Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
BlackSuit Ransomware Deployed via Fake Zoom Installer in Under Three Days
Advertisements

A threat actor successfully compromised a network by tricking a user into downloading a malicious file disguised as a Zoom installer. This initial access led to the deployment of BlackSuit ransomware across the environment in less than three days.

Initial Access Through Malicious Installer

The attack began when a user downloaded a malicious Microsoft Installer (.msi) package named Zoom-x64.msi, likely delivered through search engine optimization (SEO) poisoning or malvertising. Upon execution, the installer ran a batch script which in turn launched a PowerShell script. This script established persistence on the host by creating a scheduled task named MicrosoftEdgeUpdateTask. To avoid immediate suspicion from the user, the malware also launched a legitimate Zoom installer, creating the appearance of a normal software installation.

Reconnaissance, Exfiltration, and Ransomware Deployment

Following the initial compromise, the threat actor used tools including ngrok.exe and anydesk.exe to establish remote access and control. Active Directory reconnaissance was conducted using AdFind.exe, and the actor moved laterally to other systems on the network using Remote Desktop Protocol (RDP). To gain access to credentials, the attacker used procdump64.exe to dump the memory of the Local Security Authority Subsystem Service (LSASS). For defense evasion, the threat actor attempted to clear Windows Event Logs using wevtutil.exe and configured compromised systems to boot into Safe Mode with Networking using BCDEdit commands. Before the final stage, the actor exfiltrated data from the network using the FileZilla application. The attack culminated in the deployment of BlackSuit ransomware, encrypting files across the compromised environment.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading