336. Adversaries Keep Using Phishing to Compromise Linux Systems

Hello everyone!

I already mentioned that threat actors started to use phishing emails to attack Linux systems. No, not globally. At least, for now.

So, as you know, APT36 usually use malicious .desktop files, and hides malicious logic inside encoded data, for example:

sh -c "echo [base64_encoded_data] | base64 -d | sh"

Yes, we can see similar commands executed legitimately, and yes, it's another hunting opportunity:

event_type: "processcreatenix"

AND

cmdline: ("echo" AND "base64" AND "d" AND "sh")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge