Researched and written by Rindert Kramer and Dirk-jan Mollema Introduction During internal penetration tests, it happens quite often that we manage to obtain Domain Administrative access within a few hours. Contributing to this are insufficient system hardening and the use of insecure Active Directory defaults. In such scenarios publicly available tools help in finding and exploiting these issues … Continue reading Escalating privileges with ACLs in Active Directory
Category: Blog
Compromising Citrix ShareFile on-premise via 7 chained vulnerabilities
A while ago we investigated a setup of Citrix ShareFile with an on-premise StorageZone controller. ShareFile is a file sync and sharing solution aimed at enterprises. While there are versions of ShareFile that are fully managed in the cloud, Citrix offers a hybrid version where the data is stored on-premise via StorageZone controllers. This blog … Continue reading Compromising Citrix ShareFile on-premise via 7 chained vulnerabilities
mitm6 – compromising IPv4 networks via IPv6
While IPv6 adoption is increasing on the internet, company networks that use IPv6 internally are quite rare. However, most companies are unaware that while IPv6 might not be actively in use, all Windows versions since Windows Vista (including server variants) have IPv6 enabled and prefer it over IPv4. In this blog, an attack is presented … Continue reading mitm6 – compromising IPv4 networks via IPv6
Detection and recovery of NSA’s covered up tracks
Part of the NSA cyber weapon framework DanderSpritz is eventlogedit, a piece of software capable of removing individual lines from Windows Event Log files. Now that this tool is leaked and public, any criminal willing to remove its traces on a hacked computer can use it. Fox-IT has looked at the software and found a … Continue reading Detection and recovery of NSA’s covered up tracks
FAQ about PETYA/GOLDENEYE/PETR outbreak
Revision history: 29th of June, 2017 18:00 (UTC +2) - Update 2 (current) - Added Q11 28th of June, 2017 22:00 (UTC +2) - Update 1 - Initial FAQ Q1 Is the Petya attack still in progress? A: The initial attack vector appears to have been the accounting software M.E.Doc, for which a malicious software update … Continue reading FAQ about PETYA/GOLDENEYE/PETR outbreak
Recent vulnerability in Eir D1000 Router used to spread updated version of Mirai DDoS bot
Over the last two months a lot has been written about the DDoS malware called Mirai. The first known attack, that only later was attributed to Mirai, was against the Krebs On Security blog on September 20th. It is likely that this same botnet attacked Dyn a month later, causing a massive outage among popular … Continue reading Recent vulnerability in Eir D1000 Router used to spread updated version of Mirai DDoS bot
Ziggo ransomware phishing campaign still increasing in size
Introduction Fox-IT's Security Operations Center (SOC) observed fake Ziggo invoice e-mails, since October 6th 2016, linking to a ransomware variant known as TorrentLocker. The group behind TorrentLocker has previously been observed using fake Dutch postal service emails imitating PostNL, back in 2014. This distribution method of abusing local postal service names was seen in a lot of … Continue reading Ziggo ransomware phishing campaign still increasing in size
Mofang: A politically motivated information stealing adversary
Mofang (模仿, Mófa ̌ng, to imitate) is a threat actor that almost certainly operates out of China and is probably government-affiliated. It is highly likely that Mofang’s targets are selected based on involvement with investments, or technological advances that could be perceived as a threat to the Chinese sphere of influence. This is most clearly … Continue reading Mofang: A politically motivated information stealing adversary
LinkedIn information used to spread banking malware in the Netherlands
Since early this morning (7th of June 2016, around 08:30 AM) the Fox-IT Security Operations Center started detecting a large amount of phishing e-mails containing a malicious Word document. This e-mail campaign appears to be targeting the Netherlands, using Dutch text in both the e-mail and Word document. The content of the e-mail: Geachte Firstname Lastname, … Continue reading LinkedIn information used to spread banking malware in the Netherlands
Ransomware deployments after brute force RDP attack
Fox-IT has encountered various ways in which ransomware is being spread and activated. Many infections happen by sending spam e-mails and luring the receiver in opening the infected attachment. Another method is impersonating a well-known company in a spam e-mail stating an invoice or track&trace information is ready for download. By following the link provided … Continue reading Ransomware deployments after brute force RDP attack