<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Opalsec: Tech Talk]]></title><description><![CDATA[Bite-sized technical analysis of emerging trends, vulnerabilities, and more.]]></description><link>https://opalsec.substack.com/s/tech-talk</link><image><url>https://substackcdn.com/image/fetch/$s_!8Qii!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7d6efd-e05e-445a-add1-5d5598b68538_900x900.png</url><title>Opalsec: Tech Talk</title><link>https://opalsec.substack.com/s/tech-talk</link></image><generator>Substack</generator><lastBuildDate>Sat, 18 Apr 2026 16:36:35 GMT</lastBuildDate><atom:link href="https://opalsec.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Opalsec]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[Opalsec@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[Opalsec@substack.com]]></itunes:email><itunes:name><![CDATA[Opalsec]]></itunes:name></itunes:owner><itunes:author><![CDATA[Opalsec]]></itunes:author><googleplay:owner><![CDATA[Opalsec@substack.com]]></googleplay:owner><googleplay:email><![CDATA[Opalsec@substack.com]]></googleplay:email><googleplay:author><![CDATA[Opalsec]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Detection is no substitute for Mitigation]]></title><description><![CDATA[A walled garden may not be the solution - but it sure does help.]]></description><link>https://opalsec.substack.com/p/detection-is-no-substitute-for-mitigation</link><guid isPermaLink="false">https://opalsec.substack.com/p/detection-is-no-substitute-for-mitigation</guid><dc:creator><![CDATA[Opalsec]]></dc:creator><pubDate>Mon, 08 May 2023 10:37:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Nhjk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F348b4016-ff68-4102-9b5c-6a3404604767_900x556.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Nhjk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F348b4016-ff68-4102-9b5c-6a3404604767_900x556.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Nhjk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F348b4016-ff68-4102-9b5c-6a3404604767_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!Nhjk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F348b4016-ff68-4102-9b5c-6a3404604767_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!Nhjk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F348b4016-ff68-4102-9b5c-6a3404604767_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!Nhjk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F348b4016-ff68-4102-9b5c-6a3404604767_900x556.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Nhjk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F348b4016-ff68-4102-9b5c-6a3404604767_900x556.png" width="900" height="556" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/348b4016-ff68-4102-9b5c-6a3404604767_900x556.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:556,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:746473,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Nhjk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F348b4016-ff68-4102-9b5c-6a3404604767_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!Nhjk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F348b4016-ff68-4102-9b5c-6a3404604767_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!Nhjk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F348b4016-ff68-4102-9b5c-6a3404604767_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!Nhjk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F348b4016-ff68-4102-9b5c-6a3404604767_900x556.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><strong>Preface:</strong></p><p>I&#8217;ve been asked on multiple occasions if we could write a custom detection as a &#8220;compensating control&#8221; to mitigate the risk of a vulnerability being exploited, in order to buy system admins more time or better yet to <strong>altogether negate the need to take a critical business service offline for patching</strong>. This article will explain why the answer has never been &#8220;yes&#8221;, due to the inherent limitations of Threat Detection and Detection Engineering.</p></div><p>We reported <a href="https://opalsec.substack.com/i/117827826/papercut-mass-exploitation-aided-by-public-poc-exploit">last week</a> on the widespread exploitation of a critical vulnerability in the PaperCut print management software, perpetrated by <strong>CL0P and LockBit ransomware affiliates</strong> and helped along by a public PoC exploit released by researchers at Horizon3.</p><p>On the flip side of that were defenders, creating and sharing detection rules to assist those who couldn&#8217;t/hadn&#8217;t yet patched the vulnerability, or who wanted to monitor for possible exploitation as a precaution. </p><p>While a variety were fielded utilising Sysmon logs, device-generated logs, and even network telemetry - the team at Vulncheck last week proved why <strong>detections can&#8217;t truly compensate for a lack of patching</strong>, by bypassing all of them in a <a href="https://vulncheck.com/blog/papercut-rce">revised PoC</a>.</p><div id="youtube2-NTYQaZsFxiI" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;NTYQaZsFxiI&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/NTYQaZsFxiI?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Now you see me, now you don&#8217;t</h2><p>The <a href="https://github.com/huntresslabs/threat-intel/blob/main/2023/2023-04/20-PaperCut/win_susp_papercut_code_execution.yml">Sysmon detections</a> largely hinged on alerting where the PaperCut application process (pc-app.exe) spawned an <strong>unexpected child process like cmd.exe or powershell.exe</strong>.</p><blockquote><p>This can be - and indeed already is - circumvented by spawning a reverse shell in a way that <strong>requires an intermediary process</strong>, for example when dropping a <a href="https://github.com/rapid7/metasploit-javapayload/blob/dee9809f78a7e86981a8f39e0622f05458c85940/javapayload/src/main/java/metasploit/Payload.java#L82">Java instance of the Meterpreter shell</a>:</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!THCz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2543812-6f1e-4f7d-ada5-de96850588c8_1146x478.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!THCz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2543812-6f1e-4f7d-ada5-de96850588c8_1146x478.png 424w, https://substackcdn.com/image/fetch/$s_!THCz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2543812-6f1e-4f7d-ada5-de96850588c8_1146x478.png 848w, https://substackcdn.com/image/fetch/$s_!THCz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2543812-6f1e-4f7d-ada5-de96850588c8_1146x478.png 1272w, https://substackcdn.com/image/fetch/$s_!THCz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2543812-6f1e-4f7d-ada5-de96850588c8_1146x478.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!THCz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2543812-6f1e-4f7d-ada5-de96850588c8_1146x478.png" width="1146" height="478" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2543812-6f1e-4f7d-ada5-de96850588c8_1146x478.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:478,&quot;width&quot;:1146,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;meterpreter jar spawned on windows&quot;,&quot;title&quot;:&quot;meterpreter jar spawned on windows&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="meterpreter jar spawned on windows" title="meterpreter jar spawned on windows" srcset="https://substackcdn.com/image/fetch/$s_!THCz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2543812-6f1e-4f7d-ada5-de96850588c8_1146x478.png 424w, https://substackcdn.com/image/fetch/$s_!THCz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2543812-6f1e-4f7d-ada5-de96850588c8_1146x478.png 848w, https://substackcdn.com/image/fetch/$s_!THCz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2543812-6f1e-4f7d-ada5-de96850588c8_1146x478.png 1272w, https://substackcdn.com/image/fetch/$s_!THCz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2543812-6f1e-4f7d-ada5-de96850588c8_1146x478.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 1: modifying the PoC to drop the Java Meterpreter shell will circumvent this detection logic</figcaption></figure></div><p>While Horizon3 researchers were right to point to native log entries indicative of the exploits targeting of the software&#8217;s print scripting interfaces - this, again, was bypassed by Vulncheck who instead found they could abuse the User/Group Sync &#8220;custom programs&#8221; to achieve the same effect while also <strong>avoiding triggering those alerts altogether.</strong></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Opalsec is a reader-supported publication. To receive new posts and support my work, please consider becoming a paid subscriber!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F&quot;,&quot;text&quot;:&quot;Upgrade Subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F"><span>Upgrade Subscription</span></a></p><div><hr></div><p>The Suricata IDS rule proposed by Proofpoint also proved brittle - because the rule searched for the specific string <em>"/app?service=page/SetupCompleted"</em> as an indication of attempted exploitation, it can also be bypassed by <strong>inserting junk values that wouldn&#8217;t impact the request</strong>, such as <em>page//SetupCompleted </em>or <em>random=1&amp;page/SetupCompleted</em>. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K752!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ccead35-48d0-4354-97ec-702b52881d94_1175x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K752!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ccead35-48d0-4354-97ec-702b52881d94_1175x300.png 424w, https://substackcdn.com/image/fetch/$s_!K752!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ccead35-48d0-4354-97ec-702b52881d94_1175x300.png 848w, https://substackcdn.com/image/fetch/$s_!K752!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ccead35-48d0-4354-97ec-702b52881d94_1175x300.png 1272w, https://substackcdn.com/image/fetch/$s_!K752!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ccead35-48d0-4354-97ec-702b52881d94_1175x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K752!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ccead35-48d0-4354-97ec-702b52881d94_1175x300.png" width="1175" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ccead35-48d0-4354-97ec-702b52881d94_1175x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1175,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:60644,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!K752!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ccead35-48d0-4354-97ec-702b52881d94_1175x300.png 424w, https://substackcdn.com/image/fetch/$s_!K752!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ccead35-48d0-4354-97ec-702b52881d94_1175x300.png 848w, https://substackcdn.com/image/fetch/$s_!K752!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ccead35-48d0-4354-97ec-702b52881d94_1175x300.png 1272w, https://substackcdn.com/image/fetch/$s_!K752!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ccead35-48d0-4354-97ec-702b52881d94_1175x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>It&#8217;s an Art, not a Science</h2><p>Naturally, the original rules could be modified to alert on a child process of java.exe or to search for a string consistent across variations such as &#8220;<em>SetupCompleted</em>&#8221; - but that would introduce a <strong>high risk of generating false positive alerts.</strong></p><div class="pullquote"><p>This brings me to the point of this post - Detection Engineering is a constant battle to maintain a (heavily subjective) balance between being specific enough to generate <strong>as few false positive alerts as possible</strong>, while also being broad enough to <strong>account for attacker permutations and alternate components</strong> that can be inserted into the exploit chain to evade our detections.</p></div><p>The PaperCut vulnerability is the perfect example of <strong>why detections are not a substitute for mitigation</strong> - the quality of your detection hinges entirely on how well you&#8217;ve accounted for <strong>all possible implementations or variations of a technique or procedure</strong>. </p><p>Should the authors of the first round of detections have been expected to know that User/Group Sync &#8220;custom programs&#8221; could also be targeted to exploit the vulnerability? Probably not, but <strong>the confidence in those detections - which many security teams would be relying on - would have still been moderate to high, in the absence of evidence</strong> that they had in fact missed another attack path for the vulnerability. </p><blockquote><p>In other words - <strong>you can&#8217;t know what you don&#8217;t know</strong>, and that&#8217;s a problem when an organisation is reliant on detections for mitigation.</p></blockquote><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/p/detection-is-no-substitute-for-mitigation?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Found this useful? Why not share it!</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/p/detection-is-no-substitute-for-mitigation?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://opalsec.substack.com/p/detection-is-no-substitute-for-mitigation?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><div><hr></div><h2>The saga continues&#8230;</h2><p>While I&#8217;ve got you - if two ransomware groups and a publicly available exploit PoC weren&#8217;t enough to get you patching - Microsoft have <a href="https://twitter.com/MsftSecIntel/status/1654610012457648129">also reported </a>spotting <strong>Iranian actors</strong> getting in on the action, with Mint Sandstorm (formerly PHOSPHORUS) and Mango Sandstorm (formerly MERCURY) observed <strong>opportunistically exploiting the vulnerability across a range of industries and geographies</strong>.</p>]]></content:encoded></item><item><title><![CDATA[The Defender's Guide to the 3CX Supply Chain Attack ]]></title><description><![CDATA[How it happened, why it matters, and what's being done about it.]]></description><link>https://opalsec.substack.com/p/the-defenders-guide-to-the-3cx-supply</link><guid isPermaLink="false">https://opalsec.substack.com/p/the-defenders-guide-to-the-3cx-supply</guid><dc:creator><![CDATA[Opalsec]]></dc:creator><pubDate>Sat, 01 Apr 2023 10:11:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4iwx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4iwx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4iwx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4iwx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png" width="900" height="556" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ff75961e-85b9-40d6-8938-6f9360b95944_900x556.