Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools, and fileless malware techniques might be the work of a single group of hackers.
An investigation started by security researchers from Morphisec into a recent email phishing attack against high-profile enterprises pointed to a group that uses techniques documented by several security companies in seemingly unconnected reports over the past two months.
“During the course of the investigation, we uncovered a sophisticated fileless attack framework that appears to be connected to various recent, much-discussed attack campaigns,” Michael Gorelik, Morphisec’s vice president of research and development, said in . “Based on our findings, a single group of threat actors is responsible for many of the most sophisticated attacks on financial institutions, government organizations, and enterprises over the past few months.”
The Morphisec investigation started with a phishing email that distributed a Microsoft Word document with malicious macros inside. When opened, the document asked the victim to click on the “Enable Content” button in order to view the supposedly protected content. Doing so allowed the malicious embedded code to execute.
against more than 100 enterprises, banks, and government organizations from around the world. Those attacks used very similar techniques and tools, including PowerShell, Mimikatz, and Meterpreter.
in early March in a PowerShell-based attack that they dubbed DNSMessenger.
The fileless malware techniques and DNS communication method were also described by researchers from FireEye about attacks targeting employees from various U.S. organizations whose jobs involved Securities and Exchange Commission (SEC) filings. FireEye attributed those attacks to a financially motivated attack group that the company has been tracking for a while under the name FIN7.
Previous FIN7 operations used the same malware as a group that Kaspersky tracks as Carbanak and is believed to be responsible for the theft of more than $500 million from financial organizations and other companies.
The Morphisec researchers couldn’t establish the identity of the group but had a brief interaction with one of the attackers.
“It was clear that a person from the other side was waiting to connect on his Meterpreter session,” Gorelik said. “During the brief interaction, our researchers tried to identify the actor. The attackers immediately blocked the connection and later shut down the C2 server entirely, thereby losing their foothold in the systems of victims connected to that communication server.”
In light of these attacks, organizations, especially those from the financial sector, should ensure that they have monitoring systems in place that can detect dual-use tools like Mimikatz and Meterpreter. They should also monitor for unauthorized PowerShell scripts and code loaded directly in memory that creates no executable files on disk.