Spreading malware via Telegram channels allows threat actors to bypass traditional detection mechanisms and reach a broad, unsuspecting audience
Category Archives: News
A Fifth of UK Enterprises “Not Sure” If NIS2 Applies
Over a fifth of large UK businesses aren’t sure of their compliance responsibilities under the new NIS2 directive
Five Charged in Scattered Spider Case
Five men have been indicted in connection with crimes committed by the Scattered Spider group
Stories from the SOC: Registry Clues to PDF Blues: A Tale of PUA Persistence
Executive Summary
Establishing persistence on a system allows a threat actor continued access or process execution across system restarts or other changes. For this reason, monitoring for and investigating persistence indicators are key components of any robust cybersecurity platform.
Two common persistence techniques are using AutoStart Execution of programs during system boot or logon (T1547) and abusing scheduled task functions (T1053). However, legitimate application activity also frequently involves AutoStart Execution and scheduled task functions, so defending against these techniques requires not only detection monitoring but also analysis by a cybersecurity professional.
During a recent incident involving a LevelBlue MDR SOC customer, an alarm that triggered for a Windows Autorun registry key for persistence was traced back to a potentially unwanted application (PUA). The PUA purportedly was acting as a PDF conversion application. A review of the initial alarm and relevant events revealed that the application had established a double layer of persistence by using both Scheduled Task creation and Autorun registry keys to execute JavaScript under the guise of a Chrome browser extension. Additional open-source intelligence (OSINT) tools identified the application as either a PUA or a potentially malicious file. An investigation was created for the customer with remediation recommendations and ultimately it was confirmed that the application was neither expected nor authorized within the customer’s environment, and it was removed.
The same application was later detected in another customer’s environment, but in this case, the customer had added a related file hash to an exclusion list. Because the LevelBlue MDR SOC analyst had recently investigated the application and identified it as potentially malicious, they were able to recommend removing the hash from the exclusion list and instead adding it to a blocklist.
Investigation
Initial Alarm Review
The investigation began with the LevelBlue analyst receiving an alarm that a Windows Autorun registry key named “ChromeBrowserAutoLaunch” had been added on an endpoint in the customer environment. While at first glance this appeared to be a key set to auto-launch Chrome with a browser extension loaded, analysis of the source process command line revealed several items that warranted further investigation.
Figure 1: The initial alarm for the autorun registry key creation
The “–no-startup-window” option: although this is commonly used for legitimate purposes, it can also indicate an attempt to hide activity from the end user. The pathway of the extension being loaded showed it was not an extension that the user had installed from the Chrome webstore. The expected pathway for extensions from the webstore would be “C:Users<username>AppDataLocalGoogleChromeUser DataDefaultExtensions”. While a sideloaded extension could still be legitimate, this gave additional cause to identify the origin of the registry key and extension.
No verifiable browser extension with the name “Extension Optimizer” was found in OSINT queries.
Abuse of browser extensions (T1176) is a known technique and malicious extensions have a history of being used for infostealing, adware, and browser hijack or redirect behaviors.
Expanded Investigation
Events Search
The analyst conducted an event search to identify the origin of the browser extension “ExtensionOptimizer”. This search returned process creation events that revealed the registry key was being added by a node.exe JavaScript process executing from an AppData folder named “PDFFlex” in the pathway “C:Users<username>AppDataLocalPDFFlexnode.exe”. An additional event was logged at the same time showing that node.exe was also being used to load the extension manually.
Figure 2: Events showing the registry keys origin and manual loading of the extension
The analyst searched for “PDFFlex” to understand if the application was common in the customer’s environment and to obtain additional artifacts regarding its origin or nature. The search revealed the application’s presence was anomalous and also uncovered events that could be used for further research.