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:556,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:746473,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!4iwx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>What the heck is going on?</h1><p>This all kicked off on Wednesday with SentinelOne&#8217;s release of a post that looked at a campaign dubbed &#8220;<a href="https://www.sentinelone.com/blog/smoothoperator-ongoing-campaign-trojanizes-3cx-software-in-software-supply-chain-attack/">Smooth Operator</a>&#8221;, which essentially found that the 3CX Voice Over Internet Protocol (VOIP) desktop client - used by some <strong>600,000 companies worldwide and over 12 million daily users</strong> - had been compromised with a <strong>malicious update</strong>. </p><blockquote><p>Moreover, Huntress Labs <a href="https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats">found </a><strong>242,519</strong> <strong>internet-exposed 3CX phone management systems </strong>as of the 30th March, and a further <strong>2,783</strong>&nbsp;<strong>instances in their customer networks</strong> <strong>running the trojanized software</strong>.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zwpq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F326ee6df-4bd4-48b0-be4b-e90e0b739e35_1600x909.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zwpq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F326ee6df-4bd4-48b0-be4b-e90e0b739e35_1600x909.png 424w, https://substackcdn.com/image/fetch/$s_!Zwpq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F326ee6df-4bd4-48b0-be4b-e90e0b739e35_1600x909.png 848w, https://substackcdn.com/image/fetch/$s_!Zwpq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F326ee6df-4bd4-48b0-be4b-e90e0b739e35_1600x909.png 1272w, https://substackcdn.com/image/fetch/$s_!Zwpq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F326ee6df-4bd4-48b0-be4b-e90e0b739e35_1600x909.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zwpq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F326ee6df-4bd4-48b0-be4b-e90e0b739e35_1600x909.png" width="1456" height="827" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/326ee6df-4bd4-48b0-be4b-e90e0b739e35_1600x909.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:827,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zwpq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F326ee6df-4bd4-48b0-be4b-e90e0b739e35_1600x909.png 424w, https://substackcdn.com/image/fetch/$s_!Zwpq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F326ee6df-4bd4-48b0-be4b-e90e0b739e35_1600x909.png 848w, https://substackcdn.com/image/fetch/$s_!Zwpq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F326ee6df-4bd4-48b0-be4b-e90e0b739e35_1600x909.png 1272w, https://substackcdn.com/image/fetch/$s_!Zwpq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F326ee6df-4bd4-48b0-be4b-e90e0b739e35_1600x909.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>What can I do?</h1><p>Well for one - ensure you&#8217;ve <strong>removed any exceptions that might have been created for the application</strong>. </p><p>The compromised software has been assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059">CVE-2023-29059</a>, and impacts the following versions on Windows and MacOS:</p><ol><li><p>Windows: versions 18.12.407 and 18.12.416 of the Electron Windows application shipped in Update 7, and </p></li><li><p>Versions 18.11.1213, 18.12.402, 18.12.407, and 18.12.416 of the Electron MacOS application.</p></li></ol><blockquote><p><strong>Immediately uninstall any affected versions of the product, and perform hunting using IOCs</strong> noted in the articles in the Further Reading section at the bottom of this post.</p></blockquote><p>Florian Roth and his team have also shared several <a href="https://github.com/SigmaHQ/sigma/pull/4151/files">Sigma</a> and <a href="https://github.com/Neo23x0/signature-base/blob/master/yara/gen_mal_3cx_compromise_mar23.yar">YARA </a>rules to help identify compromised files that were leveraged in the attack.</p><h1>How did this happen?</h1><p><a href="https://www.3cx.com/community/threads/threat-alerts-from-sentinelone-for-desktop-update-initiated-from-desktop-client.119806/#post-557988">Customer reports </a>of the trojanised application being quarantined by antivirus products first began surfacing the week prior, on the 22nd of March, though SentinelOne have reported <strong>observing activity as far back as March 8th</strong>. </p><blockquote><p>Analysts at Volexity have <a href="https://www.volexity.com/blog/2023/03/30/3cx-supply-chain-compromise-leads-to-iconic-incident/">found </a>the domains and web infrastructure used in the attacks were <strong>registered as early as November 2022</strong>, and infrastructure used by the Windows variant were <strong>activated on December 7th, 2022</strong>.</p></blockquote><p>Huntress Labs have taken it one even further, having found network infrastructure being established <strong>as far back as February 2022</strong>:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TDcu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021262b8-ef12-4da9-a28f-d56de8ce3806_1999x760.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TDcu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021262b8-ef12-4da9-a28f-d56de8ce3806_1999x760.png 424w, https://substackcdn.com/image/fetch/$s_!TDcu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021262b8-ef12-4da9-a28f-d56de8ce3806_1999x760.png 848w, https://substackcdn.com/image/fetch/$s_!TDcu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021262b8-ef12-4da9-a28f-d56de8ce3806_1999x760.png 1272w, https://substackcdn.com/image/fetch/$s_!TDcu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021262b8-ef12-4da9-a28f-d56de8ce3806_1999x760.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TDcu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021262b8-ef12-4da9-a28f-d56de8ce3806_1999x760.png" width="1456" height="554" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/021262b8-ef12-4da9-a28f-d56de8ce3806_1999x760.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:554,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;image4&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="image4" title="image4" srcset="https://substackcdn.com/image/fetch/$s_!TDcu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021262b8-ef12-4da9-a28f-d56de8ce3806_1999x760.png 424w, https://substackcdn.com/image/fetch/$s_!TDcu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021262b8-ef12-4da9-a28f-d56de8ce3806_1999x760.png 848w, https://substackcdn.com/image/fetch/$s_!TDcu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021262b8-ef12-4da9-a28f-d56de8ce3806_1999x760.png 1272w, https://substackcdn.com/image/fetch/$s_!TDcu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021262b8-ef12-4da9-a28f-d56de8ce3806_1999x760.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.huntress.com/blog/contextualizing-events-enabling-defense-what-3cx-means">Figure 1:</a> The planning and execution was months in the making</figcaption></figure></div><h2>Whose supply chain was hit?</h2><blockquote><p>ReversingLabs have done some great analysis of the potential origin of this attack, pointing to either a <strong>compromise of the 3CX development pipeline</strong> (a la <a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth">SolarWinds</a>) or a <strong>malicious upstream dependency</strong>, the kind we often see impacting package repositories like PyPI, Maven, or npm.</p></blockquote><p>3CX were quick to <a href="https://twitter.com/malwrhunterteam/status/1641345575009353729?t=T1ZERGainPlmd83nW5bxpw">point fingers</a> at ffmpeg - the upstream code supplier for the trojanized ffmpeg.dll binary - but they clearly weren&#8217;t in the mood for it and told 3CX to double-check their homework:</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/FFmpeg/status/1641481591254921216?cxt=HHwWgMC9ge6z28ctAAAA&quot;,&quot;full_text&quot;:&quot;There have been several incorrect reports that FFmpeg has been involved in the distribution of malware.\n\nFFmpeg only provides source code and the source code has not been compromised. Any \&quot;ffmpeg.dll\&quot; that has been compromised is the responsibility of the vendor.&quot;,&quot;username&quot;:&quot;FFmpeg&quot;,&quot;name&quot;:&quot;FFmpeg&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Thu Mar 30 16:44:43 +0000 2023&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:166,&quot;like_count&quot;:850,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><blockquote><p>That said, Volexity researchers are right to <a href="https://www.volexity.com/blog/2023/03/30/3cx-supply-chain-compromise-leads-to-iconic-incident/">point out </a>that in order to have trojanized the software&#8217;s updates so effectively, <strong>the actors would have lingered in 3CX&#8217;s network for some time</strong> - sufficient enough to &#8220;develop an understanding, access, and malicious code for the development-update process of the company&#8221;</p></blockquote><p>3CX have engaged Mandiant to conduct an investigation, which is ongoing as of the time of writing.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Opalsec is a reader-supported publication. To receive new posts and support my work, please consider becoming a paid subscriber!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F&quot;,&quot;text&quot;:&quot;Upgrade Subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F"><span>Upgrade Subscription</span></a></p><div><hr></div><h1>How does the attack work?</h1><p>A trojanized update which was sent out to customers included a <strong>modified and malicious version of the legitimate ffmpeg.dll and d3dcompiler.dll binaries,</strong> which then retrieved an <a href="https://www.virustotal.com/gui/file/5c54932fdbb077d73c58ac41a1ad3f6ea5576b3e1f719c8b714b637c9ceb361b/details">obfuscated and encrypted .ICO file</a> from an attacker-controlled Github repository. </p><blockquote><p>This subsequently dropped an <strong>info-stealing payload which Volexity have <a href="https://www.volexity.com/blog/2023/03/30/3cx-supply-chain-compromise-leads-to-iconic-incident/">dubbed </a>&#8220;ICONICSTEALER&#8221;</strong>. The 64-bit DLL was compiled on March 16, and is &#8220;designed to <strong>collect information about the system and browser using an embedded copy of the SQLite3 library</strong>.&#8221;</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eDbe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68c07965-8bbc-44bb-be02-8b72a2610621_2925x4096.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eDbe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68c07965-8bbc-44bb-be02-8b72a2610621_2925x4096.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eDbe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68c07965-8bbc-44bb-be02-8b72a2610621_2925x4096.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eDbe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68c07965-8bbc-44bb-be02-8b72a2610621_2925x4096.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eDbe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68c07965-8bbc-44bb-be02-8b72a2610621_2925x4096.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eDbe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68c07965-8bbc-44bb-be02-8b72a2610621_2925x4096.jpeg" width="664" height="929.8736263736264" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68c07965-8bbc-44bb-be02-8b72a2610621_2925x4096.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2039,&quot;width&quot;:1456,&quot;resizeWidth&quot;:664,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!eDbe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68c07965-8bbc-44bb-be02-8b72a2610621_2925x4096.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eDbe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68c07965-8bbc-44bb-be02-8b72a2610621_2925x4096.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eDbe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68c07965-8bbc-44bb-be02-8b72a2610621_2925x4096.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eDbe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68c07965-8bbc-44bb-be02-8b72a2610621_2925x4096.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 2: Attack Flow of the malicious update (<a href="https://twitter.com/fr0gger_/status/1641668394155151366?t=WyITILSBWLM35wDVnpMVcQ">Credit: @fr0gger_</a>)</figcaption></figure></div><h2>MacOS Execution Chain</h2><p>A malicious update was also issued for the MacOS version of the 3CX installer, and it appears to have actually <a href="https://www.huntress.com/blog/contextualizing-events-enabling-defense-what-3cx-means">pre-dated</a> the Windows attacks, with the earliest vulnerable version - 18.11.1213 - <strong>being deployed in January this year.</strong></p><p>You can find a more detailed analysis of the execution chain in <a href="https://objective-see.org/blog/blog_0x73.html">Patrick Wardle&#8217;s blog</a>, but for a quick overview, Thomas Roccia (a.k.a @fr0gger_) has you covered:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fIsY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0159df92-1b70-42d4-9f98-d50bf360559b_2857x4000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fIsY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0159df92-1b70-42d4-9f98-d50bf360559b_2857x4000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fIsY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0159df92-1b70-42d4-9f98-d50bf360559b_2857x4000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fIsY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0159df92-1b70-42d4-9f98-d50bf360559b_2857x4000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fIsY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0159df92-1b70-42d4-9f98-d50bf360559b_2857x4000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fIsY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0159df92-1b70-42d4-9f98-d50bf360559b_2857x4000.jpeg" width="642" height="899.0645604395604" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0159df92-1b70-42d4-9f98-d50bf360559b_2857x4000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2039,&quot;width&quot;:1456,&quot;resizeWidth&quot;:642,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!fIsY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0159df92-1b70-42d4-9f98-d50bf360559b_2857x4000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fIsY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0159df92-1b70-42d4-9f98-d50bf360559b_2857x4000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fIsY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0159df92-1b70-42d4-9f98-d50bf360559b_2857x4000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fIsY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0159df92-1b70-42d4-9f98-d50bf360559b_2857x4000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/p/the-defenders-guide-to-the-3cx-supply?