OneDriveCloudBackup to execute C:WindowsFontssmartsscreen.exe every 40 minutes.

A separate component can act as a backdoor that allows the attackers to further download and execute malware the infected machine. A PowerShell script titled backup.png “functions like a backdoor, enabling remote command execution the system,” the researchers wrote. “It continually sends a Base64-encoded JSON object containing a unique ID, derived from the current time and the elaboratore elettronico name while awaiting base64-encoded commands. The results of those commands are then sent back.”

The researchers extracted the file the malware used to configure XMRig. It established a payment ID of:

468ED2Qcchk4shLbD8bhbC3qz2GFXqjAUWPY3VGbmSM2jfJw8JpSDDXP5xpkMAHG98FHLmgvSM6ZfUqa9gvArUWP59tEd3f

The ID allowed the researchers to view the worker and pool statistics one of the Monero Mining Pool sites listed sopra the configuration.

A dashboard showing the work pool an infected machine was configured to use.
Enlarge / A dashboard showing the work pool an infected machine was configured to use.

Elastic Security Labs

The payment ID showed XMRig had netted the attackers only a little more than $60. The researchers, however, noted that other machines infected sopra the same campaign would be given different IDs that may have generated larger amounts of monero.

Because the campaign successfully disables an array of EDR protections, administrators must rely other means to discover infections inside their networks. The researchers have released a set of YARA rules that will flag infections. They work primarily by detecting the presence of the GhostEngine malware and the installation of the Avast and IOBit drivers. Tuesday’s post also provides a list of file hashes, IP addresses, and domain names that will indicate targeting infection.

ADVERTISEMENT


Researchers spot cryptojacking attack that disables endpoint protections

Getty Images

Malware recently spotted sopra the wild uses sophisticated measures to disable antivirus protections, destroy evidence of infection, and permanently infect machines with cryptocurrency-mining software, researchers said Tuesday.

Key to making the unusually complex system of malware operate is a function sopra the main payload, named GhostEngine, that disables Microsoft Defender any other antivirus endpoint-protection software that may be running the targeted elaboratore elettronico. It also hides any evidence of compromise. “The first objective of the GhostEngine malware is to incapacitate endpoint security solutions and disable specific Windows event logs, such as Security and System logs, which process creation and service registration,” said researchers from Elastic Security Labs, who discovered the attacks.

When it first executes, GhostEngine scans machines for any EDR, endpoint protection and response, software that may be running. If it finds any, it loads drivers known to contain vulnerabilities that allow attackers to gain access to the kernel, the of all operating systems that’s heavily restricted to prevent tampering. One of the vulnerable drivers is an anti-rootkit file from Avast named aswArPots.sys. GhostEngine uses it to terminate the EDR security agent. A malicious file named smartscreen.exe then uses a driver from IObit named iobitunlockers.sys to delete the security agent binary.

“Once the vulnerable drivers are loaded, detection opportunities decrease significantly, and organizations must find compromised endpoints that stop transmitting logs to their SIEM,” the researchers wrote, using the abbreviation for security information and event management. Their research overlaps with recent findings from Antiy.

Once the EDR has been terminated, smartscreen.exe goes to download and install XMRig, a legitimate application for mining the monero cryptocurrency that’s often abused by threat actors. A configuration file included causes all coins created to be deposited into an attacker-controlled wallet.

The infection chain starts with the execution of a malicious binary that masquerades as the legitimate Windows file TiWorker.exe. That file runs a PowerShell script that retrieves an obfuscated script, titled get.png, which downloads additional tools, modules, and configurations from an attacker-controlled server. Elastic Security Labs provided the following graphic that illustrates the entire execution flow:

Advertisement

Execution flow of a cryptojacking campaign detected by Elastic Security Labs.
Enlarge / Execution flow of a cryptojacking campaign detected by Elastic Security Labs.

Elastic Security Labs

GhostEngine also runs several files that allow the malware to gain persistence, meaning it loads each time the infected machine restarts. To do this, the file responsible, name get.png, creates the following scheduled tasks with SYSTEM, the highest system privileges sopra Windows:

  • OneDriveCloudSync using msdtc to run the malicious service DLL C:WindowsSystem32oci.dll every 20 minutes (described later)
  • DefaultBrowserUpdate to run C:UsersPublicrun.bat, which downloads the get.png script and executes it every 60 minutes
  • OneDriveCloudBackup to execute C:WindowsFontssmartsscreen.exe every 40 minutes.

