Return to Top
SolarMarker Incident with Healthcare Partner on April 5, 2024
Topline Takeaways
- Industry target: Healthcare
- Attacker information:
- Impacted partner systems:
- Threat assessment for partners:
- The APG predicts that it is likely that threat actors will continue to use SolarMarker to exploit other healthcare organizations over the next 12 months.
- Recommended remediations and mitigations:
- Heuristics-based activity monitoring and remediation
- Least-privilege access controls
- Password managers
SolarMarker Incident Timeline for April 5, 2024
- The Blackpoint SOC received an onboarding ticket request for a new healthcare partner.
- The SOC began the onboarding process for the new partner, and our MDR immediately alerted to pre-existing malicious activity on the host endpoint: malicious PowerShell scripts tied to SolarMarker malware. The scripts created several variables to call on for a persistence payload disguised as a shortcut (lnk file) in the compromised user’s startup folder.
- An MDR analyst escalated the incident to senior SOC leadership. A senior MDR analyst observed the PowerShell script, noting that its outbound connections led to an IP address geolocated to Denmark. The script itself was heavily obfuscated to bypass antivirus (AV) detections and employed a fileless persistence technique by creating a registry key in the user’s registry hive.
- The senior MDR analyst isolated the impacted endpoints from all external and internal communications.
- The SOC made contact with the partner about the incident and provided additional remediation advice.
More About SolarMarker
Active since 2021, SolarMarker is a malware variant written in .NET that possesses a backdoor and information stealing capability (4). SolarMarker encrypts its traffic to C2 servers using hard-coded RSA key and a symmetric AES CBC algorithm; data is often exfiltrated in a JSON format to the server.
SolarMarker has previously collected information about the infected system (4), including:
- Machine name,
- OS version,
- System architecture (x64 or x86),
- User rights (admin or users),
- Workgroup,
- DNS, and
- Protocol version.
APG Threat Analysis of SolarMarker for 2024
The APG predicts that threat actors will almost certainly continue to use SolarMarker and other information stealing malware over the next 12 months.
We base this assessment on observed attempted attacks in Blackpoint SOC protected environments, as well as third-party research observations.
In 2024, security researchers with Malwarebytes reported a cyberattack involving SolarMarker malware targeting an academic institution; the malware had been present on the system since 2021 (5). This activity was reportedly identified due to PowerShell attempting to establish a network connection to an IP address in France – a similar tactic the Blackpoint SOC observed in this week’s specific incident.
In fact, SolarMarker has increasingly become a reliable information stealing malware for threat actors. Critical verticals, such as Academics and Healthcare, remain an attractive target to threat actors – both advanced persistent threat (APT) and cybercriminal – due to:
- The vast amount of personal information that can be sold to other threat actors,
- The ability to sell access to other criminal groups, such as ransomware operators, and
- The impact these attacks can have on an organization.
Recommended SolarMarker Mitigations and Remediations
The APG recommends the following actions to help mitigate the SolarMarker malware:
- Implement least privilege access controls, to help ensure that users only have access to the data and resources required to complete their job functions in the event of a compromised credential or account.
- Implement behavioral monitoring
These actions will help you detect unusual patterns that could be indicative of malicious behavior by threat actors. In this case, traditional EDRs and AVs may have been unable to detect this SolarMarker infection, as it had explicitly designed scripts for persistence and obfuscation against AVs prior to onboarding. However, with the installation of malicious-activity alerts and managed triage by the Blackpoint SOC, the infected device was identified and isolated almost immediately. In addition, you should…
- Encourage the use of secure password managers, versus browser-based password storage that can be accessed by information stealing malware such as SolarMarker.