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Found this useful? Why not share it!</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/p/the-defenders-guide-to-the-3cx-supply?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://opalsec.substack.com/p/the-defenders-guide-to-the-3cx-supply?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><div><hr></div><h2>Signed =/= Trusted</h2><p>Notably, ReversingLabs reported in their analysis of the Windows sample that they &#8220;identified signatures in the appended code pointing to <a href="https://github.com/med0x2e/SigFlip">SigFlip</a>, a tool for <strong>modifying the authenticode-signed Portable Executable (PE) files without breaking the existing signature</strong>.&#8221;</p><p>This was <a href="https://www.bleepingcomputer.com/news/microsoft/10-year-old-windows-bug-with-opt-in-fix-exploited-in-3cx-attack/">elaborated on </a>by Will Dormann, who pointed to its apparent use to abuse a <strong>10 year old flaw - CVE-2013-3900</strong> - classed as a "WinVerifyTrust Signature Validation Vulnerability."</p><blockquote><p>The vulnerability would allow an attacker to <strong>append content to the authenticode signature section</strong> (WIN_CERTIFICATE structure) of a signed executable - <strong>without invalidating the signature.</strong></p></blockquote><p>While a fix was issued back in 2013, Microsoft made it <strong>opt-in, as it could break functionality of legitimate apps</strong> such as Google Chrome, which modifies the Authenticode signature as part of denoting if diagnostic logs are meant to be collected and sent.</p><blockquote><p>The result? This was abused to <strong>append a malicious payload to a usually legitimate DLL signed by Microsoft named d3dcompiler_47.dll</strong>, with the signature left intact and incorrectly marking the file as being unaltered and verified by Microsoft.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-wKI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85aeb37f-6739-441f-9f99-c01d932b1e36_548x635.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-wKI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85aeb37f-6739-441f-9f99-c01d932b1e36_548x635.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-wKI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85aeb37f-6739-441f-9f99-c01d932b1e36_548x635.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-wKI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85aeb37f-6739-441f-9f99-c01d932b1e36_548x635.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-wKI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85aeb37f-6739-441f-9f99-c01d932b1e36_548x635.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-wKI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85aeb37f-6739-441f-9f99-c01d932b1e36_548x635.jpeg" width="464" height="537.6642335766423" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/85aeb37f-6739-441f-9f99-c01d932b1e36_548x635.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:635,&quot;width&quot;:548,&quot;resizeWidth&quot;:464,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Modified DLL seen as having a valid signature&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Modified DLL seen as having a valid signature" title="Modified DLL seen as having a valid signature" srcset="https://substackcdn.com/image/fetch/$s_!-wKI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85aeb37f-6739-441f-9f99-c01d932b1e36_548x635.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-wKI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85aeb37f-6739-441f-9f99-c01d932b1e36_548x635.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-wKI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85aeb37f-6739-441f-9f99-c01d932b1e36_548x635.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-wKI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85aeb37f-6739-441f-9f99-c01d932b1e36_548x635.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 3: The signature remains intact on the modified dll</figcaption></figure></div><blockquote><p>This is significant as it allowed the attacker to <strong>bypass basic file-signing checks by both automated security controls and L1 security analysts</strong>. It would have also played a part in influencing system admins to <strong>dismiss EDR alerts as false positives, and to create security exceptions</strong> so the apparently untampered software could continue to run.</p></blockquote><h1>So, who did it?</h1><p>CrowdStrike have <a href="https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/">attributed </a>the attack to a group they track as <strong>Labyrinth Chollima</strong>, a DPRK-aligned actor with form conducting cyber espionage, <a href="https://www.fbi.gov/news/press-releases/fbi-confirms-lazarus-group-cyber-actors-responsible-for-harmonys-horizon-bridge-currency-theft">cryptocurrency theft</a> and <a href="https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained/">destructive attacks</a>. Their analysis found &#8220;the HTTPS beacon structure and encryption key match those observed by CrowdStrike in a March 7, 2023 campaign <strong>attributed with high confidence</strong> to DPRK-nexus threat actor LABYRINTH CHOLLIMA.&#8221;</p><p>Analysts from Sophos and Volexity has also corroborated this attribution to some degree, with Sophos <a href="https://news.sophos.com/en-us/2023/03/29/3cx-dll-sideloading-attack/">noting </a>the code was &#8220;a byte-to-byte match&#8221; with what has been seen in previous activity by the <strong>Lazarus Group</strong> - the catch-all threat group for DPRK-aligned attackers - and Volexity <a href="https://www.volexity.com/blog/2023/03/30/3cx-supply-chain-compromise-leads-to-iconic-incident/">finding </a>the specific shellcode sequence &#8220;<a href="https://twitter.com/dez_/status/1641459372478935040">appears to have been only used</a> in the <strong>ICONIC loader and the APPLEJEUS malware</strong>, which is known to be linked to Lazarus.&#8221;</p><blockquote><p>Given the wide range of objectives that Labyrinth Chollima - and Lazarus Group, for that matter - have sought to achieve over the years, it&#8217;s <strong>unclear what their intent was</strong>. The fact that the delivered payload was designed to pilfer browsing history from impacted victims indicates that this may have been <strong>the first step in a more prolonged, and likely targeted campaign</strong>.</p></blockquote><h1>How has this been handled?</h1><blockquote><p>In six words - <strong>very, very, very, unbelievably, cringe-tastically, poorly</strong>.</p></blockquote><p>Unfortunately, despite receiving <strong>dozens of reports from users of multiple EDR products</strong> (<a href="https://www.3cx.com/community/threads/threat-alerts-from-sentinelone-for-desktop-update-initiated-from-desktop-client.119806/">SentinelOne</a>, <a href="https://www.3cx.com/community/threads/crowdstrike-endpoint-security-detection-re-3cx-desktop-app.119934/">CrowdStrike</a>, <a href="https://www.3cx.com/community/threads/3cx-desktop-app-vulnerability-security-group-contact.119930/">ESET</a>, <a href="https://www.3cx.com/community/threads/threat-alerts-from-sentinelone-for-desktop-update-initiated-from-desktop-client.119806/#post-558449">Palo Alto Networks</a>, and <a href="https://www.3cx.com/community/threads/sonicwall-capture-client-reject-3cx-desktop-app-version.119945/">SonicWall</a>, to name a few) flagging the VOIP client as malicious, 3CX simply responded by telling customers to <strong>add exclusions to allow it to continue to run, and to follow-up with their EDR vendor to resolve the problem.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jNfD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9ab9b7b-1937-4247-95a4-6477ed205f80_1471x421.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jNfD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9ab9b7b-1937-4247-95a4-6477ed205f80_1471x421.png 424w, https://substackcdn.com/image/fetch/$s_!jNfD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9ab9b7b-1937-4247-95a4-6477ed205f80_1471x421.png 848w, https://substackcdn.com/image/fetch/$s_!jNfD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9ab9b7b-1937-4247-95a4-6477ed205f80_1471x421.png 1272w, https://substackcdn.com/image/fetch/$s_!jNfD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9ab9b7b-1937-4247-95a4-6477ed205f80_1471x421.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jNfD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9ab9b7b-1937-4247-95a4-6477ed205f80_1471x421.png" width="1456" height="417" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d9ab9b7b-1937-4247-95a4-6477ed205f80_1471x421.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:417,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:80879,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!jNfD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9ab9b7b-1937-4247-95a4-6477ed205f80_1471x421.png 424w, https://substackcdn.com/image/fetch/$s_!jNfD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9ab9b7b-1937-4247-95a4-6477ed205f80_1471x421.png 848w, https://substackcdn.com/image/fetch/$s_!jNfD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9ab9b7b-1937-4247-95a4-6477ed205f80_1471x421.png 1272w, https://substackcdn.com/image/fetch/$s_!jNfD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9ab9b7b-1937-4247-95a4-6477ed205f80_1471x421.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 4: 3CX: &#8220;We aren&#8217;t malware authors therefore this isn&#8217;t malware.&#8221;</figcaption></figure></div><p>In an <a href="https://cyberscoop.com/3cx-supply-chain-attack/">interview with CyberScoop</a>, 3CX CEO Nick Galea noted that antivirus products <strong>flagged their software as malicious &#8220;quite frequently</strong> &#8212; so I have to be honest we didn&#8217;t take it that seriously [&#8230;] we did upload it to a site called VirusTotal to check [&#8230;] and none of the anti-virus engines flagged us of having a virus, <strong>so we just left it at that</strong>.&#8221;</p><blockquote><p>For those wondering what&#8217;s wrong with this approach, this Tweet explains succinctly why that is <strong>not an adequate validation process for a potential supply chain attack</strong>:</p></blockquote><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/malwrhunterteam/status/1641907138590023683?s=20&quot;,&quot;full_text&quot;:&quot;So currently expecting a supply chain pwned full installer package that is signed using a cert that is probably whitelisted by not 1-2 vendors to be well detected from the second it was first seen on VT is very very naive, to say it nicely.\n(2/2)&quot;,&quot;username&quot;:&quot;malwrhunterteam&quot;,&quot;name&quot;:&quot;MalwareHunterTeam&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Fri Mar 31 20:55:41 +0000 2023&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:0,&quot;like_count&quot;:0,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p>If that&#8217;s not enough to have your head spinning, cop this - Galea only acknowledged the vulnerability on forums on the 31st of March - <strong>more than a week</strong> after users began reporting the issue - and claims &#8220;it was <strong>only reported to [them] yesterday night</strong>.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZVVm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F353ae683-aca6-4185-b18b-67b8c1134c3f_1463x675.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZVVm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F353ae683-aca6-4185-b18b-67b8c1134c3f_1463x675.png 424w, https://substackcdn.com/image/fetch/$s_!ZVVm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F353ae683-aca6-4185-b18b-67b8c1134c3f_1463x675.png 848w, https://substackcdn.com/image/fetch/$s_!ZVVm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F353ae683-aca6-4185-b18b-67b8c1134c3f_1463x675.png 1272w, https://substackcdn.com/image/fetch/$s_!ZVVm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F353ae683-aca6-4185-b18b-67b8c1134c3f_1463x675.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZVVm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F353ae683-aca6-4185-b18b-67b8c1134c3f_1463x675.png" width="1456" height="672" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/353ae683-aca6-4185-b18b-67b8c1134c3f_1463x675.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:672,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:204858,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!ZVVm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F353ae683-aca6-4185-b18b-67b8c1134c3f_1463x675.png 424w, https://substackcdn.com/image/fetch/$s_!ZVVm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F353ae683-aca6-4185-b18b-67b8c1134c3f_1463x675.png 848w, https://substackcdn.com/image/fetch/$s_!ZVVm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F353ae683-aca6-4185-b18b-67b8c1134c3f_1463x675.png 1272w, https://substackcdn.com/image/fetch/$s_!ZVVm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F353ae683-aca6-4185-b18b-67b8c1134c3f_1463x675.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5Zv0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85d2cb9f-48e1-49e8-81bd-660e1f30ea89_512x384.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5Zv0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85d2cb9f-48e1-49e8-81bd-660e1f30ea89_512x384.png 424w, https://substackcdn.com/image/fetch/$s_!5Zv0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85d2cb9f-48e1-49e8-81bd-660e1f30ea89_512x384.png 848w, https://substackcdn.com/image/fetch/$s_!5Zv0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85d2cb9f-48e1-49e8-81bd-660e1f30ea89_512x384.png 1272w, https://substackcdn.com/image/fetch/$s_!5Zv0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85d2cb9f-48e1-49e8-81bd-660e1f30ea89_512x384.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5Zv0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85d2cb9f-48e1-49e8-81bd-660e1f30ea89_512x384.png" width="330" height="247.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/85d2cb9f-48e1-49e8-81bd-660e1f30ea89_512x384.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:384,&quot;width&quot;:512,&quot;resizeWidth&quot;:330,&quot;bytes&quot;:109837,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!5Zv0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85d2cb9f-48e1-49e8-81bd-660e1f30ea89_512x384.png 424w, https://substackcdn.com/image/fetch/$s_!5Zv0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85d2cb9f-48e1-49e8-81bd-660e1f30ea89_512x384.png 848w, https://substackcdn.com/image/fetch/$s_!5Zv0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85d2cb9f-48e1-49e8-81bd-660e1f30ea89_512x384.png 1272w, https://substackcdn.com/image/fetch/$s_!5Zv0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85d2cb9f-48e1-49e8-81bd-660e1f30ea89_512x384.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 5: My boy Jackie knows what&#8217;s up</figcaption></figure></div><h2>True to form</h2><p>A post by respected researcher Kevin Beaumont shows this may be <strong>symptomatic of the security culture at 3CX</strong>, as he <a href="https://cyberplace.social/@GossiTheDog/110108640236492867">highlighted </a>that when he attempted last year to report a vulnerability that &#8220;3CX <strong>took little responsibility, didn&#8217;t fix it, and started arguing on Twitter</strong>&#8221;. </p><p>The vulnerability? That files - <strong>including the admin password - could be read in plaintext</strong>.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Opalsec is a reader-supported publication. To receive new posts and support my work, please consider becoming a paid subscriber!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F&quot;,&quot;text&quot;:&quot;Upgrade Subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F"><span>Upgrade Subscription</span></a></p><div><hr></div><h1>Further Reading</h1><ol><li><p><a href="https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/">CrowdStrike&#8217;s report</a></p></li><li><p><a href="https://www.sentinelone.com/blog/smoothoperator-ongoing-campaign-trojanizes-3cx-software-in-software-supply-chain-attack/">SentinelOne&#8217;s report</a></p></li><li><p><a href="https://www.volexity.com/blog/2023/03/30/3cx-supply-chain-compromise-leads-to-iconic-incident/">Volexity&#8217;s analysis</a></p></li><li><p><a href="https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats">Huntress&#8217; early analysis</a></p></li><li><p><a href="https://www.huntress.com/blog/contextualizing-events-enabling-defense-what-3cx-means">Follow-up analysis by Huntress</a></p></li><li><p><a href="https://news.sophos.com/en-us/2023/03/29/3cx-dll-sideloading-attack/">Sophos&#8217; analysis</a></p></li><li><p><a href="https://www.reversinglabs.com/blog/red-flags-fly-over-supply-chain-compromised-3cx-update">ReversingLab&#8217;s analysis</a></p></li><li><p><a href="https://objective-see.org/blog/blog_0x73.html">Patrick Wardle&#8217;s Analysis of the MacOS attack chain</a></p></li><li><p><a href="https://www.splunk.com/en_us/blog/security/splunk-insights-investigating-the-3cxdesktopapp-supply-chain-compromise.html">Analysis &amp; queries by Splunk</a></p></li></ol>]]></content:encoded></item><item><title><![CDATA[Your Trust Doesn't Matter]]></title><description><![CDATA[AD Non-Transitive Trusts are broken - and Microsoft aren't going to fix it]]></description><link>https://opalsec.substack.com/p/your-trust-doesnt-matter</link><guid isPermaLink="false">https://opalsec.substack.com/p/your-trust-doesnt-matter</guid><dc:creator><![CDATA[Opalsec]]></dc:creator><pubDate>Sun, 19 Mar 2023 03:29:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4iwx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4iwx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4iwx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4iwx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png" width="900" height="556" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ff75961e-85b9-40d6-8938-6f9360b95944_900x556.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:556,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:746473,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4iwx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!4iwx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff75961e-85b9-40d6-8938-6f9360b95944_900x556.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Non-transitive trusts (a.k.a external trusts) - as <a href="https://learn.microsoft.com/en-us/azure/active-directory-domain-services/concepts-forest-trust">described by Microsoft</a> - are designed to &#8220;deny trust relationships with other domains&#8221;, or in other words, <strong>only the two domains involved in the trust will be able to authenticate to each other.</strong></p><blockquote><p>Unfortunately, researchers from Semperis have discovered that non-transitive trusts can - contrary to their design intent - allow <strong>authentication across domains, as well as potential privilege escalation within the trusting domain</strong>.</p></blockquote><h2>Breaking the Trust</h2><p>In the diagram below, a non-transitive trust exists between semperisaz.lab and grandchild1.child1.semperis.lab. This allows for a <strong>referral TGT</strong> - which is used to <em>request Service Tickets for any service within domains with an established trust path</em> - to be requested for grandchild1.child1.semperis.lab. </p><p>However because it&#8217;s a non-transitive trust - <strong>there isn&#8217;t a trust path</strong> between semperisaz.lab and semperis.lab, and attempting to obtain a referral to this domain fails - as expected.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2AlQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277159-2865-4478-bbda-b5dc570485f0_792x481.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2AlQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277159-2865-4478-bbda-b5dc570485f0_792x481.png 424w, https://substackcdn.com/image/fetch/$s_!2AlQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277159-2865-4478-bbda-b5dc570485f0_792x481.png 848w, https://substackcdn.com/image/fetch/$s_!2AlQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277159-2865-4478-bbda-b5dc570485f0_792x481.png 1272w, https://substackcdn.com/image/fetch/$s_!2AlQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277159-2865-4478-bbda-b5dc570485f0_792x481.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2AlQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277159-2865-4478-bbda-b5dc570485f0_792x481.png" width="646" height="392.3308080808081" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef277159-2865-4478-bbda-b5dc570485f0_792x481.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:481,&quot;width&quot;:792,&quot;resizeWidth&quot;:646,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Figure 21. Requesting referral for child1.semperis.lab&quot;,&quot;title&quot;:&quot;Figure 21. Requesting referral for child1.semperis.lab&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Figure 21. Requesting referral for child1.semperis.lab" title="Figure 21. Requesting referral for child1.semperis.lab" srcset="https://substackcdn.com/image/fetch/$s_!2AlQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277159-2865-4478-bbda-b5dc570485f0_792x481.png 424w, https://substackcdn.com/image/fetch/$s_!2AlQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277159-2865-4478-bbda-b5dc570485f0_792x481.png 848w, https://substackcdn.com/image/fetch/$s_!2AlQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277159-2865-4478-bbda-b5dc570485f0_792x481.png 1272w, https://substackcdn.com/image/fetch/$s_!2AlQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277159-2865-4478-bbda-b5dc570485f0_792x481.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 1: Non-transitive trusts prevent (direct) authentication to disallowed domains.</figcaption></figure></div><blockquote><p>The way to circumvent this protection is through using a <strong>&#8220;local&#8221; TGT</strong> - i.e. a TGT for grandchild1.child1.semperis.lab (<strong>the domain for which the non-transitive trust exists</strong>) instead of semperis.lab - <strong>to request the referral for the domain for which no direct trust exists</strong>.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ntfy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef41cc69-e75e-4f7c-92f9-27d650027b06_792x481.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ntfy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef41cc69-e75e-4f7c-92f9-27d650027b06_792x481.png 424w, https://substackcdn.com/image/fetch/$s_!Ntfy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef41cc69-e75e-4f7c-92f9-27d650027b06_792x481.png 848w, https://substackcdn.com/image/fetch/$s_!Ntfy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef41cc69-e75e-4f7c-92f9-27d650027b06_792x481.png 1272w, https://substackcdn.com/image/fetch/$s_!Ntfy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef41cc69-e75e-4f7c-92f9-27d650027b06_792x481.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ntfy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef41cc69-e75e-4f7c-92f9-27d650027b06_792x481.png" width="682" height="414.19444444444446" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef41cc69-e75e-4f7c-92f9-27d650027b06_792x481.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:481,&quot;width&quot;:792,&quot;resizeWidth&quot;:682,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Figure 25. Local TGT to request referral for child1.semperis.lab&quot;,&quot;title&quot;:&quot;Figure 25. Local TGT to request referral for child1.semperis.lab&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Figure 25. Local TGT to request referral for child1.semperis.lab" title="Figure 25. Local TGT to request referral for child1.semperis.lab" srcset="https://substackcdn.com/image/fetch/$s_!Ntfy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef41cc69-e75e-4f7c-92f9-27d650027b06_792x481.png 424w, https://substackcdn.com/image/fetch/$s_!Ntfy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef41cc69-e75e-4f7c-92f9-27d650027b06_792x481.png 848w, https://substackcdn.com/image/fetch/$s_!Ntfy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef41cc69-e75e-4f7c-92f9-27d650027b06_792x481.png 1272w, https://substackcdn.com/image/fetch/$s_!Ntfy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef41cc69-e75e-4f7c-92f9-27d650027b06_792x481.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 2: The &#8220;local&#8221; TGT can then be used to request a referral for the secondary domain.</figcaption></figure></div><p>While this technique stops short of allowing an attacker to perform &#8220;trust hopping&#8221; into another forest, Semperis points out the implications of even this limited scope.</p><blockquote><p><em>&#8220;Attackers could query domain information from supposedly disallowed domains, query more sensitive domains or domains with potentially weaker security, or perform Kerberoasting attacks or NTLM authentication coercion on domains that are assumed to be disallowed.&#8221;</em></p></blockquote><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Opalsec is a reader-supported publication. To receive new posts and support my work, please consider becoming a paid subscriber!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F&quot;,&quot;text&quot;:&quot;Upgrade Subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F"><span>Upgrade Subscription</span></a></p><div><hr></div><h2>Pivoting using machine accounts</h2><p>Semperis have been able to chain this technique with one they <a href="https://exploit.ph/strange-case-of-trusts-machines-dns.html">previously disclosed</a>, in order to <strong>extend the use of local TGTs to enable trust hopping to a forest with which no trusts exist</strong>.</p><p>Continuing from where the previous scenario left off, the referral TGT for the semperis.lab domain can be used to retrieve a Service Ticket for the LDAP service, which can then be abused to create a machine account in that domain.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5JCZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3ee6d63-4a3a-4588-ab91-0cd7d9116f86_1438x1203.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5JCZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3ee6d63-4a3a-4588-ab91-0cd7d9116f86_1438x1203.png 424w, https://substackcdn.com/image/fetch/$s_!5JCZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3ee6d63-4a3a-4588-ab91-0cd7d9116f86_1438x1203.png 848w, https://substackcdn.com/image/fetch/$s_!5JCZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3ee6d63-4a3a-4588-ab91-0cd7d9116f86_1438x1203.png 1272w, https://substackcdn.com/image/fetch/$s_!5JCZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3ee6d63-4a3a-4588-ab91-0cd7d9116f86_1438x1203.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5JCZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3ee6d63-4a3a-4588-ab91-0cd7d9116f86_1438x1203.png" width="1438" height="1203" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d3ee6d63-4a3a-4588-ab91-0cd7d9116f86_1438x1203.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1203,&quot;width&quot;:1438,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Figure 34. Create machine account in semperis.lab&quot;,&quot;title&quot;:&quot;Figure 34. Create machine account in semperis.lab&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Figure 34. Create machine account in semperis.lab" title="Figure 34. Create machine account in semperis.lab" srcset="https://substackcdn.com/image/fetch/$s_!5JCZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3ee6d63-4a3a-4588-ab91-0cd7d9116f86_1438x1203.png 424w, https://substackcdn.com/image/fetch/$s_!5JCZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3ee6d63-4a3a-4588-ab91-0cd7d9116f86_1438x1203.png 848w, https://substackcdn.com/image/fetch/$s_!5JCZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3ee6d63-4a3a-4588-ab91-0cd7d9116f86_1438x1203.png 1272w, https://substackcdn.com/image/fetch/$s_!5JCZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3ee6d63-4a3a-4588-ab91-0cd7d9116f86_1438x1203.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 3: Creating the TestComp account in semperis.lab</figcaption></figure></div><p>This account essentially <strong>serves as a beachhead within the semperis.lab domain</strong> from which we can repeat the exploitation of the flaws found in AD non-transitive trusts. </p><p>The machine account&#8217;s TGT requests a referral to the trusting domain of treetest.lab, which is then used request a &#8220;local&#8221; TGT from treetest.lab. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Haxz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9149932-6a86-4be0-b994-52f156b49ebe_1444x1321.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Haxz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9149932-6a86-4be0-b994-52f156b49ebe_1444x1321.png 424w, https://substackcdn.com/image/fetch/$s_!Haxz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9149932-6a86-4be0-b994-52f156b49ebe_1444x1321.png 848w, https://substackcdn.com/image/fetch/$s_!Haxz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9149932-6a86-4be0-b994-52f156b49ebe_1444x1321.png 1272w, https://substackcdn.com/image/fetch/$s_!Haxz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9149932-6a86-4be0-b994-52f156b49ebe_1444x1321.