The analyst obtained the filename of the application’s MSI installer, the version and publisher of the application, and an event that showed the creation of a daily scheduled task. This task was configured to execute “node.exe update.js –check-update” from the same “PDFFlex” folder pathway seen in the registry creation events. Further analysis showed that this task was responsible for executing the process that was creating the Autorun registry key in an apparent double layer of persistence established on the endpoint.
Figure 3: Scheduled task created to persistently add the registry key each day
Figure 4: Event showing the name of the application’s MSI installer file found in the user’s downloads folder
Figure 5: Installation event showing the version and publisher of the application “PDFFlex”
Event Deep-Dive
The analyst then performed several OSINT searches using the information obtained in event searches to verify the use case and potential legitimacy of the application.
No verifiable information was found for the MSI file “FreePDF_49402039.msi” or the publisher PDFFlex.io.
The analyst conducted a Whois search of the domain “pdfflex.io” and found that it was not registered.
A web search for “PDFFlex 3.202.1208.0” returned a verdict of “malicious activity” from the sandbox tool ANY.RUN, which provided a SHA256 file hash of 9c5d756045fd479a742b81241ccf439d02fc668581a3002913811a341278de43.
A search of the hash on VirusTotal revealed that it had been flagged as potentially malicious by multiple security vendors, including Sophos and Fortinet.
The analyst leveraged SentinelOne Deep Visibility to confirm that the hash for the MSI file on the customer’s endpoint matched the hash in the ANY.RUN report. At the time of the alarm, incidents were not being triggered on the hash. The SentinelOne tool also showed that the MSI file was signed by “Eclipse Media Inc,” which proved key in a later incident for another LevelBlue customer.
Figure 6:Deep Visibility search in SentinelOne showing the file hash for the MSI file found on the endpoint
Response
Building the Investigation
The analyst’s investigation and OSINT research returned several points to indicate that the “PDFFlex” application was likely not a desired application in the environment:
The presence of the application on the endpoint was anomalous for the environment as events for it were not observed for other endpoints.
The application had established what appeared to be a double layer of persistence by using a scheduled task and autorun registry key to create and launch an unverified browser extension “ExtensionOptimizer.”
OSINT reports for the MSI file indicated potentially malicious behavior.
Together, these data points indicated that the application was neither desired nor expected in the customer environment and could be classified as a PUA/PUP, if not as outright malicious, and thus should be removed from the endpoint.
Customer Interaction
The analyst created an investigation that detailed the findings regarding the application “PDFFlex,” the browser extension “ExtensionOptimizer,” the observed persistence behaviors, and the findings of the OSINT research. They recommended that the customer reimage the endpoint or remove the associated AppData folders for “PDFFlex” and “ExtensionOptimizer” the scheduled tasks, and the associated registry keys. Shortly after the initial investigation, the LevelBlue MDR SOC identified another endpoint in the customer’s environment that was exhibiting the same persistence indicators under the application name “PDFTool.” The customer confirmed that the applications were not authorized and ultimately elected to remove the endpoints from service and replace them.
While the MSI file initially did not trigger an alarm, several days after the investigation, its hash was added to the SentinelOne Cloud global blocklist and began to trigger alarms. During review of one of these for another customer, a LevelBlue analyst found that the customer had added a hash-based exclusion for a similarly named pdf-related MSI file with a different file hash but also signed by “Eclipse Media Inc.”
This customer had previously observed the threat but added the hash to the exclusion list in SentinelOne due to no negative reports observed while researching the file using OSINT tools. The LevelBlue team’s knowledge of the signer “Eclipse Media Inc” along with their recent analysis of the application allowed them to inform the customer about the risks of the application. Based on the analyst’s recommendation, the exclusion was removed and a blocklist action for the alternate hash was added instead.
Conclusion
This incident highlights not only the need for monitoring and alerting on scheduled task and Autorun registry key creation but also the value of having expert analysis of these events. In this investigation, the analyst’s use of OSINT and sandboxing tools such as ANY.RUN provided the critical context needed to protect the customer’s environment from threats. In addition, the analyst’s research and prior knowledge of the file signer “Eclipse Media Inc” later proved key in protecting another LevelBlue customer that had created an exclusion for what was likely the same PUA under a different file hash.
