Новости компьютерной безопасности:

  Latest News

Hacktivist Group Exploit WinRAR Vulnerability to Encrypt Windows & Linux

С сайта: Vulnerability(cybersecuritynews.com)

Hacktivist Group Exploit WinRAR Vulnerability to Encrypt Windows & Linux

Author: Dhivya

The hacktivist group Head Mare has leveraged a vulnerability in WinRAR to infiltrate and encrypt systems running on Windows and Linux.

This group, active since the onset of the Russo-Ukrainian conflict, has primarily targeted organizations in Russia and Belarus. Their attacks are characterized by sophisticated techniques that focus on causing maximum disruption.

The Vulnerability: CVE-2023-38831
According to the Secure List report, the vulnerability exploited by Head Mare, identified as CVE-2023-38831, resides in WinRAR, a popular file archiver utility.

cyber security newsHead Mare post on X
This flaw allows attackers to execute arbitrary code on a victim’s system through specially crafted archive files. By exploiting this vulnerability, Head Mare can more effectively deliver and conceal its malicious payloads.

How the Exploit Works
When a user attempts to open a seemingly legitimate document within a compromised archive, the malicious code is executed, granting the attackers access to the system.

cyber security newsVerdicts with which our products detect PhantomDL samples: the malware is recognized, among other things, as an exploit for CVE-2023-38831
Verdicts with which our products detect PhantomDL samples: the malware is recognized, among other things, as an exploit for CVE-2023-38831

This method of attack is hazardous because it relies on user interaction, making it harder to detect through traditional security measures.

Head Mare’s Tactics and Tools
Unlike many hacktivist groups, Head Mare employs a mix of publicly available software and custom malware.

Their toolkit includes:

  • LockBit and Babuk Ransomware : Used to encrypt files and demand ransoms.
  • PhantomDL and PhantomCore : Custom malware used for initial access and exploitation.
  • Sliver : An open-source command and control (C2) framework for managing compromised systems.

Initial Access and Persistence
Head Mare gains initial access through phishing campaigns, distributing malicious archives that exploit the WinRAR vulnerability. Once inside, they use various methods to maintain persistence, such as adding entries to the Windows registry and creating scheduled tasks.

Head Mare’s attacks have affected various

industries, including government institutions, transportation, energy, manufacturing, and entertainment. Their primary objective appears to be disrupting systems and demanding ransoms rather than solely financial gain.

The group maintains a public presence on social media, where it occasionally posts information about its victims.

Unlike some hacktivist groups, Head Mare also demands ransoms for data decryption, adding a financial dimension to its politically motivated attacks.

Analysis of Attack Infrastructure
Head Mare’s sophisticated infrastructure utilizes VPS/VDS servers as C2 hubs. They employ tools like ngrok and rsockstun for pivoting, allowing them to navigate private networks using compromised machines as intermediaries.

The group’s C2 servers host various utilities used in different stages of their attacks. These include PHP shells for executing commands and PowerShell scripts for privilege escalation.

cyber security newsPhantomDL communication with C2
cyber security newsPhantomCore C2 connection
Head Mare employs several techniques to evade detection, such as disguising its malware as legitimate software.

For instance, it renames ransomware samples to mimic applications like OneDrive and VLC and places them in typical system directories.

Obfuscation and Disguise
The malware samples are often obfuscated using tools like Garble, making them harder to detect and analyze. Additionally, the group uses double extensions in phishing campaigns, making malicious files appear as harmless documents.

cyber security newsAnalysis of Head Mare’s C2 Infrastructure
The activities of Head Mare highlight the evolving nature of cyber threats in the context of geopolitical conflicts.

Organizations in Russia and Belarus should prioritize patching vulnerabilities like CVE-2023-38831 and enhance their phishing detection capabilities.

Regular security audits and employee training on recognizing phishing attempts can also help mitigate the risk of such attacks.

As hacktivist groups continue to refine their tactics, the importance of robust cybersecurity measures cannot be overstated.

The case of Head Mare reminds us of the complex interplay between technology and international politics, where digital tools become weapons in broader conflicts.



#Cyber_Security #Cyber_Security_News #Vulnerability #cyber_security #cyber_security_news #vulnerability

Оригинальная версия на сайте: Hacktivist Group Exploit WinRAR Vulnerability to Encrypt Windows & Linux
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.