Every Major Cloud Provider Impacted by Critical Fluent Bit Vulnerability
May 22, 2024Multiple SolarWinds Access Rights Manager Zero-Day Vulnerabilities
May 22, 2024Every Major Cloud Provider Impacted by Critical Fluent Bit Vulnerability
May 22, 2024Multiple SolarWinds Access Rights Manager Zero-Day Vulnerabilities
May 22, 2024Severity
High
Analysis Summary
It has been determined that a malicious crypto mining campaign known as "REF4578" is using a malicious payload called GhostEngine, which leverages insecure drivers to disable security products and launch an XMRig miner.
In distinct publications and shared detection criteria to assist defenders in identifying and thwarting these attacks, researchers have highlighted the exceptionally sophisticated nature of these crypto-mining schemes. The campaign's origin and extent are unknown, though, as the report doesn’t disclose information regarding targets and victims and fails to link the behavior to recognized threat actors.
The threat actor's attack begins with the execution of a program called "Tiworker.exe", which poses as a genuine Windows file. It is unknown how servers were originally compromised. This executable is GhostEngine's initial staging payload. GhostEngine is a PowerShell script that downloads modules to an infected device to perform various actions.
GhostEngine's main loader, the attacker's command, and control (C2) server, is where Tiworker.exe downloads the PowerShell script 'get.png' when it is run. This PowerShell script turns off Windows Defender, activates remote services, downloads more modules and their configurations, and cleans up a bunch of Windows event logs.
The next step involves get.png confirming that the system has 10MB of free space, which is required for the infection to spread, and creating three scheduled tasks called 'OneDriveCloudSync,' 'DefaultBrowserUpdate,' and 'OneDriveCloudBackup,' for persistence. The main payload for GhostEngine will now be downloaded and launched by the PowerShell script under the name smartsscreen.exe.
This malware is in charge of downloading and starting the XMRig cryptomining program, as well as stopping and uninstalling the EDR software. GhostEngine installs two vulnerable kernel drivers to stop EDR software; IObitUnlockers.sys (an Iobit driver) to remove the related executable, and aswArPots.sys (an Avast driver) to stop EDR processes.
Windows service 'msdtc' loads a DLL called 'oci.dll' for persistence. Upon launch, this DLL will obtain a new copy of 'get.png' to install GhostEngine's most recent version on the system. The overall financial advantage could be substantial even if the researchers haven't seen any striking numbers from the single payment ID they looked at. Each victim likely has a unique wallet.
Researchers advise defenders to keep an eye out for network data pointing to cryptocurrency-mining pools, suspicious process activity, and unusual PowerShell execution. In any system, the deployment of vulnerable drivers and the creation of associated kernel mode services should also be regarded as warning signs. Blocking file creation from susceptible drivers such as aswArPots.sys and IobitUnlockers.sys is a proactive approach.
Impact
- Security Bypass
- Cryptocurrency Theft
- Financial Loss
Indicators of Compromise
Domain Name
- download.yrnvtklot.com
- ftp.yrnvtklot.com
- online.yrnvtklot.com
IP
- 111.90.158.40
- 93.95.225.137
MD5
- 18957d83337a7f6a879d739be02b173e
- 4c8e4c5c0e150c210cd2014a84e39ec6
- f8f3a7faa13d6370b96d07d4d184357f
- bd877072c51ee58ec7aaf091bff0b80c
- cf66c76445f74b90be8914dfe06697cb
- bf05392d1205ce66a45a1104fb67adf8
- 271520c83f847743aa6eaccd1b949797
- 587b173ef971d242933e18f43c18256b
- b9e37dd582a6ff810672f9b33865c217
SHA-256
- 2fe78941d74d35f721556697491a438bf3573094d7ac091b42e4f59ecbd25753
- 3ced0552b9ecf3dfecd14cbcc3a0d246b10595d5048d7f0d4690e26ecccc1150
- 3b2724f3350cb5f017db361bd7aae49a8dbc6faa7506de6a4b8992ef3fd9d7ab
- 35eb368c14ad25e3b1c58579ebaeae71bdd8ef7f9ccecfc00474aa066b32a03f
- 786591953336594473d171e269c3617d7449876993b508daa9b96eedc12ea1ca
- aac7f8e174ba66d62620bd07613bac1947f996bb96b9627b42910a1db3d3e22b
- 6f3e913c93887a58e64da5070d96dc34d3265f456034446be89167584a0b347e
- 7c242a08ee2dfd5da8a4c6bc86231985e2c26c7b9931ad0b3ea4723e49ceb1c1
- cc4384510576131c126db3caca027c5d159d032d33ef90ef30db0daa2a0c4104
SHA1
- 125982676af23e93fa58b31ef1bdb93725cb91c3
- d6dfce664ee28cdcf143da2ec71d2a0ff18c1280
- 1c552f0ade7213e81c3aeb581faab24061f03485
- 41fce204948df6af1fe2f3f6dec02086678eab3b
- 993323c62dab609fd1d8f5876f604d9da861fb35
- 9a77e7e641f1336b4b6fbe0dadb54ea4356212f1
- 8de84714fe4e0fc52c3ff988653b9c69e5753cb2
- 792d5430ef2c60088fbc388714eb4aff63f5f593
- 4b851160b5f87dee9c526e36c0d7e0a28c6de0a9
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Ensure all operating systems and software are up to date with the latest security patches.
- Employ reliable antivirus and antimalware software to detect and block known threats.
- Regularly update these tools to maintain the latest threat intelligence.
- Implement IDPS to detect and prevent unusual network activity, system behavior, or similar threats.
- Enable two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don’t lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Use email filtering solutions to block malicious attachments and links that may deliver malware to users via phishing emails.
- Segment your network to limit lateral movement for attackers.
- Employ application whitelisting to only allow approved software to run on systems, reducing the risk of unauthorized applications being executed.
- Implement robust monitoring solutions to detect any unusual or suspicious activities, such as unauthorized access attempts or data exfiltration. Establish an effective incident response plan to quickly respond to and mitigate any potential breaches.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by info-stealers and other types of malware.