DFIR/DTR Tip: A New Execution Technique Using ClearFake Attack.
Mohammed AlAqeel
Subject Matter Expert in Cyber Defense solutions | Digital Forensic Incident Response|SecOps| Cyber Threat Intelligence| Threat Detection and Response |GCFA | GCFE| GCTI| eCMAP| OSCP| OSINT/SOCMINT | IT and OT.
A new execution technique using threat actors to evade “defense” security controls in enterprises.
The name of this technique is "ClearFake," It's a JavaScript framework known to use drive-by downloads and social engineering techniques, often presenting fake “browser update” pages to users.
These attacks work by driving traffic to websites that are similar to legitimate ones, then presenting users with a page claiming that they need to perform a browser update to view the site’s content.
The goal is typically to get users to download malicious files, leading to data theft or deployment of further malware and persistence.
Threat actors are now using different methods to download and execute malware, moving away from embedding malicious payloads to employing a relatively new technique, EtherHiding.
So let’s going through a Scenario of Attack
In this scenario i have explained one of technique to drop malicious powershell scripts.
Note: In reference below, I have mentioned more scenarios.
So how usually does that happen? As initial action that happens by social engineering tactics to present a malicious “fake browser update” page to the victim user. This fake update page, delivered through JavaScript iframes, uses legitimate branding to trick a user into downloading a fake, malicious browser update package. The payload is then downloaded onto the victim’s machine.
This file or script has usually been packaged in different ways across various campaigns and as several different file type extensions, ranging from Windows executable (.EXE) files to Windows application files (.APPX). This payload, a malware loader, is designed to conduct further malicious activity on the victim host and boasts a number of capabilities, from information stealing to command-and-control (C2) mechanisms.
Threat actors are injecting malicious script code, which can download and execute malicious Script payloads. This malicious Script code is injected into the target website . These websites are then used to host malicious Script content and deliver it to victim users through “watering hole” style attacks.
领英推荐
A watering hole attack is a technique which often uses a legitimate website that has been compromised via other means or, in some cases, an impersonating website designed to look and feel like a website that the target victim would commonly navigate to (as a clickjacking technique)
By using a website that is familiar to the victim, the victim is more likely to frequently visit the website and interact with it, which enables an attacker to manipulate the victim’s trust.
When users visit a compromised website fake browser error prompt that asks the user to install a malicious update for their browser.
in these cases, the website belonged to legitimate businesses that were likely compromised through vulnerabilities allowing code to be injected. The error prompt instructs the user to manually execute malicious PowerShell code, so once a
So now let’s suggest some mitigation and detection rules:
Reference :-
Happy Investigation and Detection