DarkGate malware delivered by way of Microsoft Groups


Government abstract

Whereas most finish customers are well-acquainted with the hazards of conventional phishing assaults, akin to these delivered by way of e mail or different media, a big proportion are probably unaware that Microsoft Groups chats could possibly be a phishing vector. Most Groups exercise is intra-organizational, however Microsoft permits Exterior Entry by default, which permits members of 1 group so as to add customers exterior the group to their Groups chats. Maybe predictably, this characteristic has offered malicious actors a brand new avenue by which to take advantage of untrained or unaware customers.

In a latest instance, an AT&T Cybersecurity Managed Detection and Response (MDR) buyer proactively reached out with considerations a couple of consumer who was exterior to their area sending an unsolicited Groups chat to a number of inside members. The chat was suspected to be a phishing lure. The client offered the username of the exterior consumer in addition to the IDs of a number of customers who have been confirmed to have accepted the message.

With this data, the AT&T Cybersecurity MDR SOC group was capable of determine the focused customers, in addition to suspicious file downloads initiated by a few of them. A assessment of the techniques and indicators of compromise (IOCs) utilized by the attacker confirmed them to be related to DarkGate malware, and the MDR SOC group was capable of head off the assault earlier than any vital injury was performed.

Investigation

Preliminary occasion assessment

Indicators of compromise

The client offered the under screenshot (Picture 1) of the message that was obtained by one in all their customers and which was suspected to be a phishing lure. An vital element to notice right here is the “.onmicrosoft.com” area identify. This area, by all appearances, is genuine and most customers would in all probability assume that it’s respectable. OSINT analysis on the area additionally exhibits no stories for suspicious exercise, main the MDR SOC group to imagine the username (and presumably your complete area) was probably compromised by the attackers previous to getting used to launch the phishing assault.

Picture 1: Screenshot from buyer of obtained message

teams message

Expanded investigation

Occasions search

Performing a search of the exterior username within the buyer’s setting led the MDR group to over 1,000 “MessageSent” Groups occasions that have been generated by the consumer. Though these occasions didn’t embody the IDs of the recipients, they did embody the exterior consumer’s tenant ID, as displayed in Picture 2 under.

Picture 2: Occasion log exhibiting exterior consumer tenant ID

Teams event log

A Microsoft 365 tenant ID is a globally distinctive identifier assigned to a company. It’s what permits members of various corporations to speak with each other by way of Groups. So long as each members of a chat have legitimate tenant IDs, and Exterior Entry is enabled, they will alternate messages. With this in thoughts, the MDR SOC group was capable of question occasions that contained the exterior consumer’s tenant ID and located a number of “MemberAdded” occasions, that are generated when a consumer joins a chat in Groups.

Picture 3: “MemberAdded” occasion

member added

These occasions embody the sufferer’s consumer ID, however not the exterior consumer ID. Along with the exterior tenant ID, the MDR SOC group was capable of positively hyperlink these “MemberAdded” occasions again to the attacker by way of the “ChatThreadId” subject, which was additionally current within the authentic “MessageSent” occasions. The client was supplied with a listing of customers who accepted the exterior chat and was then capable of start figuring out doubtlessly compromised belongings and accounts for remediation.

Occasion deep-dive

The MDR SOC group continued to drill down on the phished customers to find out the exact nature of the assault. They subsequently found three customers who had downloaded a suspicious double extension file. The file was titled “Navigating Future Adjustments October 2023.pdf.msi” (Picture 4).

Picture 4: Suspicious double extension file obtain

suspicious download

Double extension recordsdata are generally utilized by attackers to trick customers into downloading malicious executables, because the second extension, .msi on this case, is often hidden by the filesystem. The consumer believes they’re downloading a PDF for enterprise use, however as a substitute receives a malicious installer.

The MDR SOC group was capable of present the filename and related hashes to the shopper who in flip handed that data onto their endpoint detection and response (EDR) supplier so the file could possibly be added to the blocklist. The details about the file downloads additionally enabled the shopper to start figuring out affected belongings for isolation and remediation.

Reviewing for added indicators

The client later offered the malicious file to the MDR SOC group for additional evaluation. Upon detonation in a sandbox, the file tried to beacon out to the area hgfdytrywq[.]com, which is a confirmed DarkGate command-and-control (C2) area, based on Palo Alto Networks (https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/most important/2023-10-12-IOCs-for-DarkGate-from-Groups-chat.txt). The filename can be similar to the recordsdata listed by Palo Alto Networks and the double-extension file is a identified DarkGate tactic.

Remediation

The MDR SOC offered the shopper with a listing of customers who had obtained the message, customers who have been confirmed to have accepted the message, and customers who have been recognized as having initiated a obtain of the malicious .msi file. The client used this data to provoke password resets for the affected customers and to find out which belongings have been contaminated in order that they could possibly be remoted and rolled again to a clear state. The DarkGate file hashes and paths have been blocklisted by the shopper’s EDR answer and the C2 area was blocked. The client was additionally suggested to think about disabling Groups Exterior Entry until it was essential for enterprise use.

Suggestions

Electronic mail phishing assaults have lengthy been a menace to organizations, and they’re going to proceed to be, however phishing by way of Microsoft Groups is a comparatively new phenomenon. This assault vector is a reminder of the necessity for fixed vigilance and consumer coaching within the face of evolving threats.

Except completely essential for day by day enterprise use, disabling Exterior Entry in Microsoft Groups is advisable for many corporations, as e mail is mostly a safer and extra intently monitored communication channel. As all the time, finish customers ought to be skilled to concentrate to the place unsolicited messages are coming from and ought to be reminded that phishing can take many kinds, past the everyday e mail. Not everyone seems to be on the identical group!

Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top