March 31, 2022 Tessa Mishoe
The RedLine password theft malware is a hot topic this month with Microsoft’s employee compromise. Though Microsoft didn’t offer many officially released details on what occurred, we can examine how RedLine works to gain an understanding of what may have possibly occurred.
Let’s not mince words: passwords are difficult for most organizations to manage. Despite the ready availability of password management software, deployment and strategic management of passwords is difficult as your employment numbers skyrocket. It is for this reason that attackers enjoy targeting passwords: it’s much easier to walk directly through the front door if it’s a route available to you. Even then, a less flashy method of obtaining access exists directly through the users.
Insider threats are some of the most dangerous and effective threats, primarily because they cannot be eliminated as risks. They exist within the target network, typically as users that have current access to resources within the network.
A common misrepresentation of the insider threat is of a malicious user, such as a disgruntled employee. Though this is a type of insider threat, it is not the only one: even the most well-meaning and careful of users (including security staff!) can become insider threats. While attack vectors are typically seen as unpatched servers or vulnerable applications, insider threats are a very common attack vector.
RedLine is a malware service available for purchase on underground forums that specifically targets the theft of sensitive information: passwords, credit cards, execution environment data, computer name, installed software, and more recently, cryptocurrency wallets and related files. The first mention of this malware appears to be in early 2020, when multiple phishing campaigns cast a wide net over thousands of users, offering RedLine en masse. The original advertisement to hopeful customers, retrieved from one of these forums and translated from Russian:
Collects from browsers:
Supported browsers:
Performing tasks:
Seen in attacks against healthcare and manufacturing agencies, RedLine started with heavy-hitter industries and only got worse as more users purchased it. Indicators of compromise burst in numbers, standing at a little over 24,000 known at the time of this writing.
Now that we know how RedLine got its start, we can talk about why it’s important to maintain familiarity with it.
In a blog post published on March 22nd, 2022, Microsoft confirmed that one of their user accounts had been compromised by the Lapsus$ (also known as DEV-0537)threat actor, though they claimed that the information accessed was limited and that “no customer code or data was involved”. The next day, Lapsus$ posted screenshots of Microsoft internal source code repositories, though Microsoft also stated that they do not consider the release of source code to be a condition for elevation of risk.
Also on March 22nd, Okta confirmed that the RedLine malware attack they faced from Lapsus$ about two months prior may have compromised over 366 of their corporate customers. Though the Lapsus$ group only received limited access to those specific customers through the account that they compromised, this attack indicates how effective access to even a single account can be. Also notable: the compromised user was a customer support engineer from a contracted third party (Sitel).
With this in mind, remember that Lapsus$ does not always use RedLine to steal data. Their favorite tactics, techniques, and procedures include all manner of credential acquisition, from purchasing the credentials outright on underground forums to recruiting insiders from companies directly.
This being said, using RedLine in combination with some of these tactics would not be surprising. An attacker could pivot into a higher level account using social engineering or, as the Microsoft advisory suggests, ‘(set) an Office 365 tenant level mail transport rule to send all mail in and out of the organization to the newly created account, and then removes all other global admin accounts, so only the actor has sole control of the cloud resources, effectively locking the organization out of all access’. It’s also equally likely that one of the less ‘exciting’ (but equally effective) methods of takeover occurred.
In their blog, the Microsoft team confirms that one of the primary methods used by Lapsus$ is recruitment of active users within the target network, but malicious insiders are not the only type of insider threat. Average users are valuable targets to groups like Lapsus$ for their access and may face things like 2FA spamming (in which an attacker sends a large amount of requests to a user’s 2FA method, hoping that they will intentionally or unintentionally provide access) or social engineering (something that may deliver RedLine or other credential theft malware).
As seen in Okta’s compromise, the takeover of a third-party account caused the breach. Unfortunately, even the strictest of measures towards users within a company may not end up preventing all attacks if contracted companies are not carefully audited for the same security measures.
Recruiting employees is becoming an increasingly popular method for takeover. The Tesla insider threat case and the insider threats seen in SIM-swapping techniques have rocketed the idea of malicious insider threats out into the open. As desperation, bribery, and employee privilege mismanagement increase, insider threats will probably see a strong upward trend. As with most malicious activities, the promise of monetary gain may only draw more attention from both targeted organizations and targeted employees.
Most of cybersecurity’s tribulations have a patchwork solution to cover all parts of a problem, and insider threats are no exception. Through a combination of technical and procedural solutions, most of the issues caused by insider threats can be mitigated:
Defense Against Phishing
Defense Against Malicious Insiders
Defense Against Malicious Insiders
Defense Against RedLine and Similar Malware
Defense Against SIM-Swapping
As with most attack vectors, an effective monitoring solution aids in detection and response against insider threats.
LogicHub harnesses the power of AI and automation for superior detection and response at a fraction of the cost. From small teams with security challenges, to large teams automating SOCs, LogicHub makes advanced detection and response easy and effective for everyone.
May 20, 2022 Willy Leichter
Demystifying the technology with case studies of AI security in action Many automation tools, such...
Learn MoreMay 17, 2022 Willy Leichter
While we’ve been talking about and imagining artificial intelligence for years, it only has...
Learn MoreMay 15, 2022 Tessa Mishoe
Hello, and welcome to the latest edition of the LogicHub Monthly Update! Each month we’ll be...
Learn MoreMay 9, 2022 Tessa Mishoe
Blackcat Ransomware On April 19th of 2022, the FBI Cyber Division released a flash bulletin...
Learn MoreMay 6, 2022 Kumar Saurabh
LogicHub’s unique decision automation technology can build clients the ultimate security playbook...
Learn MoreMay 3, 2022 Kumar Saurabh
Automating a threat-hunting playbook with the help of AI Many threat-hunting playbooks we build for...
Learn MoreApril 29, 2022 Tessa Mishoe
Introduction Within the realm of security, there are many different toolsets and opinions on what...
Learn MoreApril 27, 2022 Willy Leichter
SOAR Playbooks Outside of football, the term “playbook” is well understood by a relatively small...
Learn MoreApril 21, 2022 Willy Leichter
When updating your systems from a pure Security Information Event Management (SIEM), choosing the...
Learn MoreApril 15, 2022 Tessa Mishoe
Hello, and welcome to the latest edition of the LogicHub Monthly Update! Each month we’ll be...
Learn More© 2017-2022 LogicHub®
All Rights Reserved
Privacy Policy
Terms of Use
Sitemap
© 2017-2022 LogicHub®
All Rights Reserved
Privacy Policy
Terms of Use
Sitemap