:
:

Powered by GetResponse email marketing software

Actually Make Money Online

Your Helpful Resource About "Actually Make Money Online"

Saturday, May 27, 2023

SolarMarker Malware Uses Novel Techniques To Persist On Hacked Systems

 In a sign that threat actors continuously shift tactics and update their defensive measures, the operators of the SolarMarker information stealer and backdoor have been found leveraging stealthy Windows Registry tricks to establish long-term persistence on compromised systems.

Cybersecurity firm Sophos, which spotted the new behavior, said that the remote access implants are still being detected on targeted networks despite the campaign witnessing a decline in November 2021.

Boasting of information harvesting and backdoor capabilities, the .NET-based malware has been linked to at least three different attack waves in 2021. The first set, reported in April, took advantage of search engine poisoning techniques to trick business professionals into visiting sketchy Google sites that installed SolarMarker on the victim's machines.

Then in August, the malware was observed targeting healthcare and education sectors with the goal of gathering credentials and sensitive information. Subsequent infection chains documented by Morphisec in September 2021 highlighted the use of MSI installers to ensure the delivery of the malware.

The SolarMarker modus operandi commences with redirecting victims to decoy sites that drop the MSI installer payloads, which, while executing seemingly legitimate install programs such as Adobe Acrobat Pro DC, Wondershare PDFelement, or Nitro Pro, also launches a PowerShell script to deploy the malware.


"These SEO efforts, which leveraged a combination of Google Groups discussions and deceptive web pages and PDF documents hosted on compromised (usually WordPress) websites, were so effective that the SolarMarker lures were usually at or near the top of search results for phrases the SolarMarker actors targeted," Sophos researchers Gabor Szappanos and Sean Gallagher said in a report shared with The Hacker News.

The PowerShell installer is designed to alter the Windows Registry and drop a .LNK file into Windows' startup directory to establish persistence. This unauthorized change results in the malware getting loaded from an encrypted payload hidden amongst what the researchers called a "smokescreen" of 100 to 300 junk files created specifically for this purpose.

"Normally, one would expect this linked file to be an executable or script file," the researchers detailed. "But for these SolarMarker campaigns the linked file is one of the random junk files, and cannot be executed itself."

What's more, the unique and random file extension used for the linked junk file is utilized to create a custom file type key, which is ultimately employed to execute the malware during system startup by running a PowerShell command from the Registry.

The backdoor, for its part, is ever-evolving, featuring an array of functionalities that allow it to steal information from web browsers, facilitate cryptocurrency theft, and execute arbitrary commands and binaries, the results of which are exfiltrated back to a remote server.

"Another important takeaway […], which was also seen in the ProxyLogon vulnerabilities targeting Exchange servers, is that defenders should always check whether attackers have left something behind in the network that they can return to later," Gallagher said. "For ProxyLogon this was web shells, for SolarMarker this is a stealthy and persistent backdoor that according to Sophos telematics is still active months after the campaign ended."

