OTORIO Prevents Crippling Cyberattack on a Global Industrial Company
Manufacturers often have thousands of endpoints and numerous remote connections worldwide that can easily be crippled by a cyber attack such as ransomware. It is imperative that they have a security process in place to detect and identify these attacks before they are executed. In this way, they can prevent damage to employees and equipment and keep production lines running at full capacity.
OTORIO Prevents Crippling Cyberattack on a Global Industrial Company
OTORIO’s Incident Response (IR) team was called to investigate suspicious activity within the network of one of its customers. The team was able to detect the threat - a Dridex-type ransomware, map all the infected assets and defuse the attack only days before it was set to be executed.
Background
The customer is a leading global engineering company, with over 30,000 endpoints distributed globally. The company also maintains remote connections to clients’ production sites across over 40 countries worldwide. In the summer of 2019, the company was targeted by sophisticated cyber-attackers, with live operators actively running a multi-stage ransomware attack. By the time OTORIO arrived on the scene, the client’s network was 99% compromised, allowing the attackers to deploy a ransomware virus at any moment.
THE CHALLENGE: A TICKING TIME BOMB
The attack was first noticed when the customer’s IT team discovered a scheduled task on one of its computers, created by a user that was not supposed to be active. When OTORIO’s IR team began investigating, it established that the attack was carried out by remote hackers who were continuously monitoring the network. Any attempt to take active measures against it could have resulted in scaring the attackers away, or worse - causing them to execute an irreversible attack. OTORIO’s IR team had to work quickly and discreetly as it was evident that the attack could be executed at any time.
OTORIO was tasked with:
ISOLATING THE THREAT
OTORIO’s IR team’s first mission was to investigate the suspicious scheduled task, trying to extract any relevant information about its nature or source. After investigating the executable that the task was running, it was determined that the malware was of the Dridex1 family.
A deeper investigation revealed that hundreds of stations were infected by malware, and that the attackers were using credentials with the highest privileges possible - such as domain administrator - to spread the malware. Time was critical as it was only a matter of days before the hackers could take control of all the stations in the network.
Working closely with the customer’s IT and OT teams, OTORIO’s IR team scanned the network in order to identify processes that were used throughout the company and flagging possible benign software that were being used maliciously. Together, they located the maliciously installed program used by the attackers. With the guidance and support of OTORIO’s IR team, The customer created a situation room and assigned a taskforce to handle the incident consisting of IT employees, domain admins and CISOs from across the globe.
At the same time, OTORIO’s Threat Intelligence and Research teams continued to examine the incident. Correlating the data they were able to gather with indicators that linked to previous Dridex attacks, the investigation led to solid connections between IP addresses that were communicating with the customer’s network and IP addresses that are known to be used by Dridex.
FINDING PATIENT ZERO
Following the attack footprints, OTORIO’s team was able to trace patient zero to the first infected computer. This station belonged to one of the customer’s employees who unknowingly, browsed a water-holed2 website that had a pop-up message claiming the user must update their browser to continue surfing. Once the employee opened the fake update file, a JavaScript downloader ran and executed the second stage of the attack - the Empire3 framework.
The attacker used both Dridex and the Empire Framework to propagate through the network, actively acquiring higher privilege users until finally getting hold of multiple domain controllers and a variety of different servers and endpoints. At this stage in past Dridex attacks, the group’s next step would usually be to install BitPaymer - Dridex’s associated ransomware.
TAKING BACK CONTROL
Once the threat was identified, and together with the customer’s taskforce, OTORIO’s IR team took steps to remove the threat and give the customer back control over its network. These steps included:
In the end, none of the stations on the network were encrypted. The attacker was blocked from the network which was then wiped clean of all traces of malware. Indicators of the attack were collected and implemented into newly-created rules and policies. The customer’s security teams were briefed and the investigation and mitigation were concluded. The incident triggered a company-wide security assessment by OTORIO, which now works with the customer on strengthening its network defenses and processes.
1 Dridex is a malware developed by a cybercrime group dubbed INDRIK SPIDER. Originally, Dridex was used as a banking trojan that would gather credentials in order to steal money from its targets. Over time, Dridex got more sophisticated and shifted its modus operandi towards the world of ransomware. In its current versions, Dridex utilizes high privilege user credentials they acquire in order to install a custom written ransomware either to critical assets or domain wide.
2 A watering hole attack refers to a method in which an attacker compromises a legitimate website in order to infect unsuspecting victims who browse the website. This watering hole attack was created with a known exploit kit that drops malware as a service for malware creators.
3 Empire is an open source post-exploitation framework that offers secure communications between attacker and target. It allows the attacker to run different commands on the victim’s network to gather information or perform actions without being detected.