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Haxz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9149932-6a86-4be0-b994-52f156b49ebe_1444x1321.png" width="1444" height="1321" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9149932-6a86-4be0-b994-52f156b49ebe_1444x1321.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1321,&quot;width&quot;:1444,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Figure 40. Requesting local TGT for treetest.lab&quot;,&quot;title&quot;:&quot;Figure 40. Requesting local TGT for treetest.lab&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Figure 40. Requesting local TGT for treetest.lab" title="Figure 40. Requesting local TGT for treetest.lab" srcset="https://substackcdn.com/image/fetch/$s_!Haxz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9149932-6a86-4be0-b994-52f156b49ebe_1444x1321.png 424w, https://substackcdn.com/image/fetch/$s_!Haxz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9149932-6a86-4be0-b994-52f156b49ebe_1444x1321.png 848w, https://substackcdn.com/image/fetch/$s_!Haxz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9149932-6a86-4be0-b994-52f156b49ebe_1444x1321.png 1272w, https://substackcdn.com/image/fetch/$s_!Haxz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9149932-6a86-4be0-b994-52f156b49ebe_1444x1321.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 4: The machine account retrieves a local TGT for the intermediate domain</figcaption></figure></div><p>This local TGT can then be used to request a referral from the DC of the treetest.lab domain to the dsptest.lab domain - which <strong>should have been out-of-bounds of an account in semperis.lab</strong>, according to the design intent of non-transitive trusts.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OkXa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b1cea3d-ea24-41e8-8b81-7b6001780538_821x481.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OkXa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b1cea3d-ea24-41e8-8b81-7b6001780538_821x481.png 424w, https://substackcdn.com/image/fetch/$s_!OkXa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b1cea3d-ea24-41e8-8b81-7b6001780538_821x481.png 848w, https://substackcdn.com/image/fetch/$s_!OkXa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b1cea3d-ea24-41e8-8b81-7b6001780538_821x481.png 1272w, https://substackcdn.com/image/fetch/$s_!OkXa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b1cea3d-ea24-41e8-8b81-7b6001780538_821x481.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OkXa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b1cea3d-ea24-41e8-8b81-7b6001780538_821x481.png" width="670" height="392.5334957369062" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4b1cea3d-ea24-41e8-8b81-7b6001780538_821x481.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:481,&quot;width&quot;:821,&quot;resizeWidth&quot;:670,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Figure 43. Requesting referral for dsptest.lab&quot;,&quot;title&quot;:&quot;Figure 43. Requesting referral for dsptest.lab&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Figure 43. Requesting referral for dsptest.lab" title="Figure 43. Requesting referral for dsptest.lab" srcset="https://substackcdn.com/image/fetch/$s_!OkXa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b1cea3d-ea24-41e8-8b81-7b6001780538_821x481.png 424w, https://substackcdn.com/image/fetch/$s_!OkXa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b1cea3d-ea24-41e8-8b81-7b6001780538_821x481.png 848w, https://substackcdn.com/image/fetch/$s_!OkXa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b1cea3d-ea24-41e8-8b81-7b6001780538_821x481.png 1272w, https://substackcdn.com/image/fetch/$s_!OkXa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b1cea3d-ea24-41e8-8b81-7b6001780538_821x481.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 5: The machine account on semperis.lab can now authenticate to Services in the dsptest.lab domain, for which no trust exists.</figcaption></figure></div><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/p/your-trust-doesnt-matter?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Found this useful? Why not share it!</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/p/your-trust-doesnt-matter?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://opalsec.substack.com/p/your-trust-doesnt-matter?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><div><hr></div><h2>&#8220;It&#8217;s not a vulnerability, so - no.&#8221;</h2><p>Unfortunately, Microsoft believe this flaw can&#8217;t be classified as a vulnerability, and as such - <strong>won&#8217;t be taking any action to rectify it</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bKgF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca7ea08b-bd62-4fea-9154-ac9aca0deef4_1317x237.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bKgF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca7ea08b-bd62-4fea-9154-ac9aca0deef4_1317x237.png 424w, https://substackcdn.com/image/fetch/$s_!bKgF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca7ea08b-bd62-4fea-9154-ac9aca0deef4_1317x237.png 848w, https://substackcdn.com/image/fetch/$s_!bKgF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca7ea08b-bd62-4fea-9154-ac9aca0deef4_1317x237.png 1272w, https://substackcdn.com/image/fetch/$s_!bKgF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca7ea08b-bd62-4fea-9154-ac9aca0deef4_1317x237.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bKgF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca7ea08b-bd62-4fea-9154-ac9aca0deef4_1317x237.png" width="1317" height="237" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ca7ea08b-bd62-4fea-9154-ac9aca0deef4_1317x237.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:237,&quot;width&quot;:1317,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:49863,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bKgF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca7ea08b-bd62-4fea-9154-ac9aca0deef4_1317x237.png 424w, https://substackcdn.com/image/fetch/$s_!bKgF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca7ea08b-bd62-4fea-9154-ac9aca0deef4_1317x237.png 848w, https://substackcdn.com/image/fetch/$s_!bKgF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca7ea08b-bd62-4fea-9154-ac9aca0deef4_1317x237.png 1272w, https://substackcdn.com/image/fetch/$s_!bKgF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca7ea08b-bd62-4fea-9154-ac9aca0deef4_1317x237.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Figure 6: Microsoft&#8217;s response to Semeperis&#8217; bug report</figcaption></figure></div><blockquote><p>The only &#8220;fix&#8221; to the solution is to disable any non-transitive trusts you may have in your environment.</p></blockquote><p>Failing that, Semperis recommend auditing <strong>Windows 4769 events (</strong><em><strong>A Kerberos service ticket was requested</strong></em><strong>)</strong>, specifically:</p><ol><li><p>Where a <strong>local TGT is requested</strong> - the domain (Account Domain field) is for a different forest, and the <strong>Service Name is krbtgt</strong>;</p></li><li><p>A second event which follows, <strong>requesting a referral TGT</strong> - the domain (Account Domain field) is a domain in a different forest, and the <strong>Service Name is another domain within the local forest</strong>.</p></li></ol><blockquote><p>They also recommend <strong><a href="https://www.netspi.com/blog/technical/network-penetration-testing/machineaccountquota-is-useful-sometimes/">disallowing </a>Authenticated Users from creating machine accounts</strong>, in order to mitigate the ability to extend this flaw into additional forests.</p></blockquote><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Opalsec is a reader-supported publication. To receive new posts and support my work, please consider becoming a paid subscriber!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F&quot;,&quot;text&quot;:&quot;Upgrade Subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F"><span>Upgrade Subscription</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[PoC leak swiftly followed by widespread exploitation - once again]]></title><description><![CDATA[When security research can be more harmful than helpful]]></description><link>https://opalsec.substack.com/p/poc-leak-swiftly-followed-by-widespread</link><guid isPermaLink="false">https://opalsec.substack.com/p/poc-leak-swiftly-followed-by-widespread</guid><dc:creator><![CDATA[Opalsec]]></dc:creator><pubDate>Sat, 25 Feb 2023 10:51:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tlh2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tlh2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tlh2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!tlh2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!tlh2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!tlh2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tlh2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png" width="900" height="556" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:556,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:746473,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tlh2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!tlh2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!tlh2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!tlh2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F393225c9-753f-4318-8a6a-f2babd8b4f00_900x556.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Attackers have had themselves a field day abusing a vulnerability in Fortinet&#8217;s FortiNAC appliance, thanks in no small part to a <a href="https://www.horizon3.ai/fortinet-fortinac-cve-2022-39952-deep-dive-and-iocs/">PoC exploit</a> which was released by security research company Horizon3 - <strong>just two business days</strong> after Fortinet <a href="https://www.fortiguard.com/psirt/FG-IR-22-300">warned customers</a> to patch the vulnerability.</p><p>The <a href="https://github.com/horizon3ai/CVE-2022-39952">PoC exploit</a> leverages the vulnerability to <a href="https://www.fortiguard.com/psirt/FG-IR-22-300">write arbitrary files to disk</a>, and has <a href="https://www-cronup-com.translate.goog/explotacion-masiva-de-fortinet-fortinac-cve-2022-39952-rce-no-autenticado-en-progreso/?_x_tr_sl=es&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp">been abused </a>by attackers to <strong>deploy both interactive and reverse web shells</strong> on vulnerable FortiNAC devices. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VruV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889c1ffd-7d3e-45b4-915e-520714580639_1024x653.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VruV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889c1ffd-7d3e-45b4-915e-520714580639_1024x653.webp 424w, https://substackcdn.com/image/fetch/$s_!VruV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889c1ffd-7d3e-45b4-915e-520714580639_1024x653.webp 848w, https://substackcdn.com/image/fetch/$s_!VruV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889c1ffd-7d3e-45b4-915e-520714580639_1024x653.webp 1272w, https://substackcdn.com/image/fetch/$s_!VruV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889c1ffd-7d3e-45b4-915e-520714580639_1024x653.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VruV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889c1ffd-7d3e-45b4-915e-520714580639_1024x653.webp" width="606" height="386.443359375" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/889c1ffd-7d3e-45b4-915e-520714580639_1024x653.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:653,&quot;width&quot;:1024,&quot;resizeWidth&quot;:606,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!VruV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889c1ffd-7d3e-45b4-915e-520714580639_1024x653.webp 424w, https://substackcdn.com/image/fetch/$s_!VruV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889c1ffd-7d3e-45b4-915e-520714580639_1024x653.webp 848w, https://substackcdn.com/image/fetch/$s_!VruV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889c1ffd-7d3e-45b4-915e-520714580639_1024x653.webp 1272w, https://substackcdn.com/image/fetch/$s_!VruV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889c1ffd-7d3e-45b4-915e-520714580639_1024x653.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 1: A webshell deployed via the PoC exploit, executes base64-encoded commands sent via HTTP POST requests.</figcaption></figure></div><h1>Is two days enough?</h1><p>While it&#8217;s not surprising that attackers were quick to capitalise on the weaponised exploit, it&#8217;s difficult to understand Horizon3&#8217;s reasoning for having released it as soon as they did. </p><p>Sure, you might argue that for large organisations lucky enough to have formalised vulnerability management teams and processes - they <em>may</em> have been able to identify and patch the vulnerability in the <strong>two business days</strong> separating the disclosure of the vulnerability and release of the PoC.</p><blockquote><p>Smaller entities, however - think regional hospitals, public schools, or even small-scale MSSPs - <strong>will likely have neither the capacity or ability</strong> to do the same. </p></blockquote><p>And this isn&#8217;t that far-fetched a scenario either - this hypothetical lines up very neatly with six of Fortinet&#8217;s publicly listed case study clients <strong>who use FortiNAC appliances in their networks</strong>:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fNxf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab71b1ee-d9b2-40f6-85e8-6dcc7cfe71d7_1223x1138.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fNxf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab71b1ee-d9b2-40f6-85e8-6dcc7cfe71d7_1223x1138.png 424w, https://substackcdn.com/image/fetch/$s_!fNxf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab71b1ee-d9b2-40f6-85e8-6dcc7cfe71d7_1223x1138.png 848w, https://substackcdn.com/image/fetch/$s_!fNxf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab71b1ee-d9b2-40f6-85e8-6dcc7cfe71d7_1223x1138.png 1272w, https://substackcdn.com/image/fetch/$s_!fNxf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab71b1ee-d9b2-40f6-85e8-6dcc7cfe71d7_1223x1138.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fNxf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab71b1ee-d9b2-40f6-85e8-6dcc7cfe71d7_1223x1138.png" width="672" height="625.2951757972199" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab71b1ee-d9b2-40f6-85e8-6dcc7cfe71d7_1223x1138.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1138,&quot;width&quot;:1223,&quot;resizeWidth&quot;:672,&quot;bytes&quot;:290000,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!fNxf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab71b1ee-d9b2-40f6-85e8-6dcc7cfe71d7_1223x1138.png 424w, https://substackcdn.com/image/fetch/$s_!fNxf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab71b1ee-d9b2-40f6-85e8-6dcc7cfe71d7_1223x1138.png 848w, https://substackcdn.com/image/fetch/$s_!fNxf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab71b1ee-d9b2-40f6-85e8-6dcc7cfe71d7_1223x1138.png 1272w, https://substackcdn.com/image/fetch/$s_!fNxf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab71b1ee-d9b2-40f6-85e8-6dcc7cfe71d7_1223x1138.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.fortinet.com/products/network-access-control">Figure 2</a>: FortiNAC customers aren&#8217;t the high-rollers you may think they are</figcaption></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Opalsec is a reader-supported publication. To receive new posts and support my work, please consider becoming a paid subscriber!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F&quot;,&quot;text&quot;:&quot;Upgrade Subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F"><span>Upgrade Subscription</span></a></p><h2></h2><div><hr></div><h2>Timing is everything</h2><p>Releasing PoC exploits can help defenders better understand the vulnerable attack surface and <a href="https://twitter.com/GreyNoiseIO/status/1626760618853253120">detect attempts</a> to exploit it - that&#8217;s great, and you&#8217;ll find no arguments from me on that. </p><blockquote><p>Where this becomes counter-productive, though, is when the PoC exploits - weaponised or not - are released <strong>before organisations have the chance to patch the vulnerability they abuse</strong>.</p></blockquote><p>There are a myriad of reasons why organisations may be seen to be dragging their heels on patching, many of which are out of the control of the security team or broader organisation, for example:</p><ol><li><p>The organisation is coming up to <strong>an important event where absolutely nothing can go wrong</strong> - e.g. they&#8217;re about to be listed on a stock exchange, their latest product is about to be released for sale, or a long holiday period is coming up - in these cases a <strong>&#8220;Change Freeze&#8221;</strong> can be put in place that prevents security teams from making any changes without running a gauntlet of internal approvals;</p></li><li><p>The software requires <strong>staged updates to multiple components</strong> before the vulnerable asset itself can be patched - this can take time and co-ordination from multiple internal and vendor stakeholders;</p></li><li><p>The asset provides critical functionality, and is <strong>only able to run as intended on a legacy, vulnerable version</strong>. Believe it or not, business requirements can supersede security risks, with &#8220;compensating controls&#8221; such as &#8220;enhanced monitoring&#8221; often accepted as a substitute for eliminating a vulnerability - regardless of how critical it is. Ask anyone who&#8217;s run a Penetration test on a hospital what the oldest version of Windows they&#8217;ve seen on the network is - try not to grimace in disgust when they do. </p></li></ol><h1>Onwards and upwards</h1><p>Security research is an invaluable input to Cyber Defence functions, as it provides actionable insights into attacker techniques, security vulnerabilities, and more - all of  which defenders must understand, in order to protect against them.</p><p>I&#8217;ve been lucky enough to work in several roles on the defensive side, and have seen first-hand how <strong>bureaucracy, poor solution design, and convoluted chains of approval</strong> <strong>can run down the clock when trying to patch security gaps</strong>. </p><blockquote><p>My point is - it&#8217;s not always for lack of trying, and sometimes all we need is more time.</p></blockquote><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/p/poc-leak-swiftly-followed-by-widespread?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Found this useful? Why not share it!</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/p/poc-leak-swiftly-followed-by-widespread?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://opalsec.substack.com/p/poc-leak-swiftly-followed-by-widespread?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><div><hr></div><p>Oh, and it goes without saying - though just in case it needs to be said - I didn&#8217;t write this piece to take aim at Horizon3. </p><p>Their work is great - their timing on this one simply presented the opportunity to address a systemic problem in vulnerability disclosure and management. </p><p>I have nothing but respcpt for their team, and wish them all the best.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lPUO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd236d945-96da-4ca0-9fb2-e1ca2ab50b5c_240x200.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lPUO!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd236d945-96da-4ca0-9fb2-e1ca2ab50b5c_240x200.gif 424w, https://substackcdn.com/image/fetch/$s_!lPUO!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd236d945-96da-4ca0-9fb2-e1ca2ab50b5c_240x200.gif 848w, https://substackcdn.com/image/fetch/$s_!lPUO!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd236d945-96da-4ca0-9fb2-e1ca2ab50b5c_240x200.gif 1272w, https://substackcdn.com/image/fetch/$s_!lPUO!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd236d945-96da-4ca0-9fb2-e1ca2ab50b5c_240x200.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lPUO!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd236d945-96da-4ca0-9fb2-e1ca2ab50b5c_240x200.gif" width="304" height="253.33333333333334" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d236d945-96da-4ca0-9fb2-e1ca2ab50b5c_240x200.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:200,&quot;width&quot;:240,&quot;resizeWidth&quot;:304,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Season 3 Nbc GIF by The Office&quot;,&quot;title&quot;:&quot;Season 3 Nbc GIF by The Office&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Season 3 Nbc GIF by The Office" title="Season 3 Nbc GIF by The Office" srcset="https://substackcdn.com/image/fetch/$s_!lPUO!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd236d945-96da-4ca0-9fb2-e1ca2ab50b5c_240x200.gif 424w, https://substackcdn.com/image/fetch/$s_!lPUO!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd236d945-96da-4ca0-9fb2-e1ca2ab50b5c_240x200.gif 848w, https://substackcdn.com/image/fetch/$s_!lPUO!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd236d945-96da-4ca0-9fb2-e1ca2ab50b5c_240x200.gif 1272w, https://substackcdn.com/image/fetch/$s_!lPUO!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd236d945-96da-4ca0-9fb2-e1ca2ab50b5c_240x200.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[The Defender's Guide to OneNote MalDocs]]></title><description><![CDATA[Who's abusing it, and how to mitigate it in your environment]]></description><link>https://opalsec.substack.com/p/the-defenders-guide-to-onenote-maldocs</link><guid isPermaLink="false">https://opalsec.substack.com/p/the-defenders-guide-to-onenote-maldocs</guid><dc:creator><![CDATA[Opalsec]]></dc:creator><pubDate>Sun, 05 Feb 2023 10:34:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fzMn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fzMn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fzMn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!fzMn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!fzMn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!fzMn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fzMn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png" width="900" height="556" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:556,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:746473,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fzMn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!fzMn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!fzMn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!fzMn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6803c64b-e415-48be-b7f7-24f00f503fae_900x556.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Why is it being used?</h1><blockquote><p>With the heyday of macro-enabled spreadsheets and documents behind us, threat actors have experimented with novel ways to deliver their payloads, including <strong>disk image files</strong> (.iso, .vhd files), <strong>HTML Smuggling</strong> (.hta files with embedded scripts), and now OneNote files.</p></blockquote><p>While actors can&#8217;t embed VBA macros in OneNote files like they can with Word and Excel documents, it does provide a number of other significant advantages:</p><ul><li><p>OneNote files are <strong>not affected by Protected View/ Mark-of-the-Web</strong>;</p></li><li><p>It allows embedding Malicious Excel/Word/PPT files that will be played <strong>without protected view</strong>;</p></li><li><p><strong>HTA, LNK, EXE files</strong> and more can be embedded in the document, with the extensions spoofed;</p></li><li><p>The document can be formatted in order to trick users into opening a malicious file or a link;</p></li><li><p>Maldoc <strong>creation can be automated</strong> using the OneNote.Application API and XML.</p></li></ul><blockquote><p>For a <strong>full overview of its potential</strong>, have a look at the full article assessing its viability for Red Team activities <a href="https://blog.sevagas.com/IMG/pdf/redteam_with_onenote.pdf">here</a>.</p></blockquote><h1>Who&#8217;s using it?</h1><p>Numerous actors - including <strong>Initial Access Brokers</strong> - have integrated OneNote files into their infection chains, with the end result ranging from <strong>credential theft to deployment of secondary malware </strong>- some of which are <strong>known to lead to ransomware infections</strong>.</p><p>These actors have been seen delivering:</p><ol><li><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trojanized-onenote-document-leads-to-formbook-malware/">Formbook </a>- an infostealer sold on the Dark Web;</p></li><li><p><a href="https://twitter.com/Unit42_Intel/status/1620531956504055812">Qakbot</a> - a prolific malware family that enables secondary infections which can lead to ransomware deployment;</p></li><li><p><a href="https://twitter.com/ffforward/status/1621195397250289664">IcedID</a> - similar to Qakbot, this malware is widely spread and can enable ransomware attacks;</p></li><li><p><a href="https://twitter.com/phage_nz/status/1615132638288957440">ASyncRAT &amp; xworm</a> - <strong>ASyncRAT</strong> is a <a href="https://twitter.com/malmoeb/status/1555926311738171398?t=G68QdPA-nruYNX2iVNAcRA&amp;s=09">popular, publicly available</a> RAT that is deployed to maintain attacker access to a compromised system. <strong>xworm</strong> is a <a href="https://cyware.com/news/xworm-rat-found-in-new-evilcoder-project-824d92a5">stager malware</a> that delivers other payloads while also retaining basic infostealing capabilities;</p></li><li><p><a href="https://marcoramilli.com/2023/02/04/onenote-malware-classification-and-personal-notes/">The RedLine infostealer, and Remcos RAT</a> - <strong>RedLine</strong> is a highly capable and widely used infostealer, while the <strong>Remcos</strong> RAT is an open-source trojan that is used to facilitate network intrusions.</p></li></ol><blockquote><p>Cyber security vendor Proofpoint have <a href="https://www.proofpoint.com/us/blog/threat-insight/onenote-documents-increasingly-used-to-deliver-malware">also flagged </a>that the <strong>Quasar and NetWire RATs; DOUBLEBACK malware, and AgentTesla infostealer</strong> were all also observed being delivered via campaigns using OneNote lures.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NKrV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1548efdd-db77-43fd-8b5e-e5cf1907600a_2494x858.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NKrV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1548efdd-db77-43fd-8b5e-e5cf1907600a_2494x858.png 424w, https://substackcdn.com/image/fetch/$s_!NKrV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1548efdd-db77-43fd-8b5e-e5cf1907600a_2494x858.png 848w, https://substackcdn.com/image/fetch/$s_!NKrV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1548efdd-db77-43fd-8b5e-e5cf1907600a_2494x858.png 1272w, https://substackcdn.com/image/fetch/$s_!NKrV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1548efdd-db77-43fd-8b5e-e5cf1907600a_2494x858.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NKrV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1548efdd-db77-43fd-8b5e-e5cf1907600a_2494x858.png" width="1456" height="501" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1548efdd-db77-43fd-8b5e-e5cf1907600a_2494x858.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:501,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!NKrV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1548efdd-db77-43fd-8b5e-e5cf1907600a_2494x858.png 424w, https://substackcdn.com/image/fetch/$s_!NKrV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1548efdd-db77-43fd-8b5e-e5cf1907600a_2494x858.png 848w, https://substackcdn.com/image/fetch/$s_!NKrV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1548efdd-db77-43fd-8b5e-e5cf1907600a_2494x858.png 1272w, https://substackcdn.com/image/fetch/$s_!NKrV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1548efdd-db77-43fd-8b5e-e5cf1907600a_2494x858.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 1: OneNote Campaigns really accelerated in January</figcaption></figure></div><h1>How does this work?</h1><h2>Overview</h2><p>Similar to traditional Excel and Word document lures, OneNote lures have largely masqueraded as an invoice, remittance advice or other document that the target is urged to view. </p><p>Upon opening the document, <strong>instead of asking a user to click &#8220;Enable Content&#8221;</strong>, the lure prompts them to double-click a fake &#8220;Open&#8221; button:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pDF6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d47426-3539-44fd-bb61-8c1dc785e6db_1239x601.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pDF6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d47426-3539-44fd-bb61-8c1dc785e6db_1239x601.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pDF6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d47426-3539-44fd-bb61-8c1dc785e6db_1239x601.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pDF6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d47426-3539-44fd-bb61-8c1dc785e6db_1239x601.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pDF6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d47426-3539-44fd-bb61-8c1dc785e6db_1239x601.