More articles


  1. Hacker Tools For Ios
  2. Best Hacking Tools 2020
  3. Hack Tools For Ubuntu
  4. Hacker Tools Hardware
  5. What Is Hacking Tools
  6. Pentest Automation Tools
  7. Github Hacking Tools
  8. Hacking Tools Windows 10
  9. Hack Tools Download
  10. Hacking Tools Online
  11. Hacking Tools Hardware
  12. Bluetooth Hacking Tools Kali
  13. Pentest Tools Open Source
  14. Pentest Tools Android
  15. Hacking Tools 2020
  16. Best Hacking Tools 2019
  17. Pentest Tools Windows
  18. Underground Hacker Sites
  19. Hack Tool Apk No Root
  20. Nsa Hacker Tools
  21. Hack Tools Pc
  22. Hacking Tools For Windows Free Download
  23. Tools 4 Hack
  24. Install Pentest Tools Ubuntu
  25. Hacker Hardware Tools
  26. Pentest Tools Website
  27. Best Hacking Tools 2019
  28. Ethical Hacker Tools
  29. Usb Pentest Tools
  30. Beginner Hacker Tools
  31. Pentest Tools Port Scanner
  32. Nsa Hack Tools Download
  33. Hacker Tool Kit
  34. Hack Tools
  35. Hack Tools Mac
  36. Hacking Tools 2019
  37. Tools For Hacker
  38. Hacking Tools For Beginners
  39. Pentest Tools For Android
  40. Best Pentesting Tools 2018
  41. Hacker Tools For Pc
  42. Termux Hacking Tools 2019
  43. Hack Tools
  44. Hacking Tools Windows
  45. Hacker Tools For Pc
  46. Hack Tools Mac
  47. Pentest Tools Open Source
  48. Pentest Tools Website
  49. Best Hacking Tools 2020
  50. Bluetooth Hacking Tools Kali
  51. Pentest Tools Github
  52. Ethical Hacker Tools
  53. Hak5 Tools
  54. Hacker Search Tools
  55. Pentest Reporting Tools
  56. Hacking Tools Software
  57. Hacking Tools Mac
  58. Top Pentest Tools
  59. Pentest Tools Android
  60. Hacking Tools Windows 10
  61. Hacker
  62. Hackrf Tools
  63. Hacking Tools Free Download
  64. Pentest Tools Framework
  65. Pentest Tools For Mac
  66. Hacker Tools
  67. Nsa Hacker Tools
  68. Tools For Hacker
  69. Hacking Tools Hardware
  70. Hacking Tools 2019
  71. Termux Hacking Tools 2019
  72. Hacker Hardware Tools
  73. Hacking Tools For Windows 7
  74. Pentest Recon Tools
  75. Physical Pentest Tools
  76. Pentest Tools Tcp Port Scanner
  77. Best Hacking Tools 2020
  78. Pentest Tools Subdomain
  79. Hack Tools Github
  80. Pentest Tools Online
  81. Hack Tools 2019
  82. Hacking Tools Online
  83. New Hack Tools
  84. Hack Tools Pc
  85. Pentest Tools Github
  86. Hacking Tools For Mac
  87. Hacker Tools Online
  88. Growth Hacker Tools
  89. Hacking Tools Online
  90. Hacker Tools 2019
  91. Pentest Tools Website
  92. Hack Tools Pc
  93. Hacker Tools 2019
  94. Hack Tools For Mac
  95. Easy Hack Tools
  96. Usb Pentest Tools
  97. Hack Tools
  98. What Is Hacking Tools
  99. Hack Tools Github
  100. Hack Tools Online
  101. Nsa Hack Tools Download
  102. Pentest Tools List
  103. Hacking Tools For Games
  104. How To Install Pentest Tools In Ubuntu
  105. How To Make Hacking Tools
  106. Hacker Search Tools
  107. Hacker Tools Software
  108. Best Hacking Tools 2019
  109. Pentest Tools List
  110. Ethical Hacker Tools
  111. Pentest Tools Android
  112. Hacking Tools For Windows 7
  113. Tools 4 Hack
  114. Tools Used For Hacking
  115. Bluetooth Hacking Tools Kali
  116. Pentest Tools Url Fuzzer
  117. Hacking Tools
  118. Easy Hack Tools
  119. Pentest Tools Subdomain
  120. Pentest Tools For Ubuntu
  121. Pentest Tools Website
  122. Pentest Tools Open Source
  123. Tools Used For Hacking
  124. Growth Hacker Tools
  125. Hacker Tools Software
  126. Hacking App
  127. Tools For Hacker
  128. Hacker Hardware Tools
  129. Hacking Tools For Windows 7
  130. Hacker Search Tools
  131. Growth Hacker Tools
  132. Hack Tools For Ubuntu
  133. Hacking Tools 2020
  134. Hack Tools Mac
  135. Hak5 Tools
  136. Free Pentest Tools For Windows
  137. Hacker Tools Hardware
  138. Pentest Tools Website
  139. Hacking Tools Windows 10
  140. Hacking Tools For Windows Free Download
  141. Pentest Tools Website
  142. Pentest Tools Github
  143. Hacker Search Tools
  144. Hacker Search Tools
  145. Hacking Tools Free Download
  146. Hacking Tools For Kali Linux
  147. Github Hacking Tools
  148. Hacker Tools Free
  149. Pentest Tools Apk
  150. Pentest Tools Kali Linux
  151. Ethical Hacker Tools
  152. Pentest Tools For Windows
  153. Hacker Tools 2020
  154. Hacking Tools For Pc
  155. Hacking Tools For Windows Free Download
  156. Best Pentesting Tools 2018
  157. How To Hack
  158. Hack Tools For Windows
  159. Bluetooth Hacking Tools Kali
  160. Pentest Tools For Windows
  161. Hacks And Tools
  162. Hacker Tools For Mac

July 2019 Connector

OWASP
Connector
  July 2019

COMMUNICATIONS


Letter from the Vice-Chairman:
Since the last Connector, the Foundation has seen an extremely positive response to hosting a Global AppSec conference in Tel Aviv. The event was well attended with great speakers and training, furthering our mission to improving software security on a global level.