A separate component can act as a backdoor that allows the attackers to further download and execute malware the infected machine. A PowerShell script titled backup.png “functions like a backdoor, enabling remote command execution the system,” the researchers wrote. “It continually sends a Base64-encoded JSON object containing a unique ID, derived from the current time and the elaboratore elettronico name while awaiting base64-encoded commands. The results of those commands are then sent back.”

The researchers extracted the file the malware used to configure XMRig. It established a payment ID of:

468ED2Qcchk4shLbD8bhbC3qz2GFXqjAUWPY3VGbmSM2jfJw8JpSDDXP5xpkMAHG98FHLmgvSM6ZfUqa9gvArUWP59tEd3f

The ID allowed the researchers to view the worker and pool statistics one of the Monero Mining Pool sites listed sopra the configuration.

A dashboard showing the work pool an infected machine was configured to use.
Enlarge / A dashboard showing the work pool an infected machine was configured to use.

Elastic Security Labs

The payment ID showed XMRig had netted the attackers only a little more than $60. The researchers, however, noted that other machines infected sopra the same campaign would be given different IDs that may have generated larger amounts of monero.

Because the campaign successfully disables an array of EDR protections, administrators must rely other means to discover infections inside their networks. The researchers have released a set of YARA rules that will flag infections. They work primarily by detecting the presence of the GhostEngine malware and the installation of the Avast and IOBit drivers. Tuesday’s post also provides a list of file hashes, IP addresses, and domain names that will indicate targeting infection.

ADVERTISEMENT


Researchers spot cryptojacking attack that disables endpoint protections

Getty Images

Malware recently spotted sopra the wild uses sophisticated measures to disable antivirus protections, destroy evidence of infection, and permanently infect machines with cryptocurrency-mining software, researchers said Tuesday.

Key to making the unusually complex system of malware operate is a function sopra the main payload, named GhostEngine, that disables Microsoft Defender any other antivirus endpoint-protection software that may be running the targeted elaboratore elettronico. It also hides any evidence of compromise. “The first objective of the GhostEngine malware is to incapacitate endpoint security solutions and disable specific Windows event logs, such as Security and System logs, which process creation and service registration,” said researchers from Elastic Security Labs, who discovered the attacks.

When it first executes, GhostEngine scans machines for any EDR, endpoint protection and response, software that may be running. If it finds any, it loads drivers known to contain vulnerabilities that allow attackers to gain access to the kernel, the of all operating systems that’s heavily restricted to prevent tampering. One of the vulnerable drivers is an anti-rootkit file from Avast named aswArPots.sys. GhostEngine uses it to terminate the EDR security agent. A malicious file named smartscreen.exe then uses a driver from IObit named iobitunlockers.sys to delete the security agent binary.

“Once the vulnerable drivers are loaded, detection opportunities decrease significantly, and organizations must find compromised endpoints that stop transmitting logs to their SIEM,” the researchers wrote, using the abbreviation for security information and event management. Their research overlaps with recent findings from Antiy.

Once the EDR has been terminated, smartscreen.exe goes to download and install XMRig, a legitimate application for mining the monero cryptocurrency that’s often abused by threat actors. A configuration file included causes all coins created to be deposited into an attacker-controlled wallet.

The infection chain starts with the execution of a malicious binary that masquerades as the legitimate Windows file TiWorker.exe. That file runs a PowerShell script that retrieves an obfuscated script, titled get.png, which downloads additional tools, modules, and configurations from an attacker-controlled server. Elastic Security Labs provided the following graphic that illustrates the entire execution flow:

Advertisement

Execution flow of a cryptojacking campaign detected by Elastic Security Labs.
Enlarge / Execution flow of a cryptojacking campaign detected by Elastic Security Labs.

Elastic Security Labs

GhostEngine also runs several files that allow the malware to gain persistence, meaning it loads each time the infected machine restarts. To do this, the file responsible, name get.png, creates the following scheduled tasks with SYSTEM, the highest system privileges sopra Windows:

  • OneDriveCloudSync using msdtc to run the malicious service DLL C:WindowsSystem32oci.dll every 20 minutes (described later)
  • DefaultBrowserUpdate to run C:UsersPublicrun.bat, which downloads the get.png script and executes it every 60 minutes
  • OneDriveCloudBackup to execute C:WindowsFontssmartsscreen.exe every 40 minutes.

A separate component can act as a backdoor that allows the attackers to further download and execute malware the infected machine. A PowerShell script titled backup.png “functions like a backdoor, enabling remote command execution the system,” the researchers wrote. “It continually sends a Base64-encoded JSON object containing a unique ID, derived from the current time and the elaboratore elettronico name while awaiting base64-encoded commands. The results of those commands are then sent back.”

The researchers extracted the file the malware used to configure XMRig. It established a payment ID of:

468ED2Qcchk4shLbD8bhbC3qz2GFXqjAUWPY3VGbmSM2jfJw8JpSDDXP5xpkMAHG98FHLmgvSM6ZfUqa9gvArUWP59tEd3f

The ID allowed the researchers to view the worker and pool statistics one of the Monero Mining Pool sites listed sopra the configuration.

A dashboard showing the work pool an infected machine was configured to use.
Enlarge / A dashboard showing the work pool an infected machine was configured to use.

Elastic Security Labs

The payment ID showed XMRig had netted the attackers only a little more than $60. The researchers, however, noted that other machines infected sopra the same campaign would be given different IDs that may have generated larger amounts of monero.

Because the campaign successfully disables an array of EDR protections, administrators must rely other means to discover infections inside their networks. The researchers have released a set of YARA rules that will flag infections. They work primarily by detecting the presence of the GhostEngine malware and the installation of the Avast and IOBit drivers. Tuesday’s post also provides a list of file hashes, IP addresses, and domain names that will indicate targeting infection.

Advertisement. Scroll to continue reading.


Researchers spot cryptojacking attack that disables endpoint protections

Getty Images

Malware recently spotted sopra the wild uses sophisticated measures to disable antivirus protections, destroy evidence of infection, and permanently infect machines with cryptocurrency-mining software, researchers said Tuesday.

Key to making the unusually complex system of malware operate is a function sopra the main payload, named GhostEngine, that disables Microsoft Defender any other antivirus endpoint-protection software that may be running the targeted elaboratore elettronico. It also hides any evidence of compromise. “The first objective of the GhostEngine malware is to incapacitate endpoint security solutions and disable specific Windows event logs, such as Security and System logs, which process creation and service registration,” said researchers from Elastic Security Labs, who discovered the attacks.

When it first executes, GhostEngine scans machines for any EDR, endpoint protection and response, software that may be running. If it finds any, it loads drivers known to contain vulnerabilities that allow attackers to gain access to the kernel, the of all operating systems that’s heavily restricted to prevent tampering. One of the vulnerable drivers is an anti-rootkit file from Avast named aswArPots.sys. GhostEngine uses it to terminate the EDR security agent. A malicious file named smartscreen.exe then uses a driver from IObit named iobitunlockers.sys to delete the security agent binary.

“Once the vulnerable drivers are loaded, detection opportunities decrease significantly, and organizations must find compromised endpoints that stop transmitting logs to their SIEM,” the researchers wrote, using the abbreviation for security information and event management. Their research overlaps with recent findings from Antiy.

Once the EDR has been terminated, smartscreen.exe goes to download and install XMRig, a legitimate application for mining the monero cryptocurrency that’s often abused by threat actors. A configuration file included causes all coins created to be deposited into an attacker-controlled wallet.

The infection chain starts with the execution of a malicious binary that masquerades as the legitimate Windows file TiWorker.exe. That file runs a PowerShell script that retrieves an obfuscated script, titled get.png, which downloads additional tools, modules, and configurations from an attacker-controlled server. Elastic Security Labs provided the following graphic that illustrates the entire execution flow:

Advertisement

Execution flow of a cryptojacking campaign detected by Elastic Security Labs.
Enlarge / Execution flow of a cryptojacking campaign detected by Elastic Security Labs.

