Article Details
Scrape Timestamp (UTC): 2024-05-21 22:34:10.771
Original Article Text
Click to Toggle View
GhostEngine mining attacks kill EDR security using vulnerable drivers. A malicious crypto mining campaign codenamed 'REF4578,' has been discovered deploying a malicious payload named GhostEngine that uses vulnerable drivers to turn off security products and deploy an XMRig miner. Researchers at Elastic Security Labs and Antiy have underlined the unusual sophistication of these crypto-mining attacks in separate reports and shared detection rules to help defenders identify and stop them. However, neither report attributes the activity to known threat actors nor shares details about targets/victims, so the campaign's origin and scope remain unknown. GhostEngine While it is unclear how servers are initially breached, the threat actor's attack starts with the execution of a file named 'Tiworker.exe,' which masquerades as a legitimate Windows file. This executable is the initial staging payload for GhostEngine, a PowerShell script that downloads various modules to conduct different behaviors on an infected device. When Tiworker.exe is executed, it will download a PowerShell script named 'get.png' from the attacker's command and control (C2) server, which acts as GhostEngine's primary loader. This PowerShell script downloads additional modules and their configurations, disables Windows Defender, enables remote services, and clears various Windows event logs. Next, get.png verifies that the system has at least 10MB of free space, which is necessary for furthering the infection, and creates scheduled tasks named 'OneDriveCloudSync,' 'DefaultBrowserUpdate,' and 'OneDriveCloudBackup,' for persistence. The PowerShell script will now download and launch an executable named smartsscreen.exe, which acts as GhostEngine's primary payload. This malware is responsible for terminating and deleting EDR software and downloading and launching the XMRig to mine for cryptocurrency. To terminate EDR software, GhostEngine loads two vulnerable kernel drivers: aswArPots.sys (Avast driver), which is used to terminate EDR processes, and IObitUnlockers.sys (Iobit driver) to delete the associated executable. A list of the processes targeted by the EDR terminator is shown below: For persistence, a DLL named 'oci.dll' is loaded by a Windows service named 'msdtc'. When started, this DLL will download a fresh copy of 'get.png' to install the latest version of GhostEngine on the machine. Though Elastic hasn't seen impressive figures from the single payment ID they examined, it's possible that each victim comes with a unique wallet, so the overall financial gain could be significant. Defending against GhostEngine Elastic researchers suggest defenders look out for suspicious PowerShell execution, unusual process activity, and network traffic pointing to crypto-mining pools. Additionally, deploying vulnerable drivers and creating associated kernel mode services should be treated as red flags in any environment. An aggressive measure is to block file creation from vulnerable drivers like aswArPots.sys and IobitUnlockers.sys. Elastic Security has also provided YARA rules in the report to help defenders identify GhostEngine infections.
Daily Brief Summary
A new crypto mining campaign named 'REF4578' has been identified deploying a malware called GhostEngine that disables security products using vulnerable drivers.
GhostEngine starts its attack using a masqueraded Windows file, 'Tiworker.exe', which serves as a launcher for further malicious activities.
The main payload, downloaded via a PowerShell script ('get.png'), kills endpoint detection and response (EDR) software and initiates crypto mining using XMRig.
To disrupt EDR operations, GhostEngine employs vulnerable kernel drivers from Avast and Iobit to terminate process and delete executables.
Researchers have not pinpointed the origin of the attacks or identified specific victims, leaving the scope and impact of the campaign unclear.
Continuous updating mechanisms are implemented by downloading new versions of the malicious PowerShell script using scheduled tasks for persistence.
Defense strategies against GhostEngine involve monitoring for unusual PowerShell usage, suspicious processes or network traffic, particularly to known crypto-mining pools, and blocking file creation from vulnerable drivers.
Elastic Security Labs has provided YARA rules to aid defenders in detecting signs of GhostEngine infections in their networks.