Next up we have a Global AppSec conference in both Amsterdam and Washington DC. We have migrated away from the regional naming convention so in previous years these events would have been Europe and US. Planning for both events is well underway with some excellent keynotes being lined up. We hope you can join us at these conferences.

As part of our community outreach, the Board and volunteers will be at BlackHat and DEFCON in Las Vegas next month. The Board will have a two-day workshop two days before the conference, but during the conference will look to talk to and collaborate with as many of the community as possible. We are really looking forward to this.

It is that time of the year again, the global Board of Directors nominations are now open. There are four seats up for re-election: mine (Owen), Ofer, Sherif, and Chenxi. I would ask those who would like to help drive the strategic direction of the Foundation to step forward. If you are not interested in running, why not submit questions to those who are running.

Recently the Executive Director has put forward a new initiative to change the way in which we utilize our funds in achieving our mission. The aim here is to have one pot of money where there will be fewer restrictions to chapter expenses. Funds will be provided to all, albeit as long as they are reasonable. The Board sees this as a positive step in our community outreach.

Finally, I would like to ask those who are interested in supporting the Foundation, reach out to each Board member about assisting in  one of the following strategic goals, as set out by the board at the start of the year:
  • Marketing the OWASP brand 
  • Membership benefits
  • Developer outreach
    • Improve benefits 
    • Decrease the possibility of OWASP losing relevance
    • Reaching out to management and Risk levels
    • Increase involvement in new tech/ ways of doing things – dev-ops
  • Project focus 
    • Get Universities involved
    • Practicum sponsored ideas
    • Internships 
  • Improve finances
  • Improve OWASP/ Board of Directors Perception
  • Process improvement
  • Get consistent Executive Director support
  • Community empowerment
Thanks and best wishes,
Owen Pendlebury, Vice Chair
 
UPDATE FROM THE EXECUTIVE DIRECTOR:

Change: If we change nothing, how could we expect to be in a different place a year from now? It has been truly a pleasure these first six months as your Interim Executive Director and I look forward to many years to come. Everyone has done a great job helping me see our opportunities and challenges. And the challenges are real - both internally and our position in the infosec community. I'm biased toward action.

My first task has been to redesign and optimize our operations. This will help staff to be more responsive while also saving the funds donated to the Foundation for our work on projects and chapters. This will also mean changes for you too. Communities work better when everyone always assumes we are all operating with the best of intentions. I can assure you that is the case of our Board, leaders, and staff. Evaluate our changes through this view and we'll save time and our collective sanity.

One big project that is coming to life is our new website. We will soon be entering our 20th year and we needed to not just refresh the look but completely retool it for the next 20 years. We are rebuilding it from the ground up and we can't wait to share our progress. Over the next month or so we will be sharing more information on that project. Stay tuned!

Mike McCamon, Interim Executive Director
OWASP FOUNDATION UPDATE FROM EVENTS DIRECTOR:

OWASP is pleased to announce our newest staff member, Sibah Poede will be joining us as the Events Coordinator and will begin full-time on 1 July.

Sibah is a graduate of London South Bank University where she received a BA (Hons) Marketing Management. Prior to that, she gained a diploma in Market & Economics at the Copenhagen Business School, Neil's Brock, Denmark. After graduation, she launched her career in London working with Hilton International hotels at the Conference and Events department. She eventually moved on to work with Kaplan International Colleges in the marketing department. Later, she joined Polyglobe Group, and then Uniglobe within the travel sector, where she was involved in global exhibitions and events, account management and sales.

She has lived in Denmark, Nigeria, Switzerland, and currently lives in London. In her spare time, she enjoys traveling and learning new cultures. She is also part of the Soup Kitchen Muswell Hill, a charity organization involved in feeding the homeless.
Please join us in welcoming Sibah to the team.

