Article Details
Scrape Timestamp (UTC): 2024-06-25 10:43:41.004
Source: https://thehackernews.com/2024/06/new-attack-technique-exploits-microsoft.html
Original Article Text
Click to Toggle View
New Attack Technique Exploits Microsoft Management Console Files. Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files to gain full code execution using Microsoft Management Console (MMC) and evade security defenses. Elastic Security Labs has codenamed the approach GrimResource after identifying an artifact ("sccm-updater.msc") that was uploaded to the VirusTotal malware scanning platform on June 6, 2024. "When a maliciously crafted console file is imported, a vulnerability in one of the MMC libraries can lead to running adversary code, including malware," the company said in a statement shared with The Hacker News. "Attackers can combine this technique with DotNetToJScript to gain arbitrary code execution, which can lead to unauthorized access, system takeover and more." The use of uncommon file types as a malware distribution vector is seen as an alternative attempt by adversaries to get around security guardrails erected by Microsoft in recent years, including disabling macros by default in Office files downloaded from the internet. Last month, South Korean cybersecurity firm Genians detailed the use of a malicious MSC file by the North Korea-linked Kimsuky hacking group to deliver malware. GrimResource, on the other hand, exploits a cross-site scripting (XSS) flaw present in the apds.dll library to execute arbitrary JavaScript code in the context of MMC. The XSS flaw was originally reported to Microsoft and Adobe in late 2018, although it remains unpatched to date. The technique not only bypasses ActiveX warnings, it can be combined with DotNetToJScript to gain arbitrary code execution. The analyzed sample uses this approach to launch a .NET loader component dubbed PASTALOADER that ultimately paves the way for Cobalt Strike. "After Microsoft disabled Office macros by default for internet-sourced documents, other infection vectors like JavaScript, MSI files, LNK objects, and ISOs have surged in popularity," security researchers Joe Desimone and Samir Bousseaden said. "However, these other techniques are scrutinized by defenders and have a high likelihood of detection. Attackers have developed a new technique to execute arbitrary code in Microsoft Management Console using crafted MSC files." Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.
Daily Brief Summary
Threat actors have developed a new technique using Microsoft Management Console (MMC) files to bypass security measures and execute malicious code.
The approach, named GrimResource, involves specially crafted management saved console (MSC) files that exploit vulnerabilities in MMC libraries.
When combined with DotNetToJScript, this technique allows for arbitrary code execution, leading to unauthorized system access and control.
This method exploits a known XSS flaw in the apds.dll library, which remains unpatched since its report to both Microsoft and Adobe in late 2018.
A recent example involves the North Korea-linked Kimsuky hacking group using a malicious MSC file to deliver malware.
Elastic Security Labs discovered this technique after analyzing an uploaded artifact on the VirusTotal platform, highlighting the ongoing evolution of cyber attack methods.
Despite Microsoft's efforts to restrict malware dissemination via commonly abused file types, attackers continue to find alternative methods like MSC files to deploy attacks.