Elastic Security Labs

GhostEngine also runs several files that allow the malware to gain persistence, meaning it loads each time the infected machine restarts. To do this, the file responsible, name get.png, creates the following scheduled tasks with SYSTEM, the highest system privileges sopra Windows:

  • OneDriveCloudSync using msdtc to run the malicious service DLL C:WindowsSystem32oci.dll every 20 minutes (described later)
  • DefaultBrowserUpdate to run C:UsersPublicrun.bat, which downloads the get.png script and executes it every 60 minutes
  • OneDriveCloudBackup to execute C:WindowsFontssmartsscreen.exe every 40 minutes.

A separate component can act as a backdoor that allows the attackers to further download and execute malware the infected machine. A PowerShell script titled backup.png “functions like a backdoor, enabling remote command execution the system,” the researchers wrote. “It continually sends a Base64-encoded JSON object containing a unique ID, derived from the current time and the elaboratore elettronico name while awaiting base64-encoded commands. The results of those commands are then sent back.”

The researchers extracted the file the malware used to configure XMRig. It established a payment ID of:

468ED2Qcchk4shLbD8bhbC3qz2GFXqjAUWPY3VGbmSM2jfJw8JpSDDXP5xpkMAHG98FHLmgvSM6ZfUqa9gvArUWP59tEd3f

The ID allowed the researchers to view the worker and pool statistics one of the Monero Mining Pool sites listed sopra the configuration.

A dashboard showing the work pool an infected machine was configured to use.
Enlarge / A dashboard showing the work pool an infected machine was configured to use.

Elastic Security Labs

The payment ID showed XMRig had netted the attackers only a little more than $60. The researchers, however, noted that other machines infected sopra the same campaign would be given different IDs that may have generated larger amounts of monero.

Because the campaign successfully disables an array of EDR protections, administrators must rely other means to discover infections inside their networks. The researchers have released a set of YARA rules that will flag infections. They work primarily by detecting the presence of the GhostEngine malware and the installation of the Avast and IOBit drivers. Tuesday’s post also provides a list of file hashes, IP addresses, and domain names that will indicate targeting infection.

ADVERTISEMENT


Researchers spot cryptojacking attack that disables endpoint protections

Getty Images

Malware recently spotted sopra the wild uses sophisticated measures to disable antivirus protections, destroy evidence of infection, and permanently infect machines with cryptocurrency-mining software, researchers said Tuesday.

Key to making the unusually complex system of malware operate is a function sopra the main payload, named GhostEngine, that disables Microsoft Defender any other antivirus endpoint-protection software that may be running the targeted elaboratore elettronico. It also hides any evidence of compromise. “The first objective of the GhostEngine malware is to incapacitate endpoint security solutions and disable specific Windows event logs, such as Security and System logs, which process creation and service registration,” said researchers from Elastic Security Labs, who discovered the attacks.

When it first executes, GhostEngine scans machines for any EDR, endpoint protection and response, software that may be running. If it finds any, it loads drivers known to contain vulnerabilities that allow attackers to gain access to the kernel, the of all operating systems that’s heavily restricted to prevent tampering. One of the vulnerable drivers is an anti-rootkit file from Avast named aswArPots.sys. GhostEngine uses it to terminate the EDR security agent. A malicious file named smartscreen.exe then uses a driver from IObit named iobitunlockers.sys to delete the security agent binary.

“Once the vulnerable drivers are loaded, detection opportunities decrease significantly, and organizations must find compromised endpoints that stop transmitting logs to their SIEM,” the researchers wrote, using the abbreviation for security information and event management. Their research overlaps with recent findings from Antiy.

Once the EDR has been terminated, smartscreen.exe goes to download and install XMRig, a legitimate application for mining the monero cryptocurrency that’s often abused by threat actors. A configuration file included causes all coins created to be deposited into an attacker-controlled wallet.

The infection chain starts with the execution of a malicious binary that masquerades as the legitimate Windows file TiWorker.exe. That file runs a PowerShell script that retrieves an obfuscated script, titled get.png, which downloads additional tools, modules, and configurations from an attacker-controlled server. Elastic Security Labs provided the following graphic that illustrates the entire execution flow:

Advertisement

Execution flow of a cryptojacking campaign detected by Elastic Security Labs.
Enlarge / Execution flow of a cryptojacking campaign detected by Elastic Security Labs.

