July 10, 2019 By David Bisson 2 min read

Security researchers observed an Astaroth attack that used only living-off-the-land techniques to run the backdoor directly in memory on Windows machines.

The Microsoft Defender ATP Research Team detected the Astaroth attack after noticing an anomaly from a Windows Defender Antivirus algorithm used for catching fileless campaigns. This led the researchers to an infection chain that relied strictly on living-off-the-land techniques — the use of regular tools already present on the system — to avoid raising any red flags.

The infection chain began with a series of spear phishing emails that contained malicious links to redirect users to a LNK file. When double-clicked, the LNK file executed the Windows Management Instrumentation Command (WMIC) tool with the /Format parameter. The campaign then executed JavaScript code to download payloads using the Bitsadmin tool.

At this point, the attacks used Certutil to decode the payloads and then the Regsvr32 tool to run a series of dynamic link libraries (DLLs). This chain of events eventually led one DLL to load into Userinit and then load Astaroth as its final payload. With Astaroth activated, threat actors could use the backdoor to steal sensitive information and move laterally across the network.

Astaroth Abuses Windows Services and Legitimate Tools

Astaroth attacks often abuse legitimate Windows services. In September 2018, Cofense spotted a campaign that compromised 8,000 machines in one week by exploiting WMIC and Certutil. News of this attack came several months before Cybereason detected a campaign in which threat actors abused legitimate operating system functionality and security-related products to distribute the backdoor to users in Brazil.

Awareness Is the Best Defense Against an Astaroth Attack

Security awareness training to educate employees about phishing campaigns and other digital threats can help defend against an Astaroth attack. Analysts should use this education framework in tandem with a patch management strategy and a deep familiarity with built-in Windows code to spot anomalies that could be indicative of fileless attacks.

More from

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally.The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets.Who is exploiting the NGFW zero-day?As of now, little is known about the actors behind the…

How TikTok is reframing cybersecurity efforts

4 min read - You might think of TikTok as the place to go to find out new recipes and laugh at silly videos. And as a cybersecurity professional, TikTok’s potential data security issues are also likely to come to mind. However, in recent years, TikTok has worked to promote cybersecurity through its channels and programs. To highlight its efforts, TikTok celebrated Cybersecurity Month by promoting its cybersecurity focus and sharing cybersecurity TikTok creators.Global Bug Bounty program with HackerOneDuring Cybersecurity Month, the social media…

Roundup: The top ransomware stories of 2024

2 min read - The year 2024 saw a marked increase in the competence, aggression and unpredictability of ransomware attackers. Nearly all the key numbers are up — more ransomware gangs, bigger targets and higher payouts. Malicious ransomware groups also focus on critical infrastructure and supply chains, raising the stakes for victims and increasing the motivation to cooperate.Here are the biggest ransomware stories of 2024.Ransomware payments reach record highRansomware payments surged to record highs in 2024. In the first half of the year, victims…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today