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pDF6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d47426-3539-44fd-bb61-8c1dc785e6db_1239x601.jpeg" width="580" height="281.3397901533495" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b4d47426-3539-44fd-bb61-8c1dc785e6db_1239x601.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:601,&quot;width&quot;:1239,&quot;resizeWidth&quot;:580,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!pDF6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d47426-3539-44fd-bb61-8c1dc785e6db_1239x601.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pDF6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d47426-3539-44fd-bb61-8c1dc785e6db_1239x601.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pDF6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d47426-3539-44fd-bb61-8c1dc785e6db_1239x601.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pDF6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d47426-3539-44fd-bb61-8c1dc785e6db_1239x601.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://twitter.com/ffforward/status/1621195397250289664">Figure 2:</a> OneNote lures still require some social engineering</figcaption></figure></div><p>This button simply sits over an embedded .hta file, which is executed when the user attempts to double-click the button overlay:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!N2es!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f904d36-5b0b-4913-ab1c-b255292b4e5e_900x459.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N2es!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f904d36-5b0b-4913-ab1c-b255292b4e5e_900x459.png 424w, https://substackcdn.com/image/fetch/$s_!N2es!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f904d36-5b0b-4913-ab1c-b255292b4e5e_900x459.png 848w, https://substackcdn.com/image/fetch/$s_!N2es!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f904d36-5b0b-4913-ab1c-b255292b4e5e_900x459.png 1272w, https://substackcdn.com/image/fetch/$s_!N2es!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f904d36-5b0b-4913-ab1c-b255292b4e5e_900x459.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N2es!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f904d36-5b0b-4913-ab1c-b255292b4e5e_900x459.png" width="630" height="321.3" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f904d36-5b0b-4913-ab1c-b255292b4e5e_900x459.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:459,&quot;width&quot;:900,&quot;resizeWidth&quot;:630,&quot;bytes&quot;:112905,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N2es!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f904d36-5b0b-4913-ab1c-b255292b4e5e_900x459.png 424w, https://substackcdn.com/image/fetch/$s_!N2es!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f904d36-5b0b-4913-ab1c-b255292b4e5e_900x459.png 848w, https://substackcdn.com/image/fetch/$s_!N2es!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f904d36-5b0b-4913-ab1c-b255292b4e5e_900x459.png 1272w, https://substackcdn.com/image/fetch/$s_!N2es!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f904d36-5b0b-4913-ab1c-b255292b4e5e_900x459.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://twitter.com/pr0xylife/status/1621130002166337537">Figure 3:</a> A Qakbot OneNote lure that executes a malicious .hta file when the user double-clicks &#8220;Open&#8221;</figcaption></figure></div><blockquote><p>The choice of file that is executed has varied between campaigns and actors, with <strong>shortcut files (.lnk), script files (.hta, .vbs) or Windows script files (.wsf)</strong> the most commonly observed. </p><p>Other file types such as <strong>Javascript (.js, .jse), Visual Basic (.vbe) Windows script files (.bat, .cmd)</strong> and more can also be used in their stead.</p></blockquote><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/p/the-defenders-guide-to-onenote-maldocs?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Found this useful? Why not share it!</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/p/the-defenders-guide-to-onenote-maldocs?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://opalsec.substack.com/p/the-defenders-guide-to-onenote-maldocs?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><div><hr></div><h2>Example Attack - Qakbot</h2><p>Max Malyutin was <a href="https://twitter.com/Max_Mal_/status/1620469133757538304">one of the first </a>to flag the adoption of OneNote files by the actors distributing Qakbot, with their lures going <strong>virtually undetected by antivirus engines</strong> at the beginning of their campaign.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!A071!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9351092f-43de-4a79-b638-c255c50fe3b6_726x425.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!A071!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9351092f-43de-4a79-b638-c255c50fe3b6_726x425.png 424w, https://substackcdn.com/image/fetch/$s_!A071!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9351092f-43de-4a79-b638-c255c50fe3b6_726x425.png 848w, https://substackcdn.com/image/fetch/$s_!A071!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9351092f-43de-4a79-b638-c255c50fe3b6_726x425.png 1272w, https://substackcdn.com/image/fetch/$s_!A071!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9351092f-43de-4a79-b638-c255c50fe3b6_726x425.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!A071!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9351092f-43de-4a79-b638-c255c50fe3b6_726x425.png" width="558" height="326.6528925619835" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9351092f-43de-4a79-b638-c255c50fe3b6_726x425.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:425,&quot;width&quot;:726,&quot;resizeWidth&quot;:558,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!A071!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9351092f-43de-4a79-b638-c255c50fe3b6_726x425.png 424w, https://substackcdn.com/image/fetch/$s_!A071!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9351092f-43de-4a79-b638-c255c50fe3b6_726x425.png 848w, https://substackcdn.com/image/fetch/$s_!A071!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9351092f-43de-4a79-b638-c255c50fe3b6_726x425.png 1272w, https://substackcdn.com/image/fetch/$s_!A071!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9351092f-43de-4a79-b638-c255c50fe3b6_726x425.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.virustotal.com/gui/ip-address/103.214.71.45/relations">Figure 4</a>: Low detection rates for Qakbot&#8217;s initial campaigns</figcaption></figure></div><p>The lure used was as above, with a <strong>malicious .hta file</strong> executed when the user double-clicked the lure. </p><p>This invoked curl to download a <strong>secondary payload</strong> - the Qakbot malware - which was then executed by rundll32.exe and <strong>injected into the wermgr.exe process</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iBfG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a90539f-886d-4b60-8244-755ce685e7d4_1199x283.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iBfG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a90539f-886d-4b60-8244-755ce685e7d4_1199x283.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iBfG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a90539f-886d-4b60-8244-755ce685e7d4_1199x283.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iBfG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a90539f-886d-4b60-8244-755ce685e7d4_1199x283.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iBfG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a90539f-886d-4b60-8244-755ce685e7d4_1199x283.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iBfG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a90539f-886d-4b60-8244-755ce685e7d4_1199x283.jpeg" width="1199" height="283" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4a90539f-886d-4b60-8244-755ce685e7d4_1199x283.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:283,&quot;width&quot;:1199,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!iBfG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a90539f-886d-4b60-8244-755ce685e7d4_1199x283.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iBfG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a90539f-886d-4b60-8244-755ce685e7d4_1199x283.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iBfG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a90539f-886d-4b60-8244-755ce685e7d4_1199x283.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iBfG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a90539f-886d-4b60-8244-755ce685e7d4_1199x283.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Figure 4: The Qakbot infection chain, injecting the 2nd stage payload into wermgr.exe</figcaption></figure></div><h2>What&#8217;s the point?</h2><p>OneNote files <strong>aren&#8217;t subject to the same Mark-of-the-Web restrictions </strong>(i.e. the default blocking of macros in downloaded files) as Excel and Word documents.</p><p>This means that the convoluted .iso &gt; .lnk mechanism that was adopted to circumvent this protection isn&#8217;t necessary, with the added benefit that <strong>opening a OneNote file is a much more familiar concept to end users than mounting a virtual disk image</strong>, making it a more believable lure<strong>.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9FM0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e490496-ea3e-48e7-ada6-1e63b6045e27_965x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9FM0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e490496-ea3e-48e7-ada6-1e63b6045e27_965x300.png 424w, https://substackcdn.com/image/fetch/$s_!9FM0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e490496-ea3e-48e7-ada6-1e63b6045e27_965x300.png 848w, https://substackcdn.com/image/fetch/$s_!9FM0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e490496-ea3e-48e7-ada6-1e63b6045e27_965x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9FM0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e490496-ea3e-48e7-ada6-1e63b6045e27_965x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9FM0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e490496-ea3e-48e7-ada6-1e63b6045e27_965x300.png" width="965" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1e490496-ea3e-48e7-ada6-1e63b6045e27_965x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:965,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:28519,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9FM0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e490496-ea3e-48e7-ada6-1e63b6045e27_965x300.png 424w, https://substackcdn.com/image/fetch/$s_!9FM0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e490496-ea3e-48e7-ada6-1e63b6045e27_965x300.png 848w, https://substackcdn.com/image/fetch/$s_!9FM0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e490496-ea3e-48e7-ada6-1e63b6045e27_965x300.png 1272w, https://substackcdn.com/image/fetch/$s_!9FM0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e490496-ea3e-48e7-ada6-1e63b6045e27_965x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 5: OneNote files allow IcedID payloads to be delivered with less dependencies and steps</figcaption></figure></div><p></p><p>Attackers are also able to format the OneNote document to match the theme of the email and further add to the apparent <strong>legitimacy of the lure</strong>, while still enabling the <strong>embedding of malicious code and techniques such as HTML Smuggling</strong>.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Opalsec is a reader-supported publication. To receive new posts and support my work, please consider becoming a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F&quot;,&quot;text&quot;:&quot;Upgrade Subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F"><span>Upgrade Subscription</span></a></p><div><hr></div><h1>How can I analyse these files?</h1><p>A few tools have been flagged by the community, which can help in analysing OneNote files:</p><ol><li><p><a href="https://github.com/volexity/threat-intel/tree/main/tools/one-extract">One-Extract</a> by Volexity</p></li><li><p><a href="https://github.com/knight0x07/OneNoteAnalyzer">OneNoteAnalyzer</a> by knight0x07</p></li><li><p><a href="https://blog.didierstevens.com/2023/01/22/new-tool-onedump-py/">OneDump.py</a> by Didier Stevens</p></li></ol><p>As <a href="https://twitter.com/pr0xylife/status/1620461680001183746">demonstrated </a>by malware analyst pr0xylife, <strong>OneDump.py</strong> can be chained with other commandline tools to yield quick results, especially where the OneNote file is used to download a 2nd-stage payload from a C2 address:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WRiQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd84f2f8-d28e-424c-a671-149f30ca5791_868x364.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WRiQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd84f2f8-d28e-424c-a671-149f30ca5791_868x364.png 424w, https://substackcdn.com/image/fetch/$s_!WRiQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd84f2f8-d28e-424c-a671-149f30ca5791_868x364.png 848w, https://substackcdn.com/image/fetch/$s_!WRiQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd84f2f8-d28e-424c-a671-149f30ca5791_868x364.png 1272w, https://substackcdn.com/image/fetch/$s_!WRiQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd84f2f8-d28e-424c-a671-149f30ca5791_868x364.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WRiQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd84f2f8-d28e-424c-a671-149f30ca5791_868x364.png" width="666" height="279.2903225806452" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bd84f2f8-d28e-424c-a671-149f30ca5791_868x364.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:868,&quot;resizeWidth&quot;:666,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!WRiQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd84f2f8-d28e-424c-a671-149f30ca5791_868x364.png 424w, https://substackcdn.com/image/fetch/$s_!WRiQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd84f2f8-d28e-424c-a671-149f30ca5791_868x364.png 848w, https://substackcdn.com/image/fetch/$s_!WRiQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd84f2f8-d28e-424c-a671-149f30ca5791_868x364.png 1272w, https://substackcdn.com/image/fetch/$s_!WRiQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd84f2f8-d28e-424c-a671-149f30ca5791_868x364.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 6: Didier Stevens&#8217; commandline tools can be chained together to extract easy wins</figcaption></figure></div><p><strong>OneNoteAnalyzer</strong> is a significantly more fully-featured tool, extracting metadata, attachments and images from the document for a more detailed review:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TN1M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbde4361-535a-4146-9a95-c616e4680080_1301x309.