Elastic Security Labs

GhostEngine also runs several files that allow the malware to gain persistence, meaning it loads each time the infected machine restarts. To do this, the file responsible, name get.png, creates the following scheduled tasks with SYSTEM, the highest system privileges sopra Windows:

  • OneDriveCloudSync using msdtc to run the malicious service DLL C:WindowsSystem32oci.dll every 20 minutes (described later)
  • DefaultBrowserUpdate to run C:UsersPublicrun.bat, which downloads the get.png script and executes it every 60 minutes
  • OneDriveCloudBackup to execute C:WindowsFontssmartsscreen.exe every 40 minutes.

A separate component can act as a backdoor that allows the attackers to further download and execute malware the infected machine. A PowerShell script titled backup.png “functions like a backdoor, enabling remote command execution the system,” the researchers wrote. “It continually sends a Base64-encoded JSON object containing a unique ID, derived from the current time and the elaboratore elettronico name while awaiting base64-encoded commands. The results of those commands are then sent back.”

The researchers extracted the file the malware used to configure XMRig. It established a payment ID of:

468ED2Qcchk4shLbD8bhbC3qz2GFXqjAUWPY3VGbmSM2jfJw8JpSDDXP5xpkMAHG98FHLmgvSM6ZfUqa9gvArUWP59tEd3f

The ID allowed the researchers to view the worker and pool statistics one of the Monero Mining Pool sites listed sopra the configuration.

A dashboard showing the work pool an infected machine was configured to use.
Enlarge / A dashboard showing the work pool an infected machine was configured to use.

Elastic Security Labs

The payment ID showed XMRig had netted the attackers only a little more than $60. The researchers, however, noted that other machines infected sopra the same campaign would be given different IDs that may have generated larger amounts of monero.

Because the campaign successfully disables an array of EDR protections, administrators must rely other means to discover infections inside their networks. The researchers have released a set of YARA rules that will flag infections. They work primarily by detecting the presence of the GhostEngine malware and the installation of the Avast and IOBit drivers. Tuesday’s post also provides a list of file hashes, IP addresses, and domain names that will indicate targeting infection.

ADVERTISEMENT


Researchers spot cryptojacking attack that disables endpoint protections

Getty Images

Malware recently spotted sopra the wild uses sophisticated measures to disable antivirus protections, destroy evidence of infection, and permanently infect machines with cryptocurrency-mining software, researchers said Tuesday.

Key to making the unusually complex system of malware operate is a function sopra the main payload, named GhostEngine, that disables Microsoft Defender any other antivirus endpoint-protection software that may be running the targeted elaboratore elettronico. It also hides any evidence of compromise. “The first objective of the GhostEngine malware is to incapacitate endpoint security solutions and disable specific Windows event logs, such as Security and System logs, which process creation and service registration,” said researchers from Elastic Security Labs, who discovered the attacks.

When it first executes, GhostEngine scans machines for any EDR, endpoint protection and response, software that may be running. If it finds any, it loads drivers known to contain vulnerabilities that allow attackers to gain access to the kernel, the of all operating systems that’s heavily restricted to prevent tampering. One of the vulnerable drivers is an anti-rootkit file from Avast named aswArPots.sys. GhostEngine uses it to terminate the EDR security agent. A malicious file named smartscreen.exe then uses a driver from IObit named iobitunlockers.sys to delete the security agent binary.

“Once the vulnerable drivers are loaded, detection opportunities decrease significantly, and organizations must find compromised endpoints that stop transmitting logs to their SIEM,” the researchers wrote, using the abbreviation for security information and event management. Their research overlaps with recent findings from Antiy.

Once the EDR has been terminated, smartscreen.exe goes to download and install XMRig, a legitimate application for mining the monero cryptocurrency that’s often abused by threat actors. A configuration file included causes all coins created to be deposited into an attacker-controlled wallet.

The infection chain starts with the execution of a malicious binary that masquerades as the legitimate Windows file TiWorker.exe. That file runs a PowerShell script that retrieves an obfuscated script, titled get.png, which downloads additional tools, modules, and configurations from an attacker-controlled server. Elastic Security Labs provided the following graphic that illustrates the entire execution flow:

Advertisement

Execution flow of a cryptojacking campaign detected by Elastic Security Labs.
Enlarge / Execution flow of a cryptojacking campaign detected by Elastic Security Labs.