Emily Berman
Events Director
As many of you are aware, the OWASP Foundation has a Meetup Pro account.  We are requesting that all Chapters, Projects, Committees, and any other OWASP Meetup pages be transferred to the OWASP Foundation account.
OWASP Foundation will be the Organizer of the Group and all Leaders/Administrators will be Co-Organizers with the same edit rights.  
Once the Meetup page is transferred to our account, the Foundation will be funding the cost of the Meetup page.  If you do not want to continue being charged for your Meetup subscription account, you should then cancel it. Thereafter no Chapter, Project, etc. will be billed for Meetup.  Going forward the Foundation will no longer approve any reimbursement requests for Meetup.

  For instructions on how to move your Meetup group to the OWASP Foundation account please see https://www.owasp.org/index.php/OWASP_Meetup_Information


OWASP Members visit our website for $200 savings on Briefing passes for BlackHat USA 2019.

EVENTS 

You may also be interested in one of our other affiliated events:

REGIONAL AND LOCAL EVENTS
Event Date Location
OWASP Auckland Training Day 2019 August 10, 2019 Auckland, New Zealand
OWASP security.ac.nc-Wellington Day 2019 August 24, 2019 Wellington , New Zealand
OWASP Portland Training Day September 25, 2019 Portland, OR
OWASP Italy Day Udine 2019 September 27, 2019 Udine, Italy
OWASP Portland Day October 16,2019 Wroclaw, Poland
BASC 2019 (Boston Application Security Conference) October 19,2019 Burlington, MA
LASCON X October 24-25,2019 Austin, TX
OWASP AppSec Day 2019 Oct 30 - Nov 1, 2019 Melbourne, Australia
German OWASP Day 2019 December 9-10, 2019 Karlsruhe, Germany

PARTNER AND PROMOTIONAL EVENTS
Event Date Location
BlackHat USA 2019 August 3-8,2019 Las Vegas, Nevada
DefCon 27 August 8-11,2019 Las Vegas, Nevada
it-sa-IT Security Expo and Congress October 8-10, 2019 Germany

PROJECTS

Project Reviews from Global AppSec Tel Aviv 2019 are still being worked on.  Thank you to the reviewers that helped with it.  If you have time to help finalize the reviews, please contact me (harold.blankenship@owasp.com) and let me know.

We continue to push forward with Google Summer of Code.  First and student evaluations are past and we are in our third work period.  Final evaluations are due 19th August!
The Project Showcase at Global AppSec DC 2019 is shaping up to be a fantastic track.  Please note the following schedule.
 
  Schedule
Time Thursday, September 12
10:30 Secure Medical Device Deployment Standard Christopher Frenz
11:30 Secure Coding Dojo Paul Ionescu
1:00 p.m. Lunch Break
15:30 API Security Project Erez Yalon
16:30 Defect Dojo Matt Tesauro
Time Friday, September 13
10:30 Dependency Check Jeremy Long
11:30 SAMM John Ellingsworth, Hardik Parekh
1:00 p.m. Lunch Break
15:30 SEDATED Dennis Kennedy
16:30 <open>  

New Release of ESAPI # 2.2.0.0: 


On June 25, a new ESAPI release, the first in over 3 years, was uploaded to Maven Central. The release # is 2.2.0.0. The release includes over 100 closed GitHub Issues and over 2600 additional unit tests. For more details, see the release notes at:
https://github.com/ESAPI/esapi-java-legacy/blob/esapi-2.2.0.0/documentation/esapi4java-core-2.2.0.0-release-notes.txt

A special shout out to project co-leader Matt Seil, and major contributors Jeremiah Stacey and Dave Wichers for their ongoing invaluable assistance in this effort.
-- Kevin Wall, ESAPI project co-lead
OWASP ESAPI wiki page and the GitHub project page.

COMMUNITY

 
Welcome New OWASP Chapters
Indore, India
Panama City, Panama
Medellin, Colombia
Cartagena, Colombia
Aarhus, Denmark
Dhaka, Bangladesh
Edmonton, Canada
Lincoln, Nebraska
Sanaa, Yemen
Noida, India
Mumbai, India

MEMBERSHIP

 
We would like to welcome the following Premier and Contributor Corporate Members.

 Contributor Corporate Members

Join us
Donate
Our mailing address is:
OWASP Foundation
1200-C Agora Drive, # 232
Bel Air, MD 21014  
Contact Us
Unsubscribe






This email was sent to *|EMAIL|*
why did I get this?    unsubscribe from this list    update subscription preferences
*|LIST:ADDRESSLINE|*