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TN1M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbde4361-535a-4146-9a95-c616e4680080_1301x309.png 424w, https://substackcdn.com/image/fetch/$s_!TN1M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbde4361-535a-4146-9a95-c616e4680080_1301x309.png 848w, https://substackcdn.com/image/fetch/$s_!TN1M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbde4361-535a-4146-9a95-c616e4680080_1301x309.png 1272w, https://substackcdn.com/image/fetch/$s_!TN1M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbde4361-535a-4146-9a95-c616e4680080_1301x309.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TN1M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbde4361-535a-4146-9a95-c616e4680080_1301x309.png" width="650" height="154.38124519600308" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bbde4361-535a-4146-9a95-c616e4680080_1301x309.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:309,&quot;width&quot;:1301,&quot;resizeWidth&quot;:650,&quot;bytes&quot;:null,&quot;alt&quot;:2,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="2" title="2" srcset="https://substackcdn.com/image/fetch/$s_!TN1M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbde4361-535a-4146-9a95-c616e4680080_1301x309.png 424w, https://substackcdn.com/image/fetch/$s_!TN1M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbde4361-535a-4146-9a95-c616e4680080_1301x309.png 848w, https://substackcdn.com/image/fetch/$s_!TN1M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbde4361-535a-4146-9a95-c616e4680080_1301x309.png 1272w, https://substackcdn.com/image/fetch/$s_!TN1M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbde4361-535a-4146-9a95-c616e4680080_1301x309.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Figure 7: OneNoteAnalyzer dumping attached COM executables from the maldoc</figcaption></figure></div><p>For a more detailed walkthrough of the overall process, check out Josh Stroschein&#8217;s video that examines an <strong>ASyncRAT delivery campaign</strong>:</p><div id="youtube2-kK6Tsmr_wCY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;kK6Tsmr_wCY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/kK6Tsmr_wCY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1>How can I detect it?</h1><h2>Examining files with YARA rules</h2><p>The YARA rules created and shared publicly thusfar have focused on:</p><ol><li><p>The &#8220;<strong>magic bytes</strong>&#8221; identifying OneNote files (0xE4525C7B);</p></li><li><p>The <a href="https://learn.microsoft.com/en-us/openspecs/office_file_formats/ms-onestore/8806fd18-6735-4874-b111-227b83eaac26">FileDataStoreObject GUID </a>{BDE316E7-2665-4511-A4C4-8D4D0B7A9EAC} that <strong>indicates embedded files</strong> (<a href="https://blog.didierstevens.com/2023/01/22/analyzing-malicious-onenote-documents/">flagged by</a> Didier Stevens);</p></li><li><p>Potentially <strong>malicious strings</strong>.</p></li></ol><blockquote><p>The two main public rules worth referencing are from <a href="https://github.com/Neo23x0/signature-base/blob/master/yara/gen_onenote_phish.yar">Nextron Systems</a>, and <a href="https://yaraify.abuse.ch/yarahub/rule/MALWARE_OneNote_Delivery_Jan23">SECUINFRA</a>.</p></blockquote><h2>SIEM Detections using Sigma rules</h2><p>@nas_bench from Nextron Systems has provided <a href="https://github.com/SigmaHQ/sigma/blob/4921c96703cb60dcc54898d9a1f65f534ea7a844/rules/windows/file/file_event/file_event_win_one_extension_files_in_susp_locations.yml">this Sigma rule </a>that looks for <strong>OneNote files created in suspicious directories</strong>, which are commonly abused to drop downloaded files.</p><p>I&#8217;ve also had a go at creating a Sigma rule that looks for <strong>variations of the process tree</strong> you&#8217;re likely to see in a campaign leveraging OneNote files, including where they&#8217;ve <strong>renamed the system binaries being abused</strong>. You can find it <a href="https://github.com/OpalSec/curated-sigma/blob/main/Payload_Delivery/malicious_onenote_execution.yaml">here</a>. </p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Opalsec is a reader-supported publication. To receive new posts and support my work, please consider becoming a paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F&quot;,&quot;text&quot;:&quot;Upgrade Subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://opalsec.substack.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fopalsec.substack.com%2F"><span>Upgrade Subscription</span></a></p><p></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[KeePass Vulnerability allows export of clear-text credentials]]></title><description><![CDATA[KeePass: "That sounds like a 'you' problem."]]></description><link>https://opalsec.substack.com/p/keepass-vulnerability-allows-export</link><guid isPermaLink="false">https://opalsec.substack.com/p/keepass-vulnerability-allows-export</guid><dc:creator><![CDATA[Opalsec]]></dc:creator><pubDate>Mon, 30 Jan 2023 02:18:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!B_QG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!B_QG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!B_QG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!B_QG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!B_QG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!B_QG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!B_QG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png" width="900" height="556" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:556,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:746473,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!B_QG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!B_QG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!B_QG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!B_QG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F213607b2-020e-4840-8fa0-8b5545f80da4_900x556.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>An <a href="https://github.com/alt3kx/CVE-2023-24055_PoC">exploit PoC</a> has been shared publicly for CVE-2023-24055, which relates to the ability for an attacker to add an export trigger within the KeePass XML configuration file, <strong>enabling them to dump clear-text passwords </strong>from the Password Manager.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Y6oT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f67145-134c-4222-892e-7a995e8af3f0_898x264.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Y6oT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f67145-134c-4222-892e-7a995e8af3f0_898x264.png 424w, https://substackcdn.com/image/fetch/$s_!Y6oT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f67145-134c-4222-892e-7a995e8af3f0_898x264.png 848w, https://substackcdn.com/image/fetch/$s_!Y6oT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f67145-134c-4222-892e-7a995e8af3f0_898x264.png 1272w, https://substackcdn.com/image/fetch/$s_!Y6oT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f67145-134c-4222-892e-7a995e8af3f0_898x264.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Y6oT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f67145-134c-4222-892e-7a995e8af3f0_898x264.png" width="672" height="197.55902004454342" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1f67145-134c-4222-892e-7a995e8af3f0_898x264.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:264,&quot;width&quot;:898,&quot;resizeWidth&quot;:672,&quot;bytes&quot;:null,&quot;alt&quot;:2,&quot;title&quot;:2,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="2" title="2" srcset="https://substackcdn.com/image/fetch/$s_!Y6oT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f67145-134c-4222-892e-7a995e8af3f0_898x264.png 424w, https://substackcdn.com/image/fetch/$s_!Y6oT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f67145-134c-4222-892e-7a995e8af3f0_898x264.png 848w, https://substackcdn.com/image/fetch/$s_!Y6oT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f67145-134c-4222-892e-7a995e8af3f0_898x264.png 1272w, https://substackcdn.com/image/fetch/$s_!Y6oT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1f67145-134c-4222-892e-7a995e8af3f0_898x264.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Figure 1: The credentials are dumped in plain-text to an xml file</figcaption></figure></div>
      <p>
          <a href="https://opalsec.substack.com/p/keepass-vulnerability-allows-export">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Beware spoofed x.509 Certificates]]></title><description><![CDATA[Flaw in Windows CryptoAPI library enables MitM, spoofed signed executables]]></description><link>https://opalsec.substack.com/p/beware-spoofed-x509-certificates</link><guid isPermaLink="false">https://opalsec.substack.com/p/beware-spoofed-x509-certificates</guid><dc:creator><![CDATA[Opalsec]]></dc:creator><pubDate>Mon, 30 Jan 2023 02:04:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hiuO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hiuO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hiuO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!hiuO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!hiuO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!hiuO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hiuO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png" width="900" height="556" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:556,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:746473,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hiuO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!hiuO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!hiuO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!hiuO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd3c418-c169-43d9-838c-efdf4987ae05_900x556.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Researchers from Akamai have released a <a href="https://www.akamai.com/blog/security-research/exploiting-critical-spoofing-vulnerability-microsoft-cryptoapi">technical write-up </a>and <a href="https://github.com/akamai/akamai-security-research/tree/main/PoCs/CVE-2022-34689">PoC exploit </a>for CVE-2022-34689, a critical vulnerability in the Windows CryptoAPI library that could enable attackers to <strong>spoof legitimate x.509 Certificates</strong>, in order to perform authentication or code signing as the spoofed certificate.</p><blockquote><p>This could be abused by attackers to deliver malicious executables that appear to be signed by a legitimate code-signing certificate, or to perform MiTM attacks on encrypted network traffic.</p></blockquote><h2>Technical Details</h2><p>The vulnerability stems from the <em>CreateChainContextFromPathGraph</em> function call in the crypt32.dll module, which <strong>validates cached certificates solely based on the value of the certificate&#8217;s MD5 thumbprint.</strong></p>
      <p>
          <a href="https://opalsec.substack.com/p/beware-spoofed-x509-certificates">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[OneNote emerges as the latest maldoc format of choice]]></title><description><![CDATA[How it's abused, and tips for performing analysis of malicious samples]]></description><link>https://opalsec.substack.com/p/onenote-emerges-as-the-latest-maldoc</link><guid isPermaLink="false">https://opalsec.substack.com/p/onenote-emerges-as-the-latest-maldoc</guid><dc:creator><![CDATA[Opalsec]]></dc:creator><pubDate>Mon, 30 Jan 2023 01:54:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ReDE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ReDE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ReDE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!ReDE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!ReDE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!ReDE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ReDE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png" width="900" height="556" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:556,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:746473,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ReDE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png 424w, https://substackcdn.com/image/fetch/$s_!ReDE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png 848w, https://substackcdn.com/image/fetch/$s_!ReDE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png 1272w, https://substackcdn.com/image/fetch/$s_!ReDE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b18e81-e808-4d52-b1ca-7c6f5462d9ae_900x556.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The revolving door of maldocs continues, with OneNote documents the latest seen abused in-the-wild. </p><p>The collaborative file format has been leveraged in a limited number of campaigns to deliver malware, with <strong>ASyncRAT and xworm</strong> among the malware families seen distributed.</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/phage_nz/status/1615132638288957440&quot;,&quot;full_text&quot;:&quot;OneNote maldoc leading to AsyncRAT. ONENOTE &amp;gt; HTA &amp;gt; BAT &amp;gt; EXE. Payload: hXXps://transfer[.]sh/get/5dLEvB/sky.bat C2: 154.12.250[.]38 Ports: 6606, 7707, 8808 ONE: <a class=\&quot;tweet-url\&quot; href=\&quot;https://bazaar.abuse.ch/sample/15212428deeeabcd5b11a1b8383c654476a3ea1b19b804e4aca606fac285387f/\&quot;>bazaar.abuse.ch/sample/1521242&#8230;</a> BAT: <a class=\&quot;tweet-url\&quot; href=\&quot;https://tria.ge/230116-3mxwbsfc89\&quot;>tria.ge/230116-3mxwbsf&#8230;</a> &quot;,&quot;username&quot;:&quot;phage_nz&quot;,&quot;name&quot;:&quot;Chris&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Mon Jan 16 23:43:23 +0000 2023&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FmoYR9PakAA9ANW.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/qK8UfF1ICA&quot;,&quot;alt_text&quot;:null},{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FmoYTV-akAAyZ8V.png&quot;,&quot;link_url&quot;:&quot;https://t.co/qK8UfF1ICA&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:23,&quot;like_count&quot;:84,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><blockquote><p>Uptake of the document format hasn&#8217;t been widespread just yet, but given the novelty and utility of the delivery method, it&#8217;s worth familiarising yourself with the tools and techniques needed to analyse such payloads.</p></blockquote><h2>A bit of background</h2><p>While actors can&#8217;t embed VBA macros in OneNote files like they can with Word and Excel documents, there are a number of other advantages:</p>
      <p>
          <a href="https://opalsec.substack.com/p/onenote-emerges-as-the-latest-maldoc">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>