July 10, 2019 By David Bisson 2 min read

Security researchers observed an Astaroth attack that used only living-off-the-land techniques to run the backdoor directly in memory on Windows machines.

The Microsoft Defender ATP Research Team detected the Astaroth attack after noticing an anomaly from a Windows Defender Antivirus algorithm used for catching fileless campaigns. This led the researchers to an infection chain that relied strictly on living-off-the-land techniques — the use of regular tools already present on the system — to avoid raising any red flags.

The infection chain began with a series of spear phishing emails that contained malicious links to redirect users to a LNK file. When double-clicked, the LNK file executed the Windows Management Instrumentation Command (WMIC) tool with the /Format parameter. The campaign then executed JavaScript code to download payloads using the Bitsadmin tool.

At this point, the attacks used Certutil to decode the payloads and then the Regsvr32 tool to run a series of dynamic link libraries (DLLs). This chain of events eventually led one DLL to load into Userinit and then load Astaroth as its final payload. With Astaroth activated, threat actors could use the backdoor to steal sensitive information and move laterally across the network.

Astaroth Abuses Windows Services and Legitimate Tools

Astaroth attacks often abuse legitimate Windows services. In September 2018, Cofense spotted a campaign that compromised 8,000 machines in one week by exploiting WMIC and Certutil. News of this attack came several months before Cybereason detected a campaign in which threat actors abused legitimate operating system functionality and security-related products to distribute the backdoor to users in Brazil.

Awareness Is the Best Defense Against an Astaroth Attack

Security awareness training to educate employees about phishing campaigns and other digital threats can help defend against an Astaroth attack. Analysts should use this education framework in tandem with a patch management strategy and a deep familiarity with built-in Windows code to spot anomalies that could be indicative of fileless attacks.

More from

We are moving!

< 1 min read - SecurityIntelligence.com is being sunset, but have no fear!We have a new home for all of your favorite security and X-Force content.Follow us to www.ibm.com/think to maintain access to the stories and news you love, both new and old.Security Intelligence will officially sunset on Friday, March 28, 2025. To access the latest security thought leadership, go here. To access the latest X-Force research, go here.If you are experiencing cybersecurity issues or an incident, contact X-Force® to help:US hotline: 1-888-241-9812 | Global hotline:…

Bypassing Windows Defender Application Control with Loki C2

10 min read - Windows Defender Application Control (WDAC) is a security solution that restricts execution to trusted software. Since it is classified as a security boundary, Microsoft offers bug bounty payouts for qualifying bypasses, making it an active and competitive field of research.Typical outcomes of a WDAC bypass bug bounty submission:Bypass is fixed; possible bounty awardedBypass is not fixed but instead "mitigated" by being added to the WDAC recommended block list. Likely no bounty awarded but honorable mention is typically givenBypass is not…

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today