{"id":2720,"date":"2024-09-25T19:34:06","date_gmt":"2024-09-25T19:34:06","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2720"},"modified":"2024-10-15T08:04:51","modified_gmt":"2024-10-15T08:04:51","slug":"powershell-critical-infrastructure-and-emotet-trojans-to-take-centre-stage-in-2019","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/powershell-critical-infrastructure-and-emotet-trojans-to-take-centre-stage-in-2019\/","title":{"rendered":"PowerShell, Critical Infrastructure and Emotet trojans to take centre stage in 2019"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"441\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/fairy-1887093_960_720.webp\" alt=\"\" class=\"wp-image-2721\" style=\"width:826px;height:auto\"\/><\/figure>\n\n\n\n<p>During the course of monitoring and defending client environments throughout 2018, LMNTRIX analysts have noticed a number of trends that show no sign of abating.&nbsp;<br><br>This year we saw attackers become much smarter and harder to detect. They\u2019ve thrown away a lot of the tools they used to rely on, in favour of tactics that slip by traditional defences completely undetected. While this used to be the calling card of more advanced attackers, methods like PowerShell attacks are becoming more popular every day.&nbsp;<br><br>By looking at the trends that took shape this year, there are a number of tools and tactics we expect to see attackers embrace in 2019. &nbsp;<br><br><strong>PowerShell and fileless attacks the new norm&nbsp;<\/strong><br><br>As a Windows scripting language, PowerShell provides unprecedented access to a machine\u2019s inner core, including unfettered access to APIs. It is inherently trusted by Windows, so any commands it executes are typically overlooked by security software.<br><br>Once an attacker hijacks PowerShell (or another trusted Windows tool), complete compromise of the victim\u2019s environment is almost inevitable.<br><br>Because no actual malware is used in these \u2018fileless\u2019 attacks, there isn\u2019t anything for antivirus programs to scan which means they bypass these controls without even trying.&nbsp;<br><br>This makes PowerShell attacks a favoured tactic of APTs.<br><br>So far, this type of attack has been favoured by Chinese and Russian nation-state actors. The list of those who have deployed PowerShell in campaigns reads like a who\u2019s who of bad guys; APT groups 3, 19, 28, 29, and 32, the financially focussed FINs 6, 7, 8, and 10, and, of course, who can forget Deep Panda, the corporate espionage group linked to China that was implicated in attacks against <a href=\"https:\/\/mashable.com\/2014\/11\/13\/chinese-hackers-australian-sites\/#wky1D3ISsaqq\" target=\"_blank\" rel=\"noopener\">Australian organisations<\/a> in the lead up to the G20.<br><br>So, while 2017 was the year of Ransomware, 2018 was the year that sophisticated fileless and PowerShell attacks reigned supreme.<br><br>Given the ease with which these attacks bypass defences, coupled with the complete pwnage once successful, this is a trend we expect to see continue well into 2019. &nbsp;<br><br><strong>Critical infrastructure in the crosshairs&nbsp;<\/strong><br><br>Before 2018, successful attacks against critical infrastructure were relatively rare \u2013 they were always feared, but highly uncommon. Not anymore.&nbsp;<br><br>This year, we saw the hacking group <a href=\"https:\/\/www.zdnet.com\/article\/greyenergy-new-malware-campaign-targets-critical-infrastructure-companies\/\" target=\"_blank\" rel=\"noopener\">GreyEnergy<\/a>, which took down Ukranian power grids in 2015, systematically target other critical infrastructure across the Eastern European nation and its neighbours.<br><br>Industrial control systems running SCADA software in Ukraine and Poland were GreyEnergy\u2019s primary targets this year. Rather than shut down the grids after compromise, the attackers preferred to remain undetected and cover their tracks after collecting the intelligence they were seeking. According to researchers, this new degree of stealth is because the attackers are either preparing to sabotage the networks at the most damaging time possible, or are setting the stage for another APT. Interestingly, fileless attacks were part of GreyEnergy\u2019s arsenal.&nbsp;<br><br>This year also saw the emergence of perhaps the most damaging critical infrastructure-specific malware since Stuxnet: <a href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2018\/10\/23\/how-the-russian-government-created-the-most-advanced-industrial-malware-ever-seen\/#40c2b9c22dfa\" target=\"_blank\" rel=\"noopener\">Triton<\/a>.<br><br>Widely believed to have been developed by Russia, Triton was used in an attack against a Saudi Arabian petro-chemical plant, shutting it down (although the shut down seemed to be inadvertent).&nbsp;<br><br>Triton targets <a href=\"https:\/\/www.zdnet.com\/article\/hackers-use-triton-malware-to-shut-down-plant-industrial-systems\/\" target=\"_blank\" rel=\"noopener\">Industrial Control Systems<\/a>, with the aim of handing over full control to the attackers.&nbsp;<br><br>Next year, given the ongoing geopolitical uncertainty, we expect to see more critical infrastructure-specific payloads targeting SCADA and ICS systems across the globe.&nbsp;<br><br><strong>\u201cEmotet\u201d \u2013 A constant threat<\/strong><br><br>When it comes to banking trojans, Emotet is the star atop the Christmas tree.&nbsp;<br><br>This year, it was distributed to such an extent that US-CERT issued a cyber alert in July warning users and organisations to be vigilant against the rising number of malspam campaigns spreading the trojan. It was described as \u201camong the most costly and destructive malware affecting state, local, tribal, and territorial governments, and the private and public sectors\u201d.<br><br>Despite the spotlight on Emotet, it was still used to target Christmas and Thanksgiving shoppers in a campaign designed to exploit the shopping frenzy around <a href=\"https:\/\/www.welivesecurity.com\/2018\/11\/23\/black-friday-special-emotet-filling-inboxes-infected-xml-macros\/\" target=\"_blank\" rel=\"noopener\">Black Friday and Cyber Monday<\/a>. &nbsp;<br><br>Primarily distributed in malspam campaigns, Emotet is typically hidden in attachments that claim to be receipts from financial institutions or holiday-themed <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/emotet-returns-with-thanksgiving-theme-and-better-phishing-tricks\/\" target=\"_blank\" rel=\"noopener\">greeting cards<\/a>. Once opened, Emotet downloads a secondary payload, most often a banking malware like Ursnif or IcedId, which then steals the victim\u2019s credit card details, passwords, or crypto wallets.&nbsp;<br><br>Given Emotet\u2019s massive proliferation in the past few weeks, despite an advisory from USCERT in July, we expect to see it deployed again in the New Year \u2013 possibly to exploit New Year\u2019s, Valentine\u2019s Day and End of Financial Year retail sales.<br><br>While cyber attackers by their very nature are difficult to predict, it does help to review the past year\u2019s trends to see what methods are gaining popularity. With 2018 seeing an increase in PowerShell attacks, campaigns against critical infrastructure and the emergence of Emotet, it\u2019s safe to say we\u2019ll be seeing these again long after we\u2019ve given up on our New Year\u2019s resolutions.&nbsp;<\/p>\n\n\n\n<p>On 2018-12-06<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the course of monitoring and defending client environments throughout 2018, LMNTRIX analysts have noticed a number of trends that show no sign of abating.&nbsp; This year we saw attackers become much smarter and harder to detect. They&rsquo;ve thrown away a lot of the tools they used to rely on, in favour of tactics that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2721,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2720","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2720"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2720\/revisions"}],"predecessor-version":[{"id":4282,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2720\/revisions\/4282"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2721"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}