Hackers Used Nasty "SMB Worm" Attack Toolkit Against Sony
Just hours after the FBI and President Obama called out North Korea
as being responsible for the destructive cyber attack against Sony
Pictures, US-CERT issued an alert describing the primary malware
used by the attackers, along with indicators of compromise. While not
mentioning Sony by name in its advisory, instead referring to the victim
as a "major entertainment company," US-CERT said that the attackers used a Server Message Block (SMB) Worm Tool to conduct the attacks.
According to the advisory, the SMB Worm Tool is equipped with five
components, including a Listening Implant, Lightweight Backdoor, Proxy
Tool, Destructive Hard Drive Tool, and Destructive Target Cleaning Tool.
US-CERT also provided a list of the Indicators of Compromise
(IOCs), which include C2 IP addresses, Snort signatures for the various
components, host based Indicators, potential YARA signatures to detect
malware binaries on host machines, and recommended security practices
and tactical mitigations.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.