September 11, 2018 By Douglas Bonderud 2 min read

A new zero-day vulnerability that was disclosed on Twitter and GitHub two weeks ago has already been weaponized for use in the wild.

As reported by We Live Security, the tweet posted on Aug. 27 linked to a GitHub repository containing proof-of-concept code for the exploit, which affects Windows operating systems 7 through 10, along with its source code. The tweet was subsequently deleted, but a group known as PowerPool used the link to create its own version of this zero-day attack and infect computers in Chile, Germany, India, the Philippines, Poland, Russia, the U.K., the U.S. and Ukraine.

By leveraging a flaw in the advanced local procedure call (ALPC) process, specifically the SchRpcSetSecurity application programming interface (API) function, attackers can grant restricted users the power to view and change the contents of write-protected files. PowerPool’s developers have been using a combination of typical spear phishing emails and spamming symbolic link (.slk) files that open Microsoft Excel and then execute PowerShell scripts.

Why Leaked Source Code Poses a Threat

Along with the quick uptake of this threat vector as part of PowerPool’s tool set and the ever-present use of phishing emails, companies should also be aware of the risk presented by the dissemination of source code. Because the GitHub link contained both a compiled version of the exploit and its source code, threat actors can quickly modify and recompile the zero-day vulnerability to streamline its functionality, integrate it into a larger malware package and evade detection.

Security teams should also take note of PowerPool’s use of multiple backdoors. The first-stage backdoor conducts basic reconnaissance, such as collecting proxy information and screenshotting the victim’s display, then sending this data back to the command-and-control (C&C) server. A second-stage backdoor is then installed on devices that hold more data, allowing malicious actors to execute commands, kill processes, upload and download files, and list folders. In addition, lateral movement tools — such as PowerDump and PowerSploit — are installed along with second-stage backdoors.

How Can Companies Zero In on Zero-Day Flaws?

Since “zero-day flaws are just vulnerabilities for which there is no patch,” according to IBM X-Force threat intelligence expert Michelle Alvarez, IT asset management (ITAM) is crucial to handling this type of exploit. While it’s impossible to predict the occurrence of zero-day threats, effective management of IT assets makes it easier to identify potential risk vectors and critical points of entry.

Cybersecurity adviser Michael Melore, meanwhile, recommends developing “cybersecurity muscle memory” by creating and regularly testing incident response plans (IRPs) for zero-day attacks and other threats. That way, even if unexpected disclosures occur, security professionals are ready to react.

Source: We Live Security

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today