Elastic Security Labs

GhostEngine also runs several files that allow the malware to gain persistence, meaning it loads each time the infected machine restarts. To do this, the file responsible, name get.png, creates the following scheduled tasks with SYSTEM, the highest system privileges sopra Windows:

  • OneDriveCloudSync using msdtc to run the malicious service DLL C:WindowsSystem32oci.dll every 20 minutes (described later)
  • DefaultBrowserUpdate to run C:UsersPublicrun.bat, which downloads the get.png script and executes it every 60 minutes
  • OneDriveCloudBackup to execute C:WindowsFontssmartsscreen.exe every 40 minutes.

A separate component can act as a backdoor that allows the attackers to further download and execute malware the infected machine. A PowerShell script titled backup.png “functions like a backdoor, enabling remote command execution the system,” the researchers wrote. “It continually sends a Base64-encoded JSON object containing a unique ID, derived from the current time and the elaboratore elettronico name while awaiting base64-encoded commands. The results of those commands are then sent back.”

The researchers extracted the file the malware used to configure XMRig. It established a payment ID of:

468ED2Qcchk4shLbD8bhbC3qz2GFXqjAUWPY3VGbmSM2jfJw8JpSDDXP5xpkMAHG98FHLmgvSM6ZfUqa9gvArUWP59tEd3f

The ID allowed the researchers to view the worker and pool statistics one of the Monero Mining Pool sites listed sopra the configuration.

A dashboard showing the work pool an infected machine was configured to use.
Enlarge / A dashboard showing the work pool an infected machine was configured to use.

Elastic Security Labs

The payment ID showed XMRig had netted the attackers only a little more than $60. The researchers, however, noted that other machines infected sopra the same campaign would be given different IDs that may have generated larger amounts of monero.

Because the campaign successfully disables an array of EDR protections, administrators must rely other means to discover infections inside their networks. The researchers have released a set of YARA rules that will flag infections. They work primarily by detecting the presence of the GhostEngine malware and the installation of the Avast and IOBit drivers. Tuesday’s post also provides a list of file hashes, IP addresses, and domain names that will indicate targeting infection.

ADVERTISEMENT


Researchers spot cryptojacking attack that disables endpoint protections

Getty Images

Malware recently spotted sopra the wild uses sophisticated measures to disable antivirus protections, destroy evidence of infection, and permanently infect machines with cryptocurrency-mining software, researchers said Tuesday.

Key to making the unusually complex system of malware operate is a function sopra the main payload, named GhostEngine, that disables Microsoft Defender any other antivirus endpoint-protection software that may be running the targeted elaboratore elettronico. It also hides any evidence of compromise. “The first objective of the GhostEngine malware is to incapacitate endpoint security solutions and disable specific Windows event logs, such as Security and System logs, which process creation and service registration,” said researchers from Elastic Security Labs, who discovered the attacks.

When it first executes, GhostEngine scans machines for any EDR, endpoint protection and response, software that may be running. If it finds any, it loads drivers known to contain vulnerabilities that allow attackers to gain access to the kernel, the of all operating systems that’s heavily restricted to prevent tampering. One of the vulnerable drivers is an anti-rootkit file from Avast named aswArPots.sys. GhostEngine uses it to terminate the EDR security agent. A malicious file named smartscreen.exe then uses a driver from IObit named iobitunlockers.sys to delete the security agent binary.

“Once the vulnerable drivers are loaded, detection opportunities decrease significantly, and organizations must find compromised endpoints that stop transmitting logs to their SIEM,” the researchers wrote, using the abbreviation for security information and event management. Their research overlaps with recent findings from Antiy.

Once the EDR has been terminated, smartscreen.exe goes to download and install XMRig, a legitimate application for mining the monero cryptocurrency that’s often abused by threat actors. A configuration file included causes all coins created to be deposited into an attacker-controlled wallet.