Smashing Security podcast #394: Digital arrest scams and stream-jacking
In our latest episode we discuss how a woman hid under the bed after scammers told her she was under “digital arrest”, how hackers are hijacking YouTube channels through malicious sponsorship deals, and how one phone company is turning the tables on fraudsters through deepfake AI.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest Maria Varmazis.
Five Privilege Escalation Flaws Found in Ubuntu needrestart
Five LPE flaws in Ubuntu’s needrestart utility enable attackers to gain root access in versions prior to 3.8
60% of Emails with QR Codes Classified as Spam or Malicious
60% of QR code emails are spam according findings from Cisco Talos, who also identified attackers using QR code art to bypass security filters
Steve Bellovin’s Retirement Talk
Chinese APT Group Targets Telecom Firms Linked to Belt and Road Initiative
CrowdStrike unveiled a new Chinese-aligned hacking group allegedly spying on telecom providers
Enhancing Cyber Resilience in US SLED Organizations
2024 Cyber Resilience Research Unveils US SLED Sector Challenges
New data illuminates how US SLED leaders can prioritize resilience.
US SLED (State, Local, and Higher Education) organizations find themselves at the intersection of progress and peril in the rapidly evolving digital landscape. The latest data underscores that the trade-offs are significant and pose substantial risks to US SLED providers.
Get your complimentary copy of the report
One of the foremost obstacles is the disconnect between senior executives and cybersecurity priorities. Despite recognizing cyber resilience as a crucial imperative, many US SLED organizations struggle to secure the support and resources from top leadership. This lack of engagement hinders progress and leaves institutions vulnerable to potential breaches.
Meanwhile, technology continues to advance astonishingly, as do the risks posed by cyber threats. The 2024 LevelBlue Futures™ Report reveals this delicate balancing act between innovation and security within the US SLED sector. Our comprehensive analysis identifies opportunities for deeper alignment between executive leadership and technical teams.
The Elusive Quest for Cyber Resilience in US SLED
Imagine a world where US SLED organizations are impervious to cyber threats—where every aspect of an operation is fortified against disruptions. This is the lofty ideal of cyber resilience, yet it remains an elusive goal for many US SLED providers. The rapid evolution of computing has transformed the IT landscape, blurring the lines between legacy systems, cloud computing, and digital transformation initiatives. While these advancements bring undeniable benefits, they also introduce unprecedented risks.
Our research indicates that 86% of US SLED respondents agree that dynamic computing increases their risk exposure. In a world where cybercriminals are becoming increasingly sophisticated, the need for cyber resilience has never been more urgent. From ransomware attacks to crippling DDoS incidents, US SLED organizations operate in a climate where a single breach can have catastrophic consequences.
Exploring the Relationship Between Leadership and Cyber Resilience
Our survey of 1,050 C-suite and senior executives, including 197 from the finance sector across 18 countries, highlights the pressing need for cyber resilience. The report is designed to foster thoughtful discussions about vulnerabilities and improvement opportunities.
In the report, you’ll:
Discover why US SLED leaders and tech teams must prioritize cyber resilience.
Learn about the critical barriers to achieving cyber resilience.
Uncover the importance of business context and operational issues in prioritizing resilience.
Recognizing the Imperative of Cyber Resilience
US SLED leaders are called to chart a course toward greater security and preparedness. Reacting to cyber threats as they arise is no longer enough; organizations must proactively bolster their defenses and cultivate a culture of resilience from within.
Our research delves into the multifaceted challenges facing US SLED organizations in their quest for cyber resilience. From limited visibility into IT estates to the complexity of integrating new technologies with legacy systems, US SLED providers grapple with deep-seated barriers that hinder their ability to withstand cyber threats.