336. Adversaries Keep Using Phishing to Compromise Linux Systems
Hello everyone!
I already mentioned that threat actors started to use phishing emails to attack Linux systems. No, not globally. At least, for now.
So, as you know, APT36 usually use malicious .desktop files, and hides malicious logic inside encoded data, for example:
sh -c "echo [base64_encoded_data] | base64 -d | sh"
Yes, we can see similar commands executed legitimately, and yes, it's another hunting opportunity:
event_type: "processcreatenix"
AND
cmdline: ("echo" AND "base64" AND "d" AND "sh")
See you tomorrow!

Comments
Post a Comment