HomeCII/OTCyberattack Uncovered by Cyble Using VSCode for Remote Access

Cyberattack Uncovered by Cyble Using VSCode for Remote Access

Published on

spot_img

Researchers at Cyble Research and Intelligence Lab (CRIL) recently uncovered a sophisticated cyber attack campaign that utilizes a suspicious .LNK file and leverages Visual Studio Code (VSCode) to establish persistence and remote access. This campaign also includes the installation of the VSCode command line interface (CLI) in cases where VSCode is not already present on the victim’s machine.

According to the findings of the researchers, this attack campaign bears similarities to tactics previously associated with the Stately Taurus Chinese Advanced Persistent Threat (APT) group. Additionally, Chinese language elements were identified within the campaign, hinting at potential origins.

The initial attack vector in this campaign is a .LNK file, which is likely delivered through spam emails. This file triggers the download of a Python distribution package that executes an obfuscated Python script retrieved from a paste site. At the time of the research publication, this script had zero detections on VirusTotal, which poses a challenge for traditional security tools to detect.

The Python script ensures persistence by creating a scheduled task with system privileges and high priority. It then checks for the presence of VSCode on the victim’s machine and downloads the standalone VSCode CLI if it is not found. Subsequently, a remote tunnel is established using VSCode, enabling unauthorized remote access to the compromised system.

The .LNK file used in this attack disguises itself as an installer and displays a fake installation message in Chinese while silently downloading additional components, including a Python distribution package named ‘python-3.12.5-embed-amd64.zip’. The file creates a specific directory, extracts the contents of the zip archive, and downloads a malicious script from a paste.ee site, executing it in the background without displaying a console window.

If VSCode is not already installed on the system, the script downloads the VSCode CLI from a Microsoft source and ensures its execution for both non-admin and admin users, granting the attacker substantial control over the compromised system.

For persistence, a scheduled task named “MicrosoftHealthcareMonitorNode” is created to run the malicious script every four hours for non-admin users and at logon for admin users with elevated privileges. The script also ensures that a fresh remote tunnel can be established by checking for the running status of “code.exe”.

The researchers at Cyble emphasized the sophistication of this campaign and highlighted the need for advanced endpoint security solutions, regular review of scheduled tasks, limitations on user software installation permissions, and the deployment of advanced monitoring tools to detect unusual network activities and unauthorized access attempts.

In conclusion, the recent discovery of this cyber attack campaign underscores the evolving tactics of threat actors in utilizing legitimate tools for malicious purposes and serves as a reminder for organizations to stay vigilant and proactive in their cybersecurity measures.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...