The infection chain starts with the execution of a malicious binary that masquerades as the legitimate Windows file TiWorker.exe. That file runs a PowerShell script that retrieves an obfuscated script, titled get.png, which downloads additional tools, modules, and configurations from an attacker-controlled server. Elastic Security Labs provided the following graphic that illustrates the entire execution flow:

Advertisement

Execution flow of a cryptojacking campaign detected by Elastic Security Labs.
Enlarge / Execution flow of a cryptojacking campaign detected by Elastic Security Labs.

Elastic Security Labs

GhostEngine also runs several files that allow the malware to gain persistence, meaning it loads each time the infected machine restarts. To do this, the file responsible, name get.png, creates the following scheduled tasks with SYSTEM, the highest system privileges sopra Windows:

  • OneDriveCloudSync using msdtc to run the malicious service DLL C:WindowsSystem32oci.dll every 20 minutes (described later)
  • DefaultBrowserUpdate to run C:UsersPublicrun.bat, which downloads the get.png script and executes it every 60 minutes
  • OneDriveCloudBackup to execute C:WindowsFontssmartsscreen.exe every 40 minutes.

A separate component can act as a backdoor that allows the attackers to further download and execute malware the infected machine. A PowerShell script titled backup.png “functions like a backdoor, enabling remote command execution the system,” the researchers wrote. “It continually sends a Base64-encoded JSON object containing a unique ID, derived from the current time and the elaboratore elettronico name while awaiting base64-encoded commands. The results of those commands are then sent back.”

The researchers extracted the file the malware used to configure XMRig. It established a payment ID of:

468ED2Qcchk4shLbD8bhbC3qz2GFXqjAUWPY3VGbmSM2jfJw8JpSDDXP5xpkMAHG98FHLmgvSM6ZfUqa9gvArUWP59tEd3f

The ID allowed the researchers to view the worker and pool statistics one of the Monero Mining Pool sites listed sopra the configuration.

A dashboard showing the work pool an infected machine was configured to use.
Enlarge / A dashboard showing the work pool an infected machine was configured to use.

Elastic Security Labs

The payment ID showed XMRig had netted the attackers only a little more than $60. The researchers, however, noted that other machines infected sopra the same campaign would be given different IDs that may have generated larger amounts of monero.

Because the campaign successfully disables an array of EDR protections, administrators must rely other means to discover infections inside their networks. The researchers have released a set of YARA rules that will flag infections. They work primarily by detecting the presence of the GhostEngine malware and the installation of the Avast and IOBit drivers. Tuesday’s post also provides a list of file hashes, IP addresses, and domain names that will indicate targeting infection.

Tags: attackcryptojackingdisablesendpointprotectionsresearchersSpot
admin

admin

Next Post
Exploring Vegan Food per Crete: A Culinary Adventure

Exploring Vegan Food per Crete: A Culinary Adventure

Lascia un commento Annulla risposta

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *

Popular News

  • Captivating Inspiring Baseball Articles & Stories

    Captivating Inspiring Baseball Articles & Stories

    0 shares
    Share 0 Tweet 0
  • As banks purchase up bitcoins, who else are the ‘Bitcoin whales’?

    0 shares
    Share 0 Tweet 0
  • How The Smothers Brothers Comedy Hour Made An Enemy Out Of CBS

    0 shares
    Share 0 Tweet 0
  • iOS 18 AI features: Notes transcription and summaries

    0 shares
    Share 0 Tweet 0
  • Boeing investigated over falsified plane records — RT World News

    0 shares
    Share 0 Tweet 0
ADVERTISEMENT

About Us

Welcome to Globalnews24.ch The goal of Globalnews24.ch is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Category

  • Business
  • Entertainment
  • Fashion
  • Health
  • Lifestyle
  • Sports
  • Tech
  • Travel
  • World

Recent Posts

  • ‘Complete annihilation of Microsoft, Nvidia … ‘: Iran warns US after Trump threatens to strike bridges, power plants
  • Company Adds 2M Streaming Households, Hits Key Financial Targets
  • Warner Music Group shake-up: Max Lousada to exit; Elliot Grainge named CEO of Atlantic Music Group, with Julie Greenwald as Chairman
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Copyright © 2024 Globalnews24.ch | All Rights Reserved.

No Result
View All Result
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment

Copyright © 2024 Globalnews24.ch | All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In