Topline Takeaways
- Industry target: Professional & Commercial Services
- Attacker methods:
- Recommended mitigations:
- Enforce multi-factor authentication (MFA) on all user accounts.
- Employee security training.
- Regularly audit both the environment and endpoints.
Incident Timeline for 2024-10-03
Blackpoint’s MDR technology alerted our Active SOC to the use of “Autoit3.exe” on the host of a professional & commercial services partner. Initial investigation revealed that the detection appeared to be a DarkGate malware infection; the file was located in a directory that is commonly abused by threat actors as it is hidden by default “C:\ProgramData\”.
Further analysis revealed that Autoit3.exe spawned an executable called cmd.exe, which appeared to be legitimate command prompt. However, the executable was observed making outbound connections with the default gateway IP address, 192.168.4[.]1. Blackpoint’s SOC analysts isolated the impacted machine and contacted the partner to inform them of the detection and isolation.
More About DarkGate Malware
DarkGate malware is a malware-as-a-service (MaaS) that has been sold on cybercriminal marketplaces since at least 2017. The malware allows attackers to conduct malicious activities such as keylogging, information theft, privilege escalation, remote access, and deploying additional malware payloads.
Threat actors likely find this an attractive option for malware due to the multiple uses the tool has for data exfiltration, acting as an initial access broker (IAB) for threat groups to deploy additional malware, such as ransomware, and it has automatic connectivity to remote control servers.
APG Threat Analysis for DarkGate Malware
Blackpoint’s Adversary Pursuit Group (APG) predicts the continued use of malware, like DarkGate malware, for persistence and collection is likely over the next 12 months, as observed in similar incidents involving our partners in Consumer Cyclicals on April 12, 2024. External reports further reinforce this trend, with threat actors like TA571 leveraging DarkGate malware as an IAB for a recently reported attack.
Mitigations
- MFA on All Accounts: Enforcing MFA can prevent attackers from exploiting compromised credentials.
- Create and implement employee security training: DarkGate is often delivered via social engineering attacks; employees should be aware of how to identify potential social engineering tactics; how and when to report to an incident response authority.
- Regularly audit both environment and endpoints to help identify anomalous activity in an environment.