Specifically, my research partners and myself around 1 year ago theorized that COM objects if used to spawn IE could be used to get around/through proxy servers in environments. Proxy servers have provided a severely overestimated layer of protection.
-
-
Prikaži ovu nit
-
Organization's security teams have come to assume that "Since the malware doesn't know the proxy details, auth mechanism or have user credentials callouts will fail". However, this is a faulty assumption as with COM objects + IE you can automatically get that information!
Prikaži ovu nit -
We proved through our own private testing around 6 months ago that if COM is used to call IE and COM is used to control the instance of IE that it will automatically use the current users credentials, proxy information, etc to automatically authenticate with Proxy servers.
Prikaži ovu nit -
This is all pulled automatically by the browser as Windows already has access to all of this information (cached credentials, systems proxy server+port, etc). When we tested the POC code my research partner wrote it successfully called out through our test proxy.
Prikaži ovu nit -
EDR/EPP, OS and Proxy Vendors have been aware of COM abuse for years. Yet 10 years after this was first published online NONE of them appear to have visibility, detections or preventions or mitigation for COM object abuse.
Prikaži ovu nit -
Now that Hancitor commodity malware is utilizing COM objects for the very scenario my research partners and myself feared, with the lack of protections available we fear for companies, organizations, etc everywhere.
Prikaži ovu nit -
As such we have decided to publish this information to let SOC's in companies everywhere know about this threat. We don't believe COM object abuse + auto pulling of cached creds will end with just C2 callouts and stage 2 downloads. We believe this is just a single avenue of abuse
Prikaži ovu nit -
We theorize that there may be similar ways to do lateral movement via COM object calls to SMB, RDP, etc to other systems. We also believe that since IE is as integrated into windows as these other protocols are that they may be able to use cached credentials as well.
Prikaži ovu nit -
This being the case without security companies and operating system vendors stepping up to mitigate the risk of COM object abuse we believe this is only the begging of how this could utilized. There are 13,000+ COM objects in Windows 10, they can control nearly OS function.
Prikaži ovu nit -
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.