{"id":639,"date":"2024-05-09T06:20:54","date_gmt":"2024-05-09T06:20:54","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=639"},"modified":"2025-07-28T08:24:44","modified_gmt":"2025-07-28T08:24:44","slug":"powerdrop-new-powershell-malware-targeting-us-aerospace-industry","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/powerdrop-new-powershell-malware-targeting-us-aerospace-industry\/","title":{"rendered":"PowerDrop \u2013 New PowerShell Malware Targeting US Aerospace Industry"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/05\/PowerDrop.webp\" alt=\"\" style=\"width:761px;height:auto\"\/><\/figure>\n\n\n\n<p>A new PowerShell malware is on the loose, targeting the US aerospace defense industry, and the sneaky threat actor is still at large!<\/p>\n\n\n\n<p>Dubbed \u201cPowerDrop,\u201d this malware was spotted by the cybersecurity heroes at Adlumin. They stumbled upon it in the network of a defense contractor, using their super machine learning skills to sniff out this nasty piece of code.<\/p>\n\n\n\n<p>PowerDrop is no ordinary malware; it\u2019s got some fancy moves up its sleeve! By using PowerShell and Windows Management Instrumentation (WMI), it\u2019s pulling off advanced techniques to stay hidden in the shadows. This tricky malware is like a sneaky post-exploitation ninja, collecting sensitive info from its victim\u2019s network once it\u2019s got its foot in the door.<\/p>\n\n\n\n<p>Analysts suspect that PowerDrop slithers into its target\u2019s network through phishing emails or devious spoofed download sites. Sneaky and clever, right?<\/p>\n\n\n\n<p>Who\u2019s behind this sinister attack? The threat actor remains a mystery, but the analysts think it\u2019s probably one of those state-sponsored advanced persistent threat (APT) groups.<\/p>\n\n\n\n<p>The use of PowerShell in cyberattacks has been on the rise, thanks to its ability to cook up scripts that can slip right under the radar of common computing environments. It\u2019s like the malware equivalent of a chameleon, blending right in!<\/p>\n\n\n\n<p>We don\u2019t know the full impact of this attack yet, but the good news is, there\u2019s no evidence of initial compromise or data theft as of now.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">LMNTRIX Perspective<\/h3>\n\n\n\n<p>The increased use of scripting languages that aid cyber criminals with their attacks should keep organizations vigilant and aware of their use of configuration management program within Windows environments.<\/p>\n\n\n\n<p>This is especially the case for organizations within the aerospace defense industry as they have been the main target for these attacks. Since the point of entry for these attacks have been identified through phishing emails and spoofed download sites, organizations should assess their security awareness and training of users to ensure their programs and campaigns are covering the latest threat to prevent and mitigate user risks.<\/p>\n\n\n\n<p>Conducting periodic vulnerability scans on Windows systems would also ensure any vulnerabilities are identified early on and patched accordingly.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Recommendations<\/h3>\n\n\n\n<p>Conduct and maintain vulnerability scans on Windows systems and perform periodic patching.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-powerdrop-powershell-malware-targets-us-aerospace-industry\/\" target=\"_blank\" rel=\"noopener\">Bleeping Computer<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/thehackernews.com\/2023\/06\/new-powerdrop-malware-targeting-us.html\" target=\"_blank\" rel=\"noopener\">The Hacker News<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.secureworld.io\/industry-news\/powerdrop-cyber-threat-aerospace-industry\" target=\"_blank\" rel=\"noopener\">SecureWorld<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cyware.com\/news\/new-powerdrop-malware-targets-us-aerospace-industry-146aa0d1\" target=\"_blank\" rel=\"noopener\">Cyware<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A new PowerShell malware is on the loose, targeting the US aerospace defense industry, and the sneaky threat actor is still at large! Dubbed &ldquo;PowerDrop,&rdquo; this malware was spotted by the cybersecurity heroes at Adlumin. They stumbled upon it in the network of a defense contractor, using their super machine learning skills to sniff out [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":642,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=639"}],"version-history":[{"count":2,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/639\/revisions"}],"predecessor-version":[{"id":4002,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/639\/revisions\/4002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/642"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}