AMEDA unveils modernisation steps for African, ME depositories    US Military Official Discusses Gaza Aid Challenges: Why Airdrops Aren't Enough    US Embassy in Cairo announces Egyptian-American musical fusion tour    ExxonMobil's Nigerian asset sale nears approval    Chubb prepares $350M payout for state of Maryland over bridge collapse    Argentina's GDP to contract by 3.3% in '24, grow 2.7% in '25: OECD    Turkey's GDP growth to decelerate in next 2 years – OECD    $17.7bn drop in banking sector's net foreign assets deficit during March 2024: CBE    EU pledges €7.4bn to back Egypt's green economy initiatives    Egypt, France emphasize ceasefire in Gaza, two-state solution    Norway's Scatec explores 5 new renewable energy projects in Egypt    Microsoft plans to build data centre in Thailand    Japanese Ambassador presents Certificate of Appreciation to renowned Opera singer Reda El-Wakil    Health Minister, Johnson & Johnson explore collaborative opportunities at Qatar Goals 2024    WFP, EU collaborate to empower refugees, host communities in Egypt    Al-Sisi, Emir of Kuwait discuss bilateral ties, Gaza takes centre stage    Sweilam highlights Egypt's water needs, cooperation efforts during Baghdad Conference    AstraZeneca, Ministry of Health launch early detection and treatment campaign against liver cancer    AstraZeneca injects $50m in Egypt over four years    Egypt, AstraZeneca sign liver cancer MoU    Swiss freeze on Russian assets dwindles to $6.36b in '23    Amir Karara reflects on 'Beit Al-Rifai' success, aspires for future collaborations    Climate change risks 70% of global workforce – ILO    Prime Minister Madbouly reviews cooperation with South Sudan    Egypt retains top spot in CFA's MENA Research Challenge    Egyptian public, private sectors off on Apr 25 marking Sinai Liberation    Debt swaps could unlock $100b for climate action    President Al-Sisi embarks on new term with pledge for prosperity, democratic evolution    Amal Al Ghad Magazine congratulates President Sisi on new office term    Egyptian, Japanese Judo communities celebrate new coach at Tokyo's Embassy in Cairo    Uppingham Cairo and Rafa Nadal Academy Unite to Elevate Sports Education in Egypt with the Introduction of the "Rafa Nadal Tennis Program"    Financial literacy becomes extremely important – EGX official    Euro area annual inflation up to 2.9% – Eurostat    BYD، Brazil's Sigma Lithium JV likely    UNESCO celebrates World Arabic Language Day    Motaz Azaiza mural in Manchester tribute to Palestinian journalists    Russia says it's in sync with US, China, Pakistan on Taliban    It's a bit frustrating to draw at home: Real Madrid keeper after Villarreal game    Shoukry reviews with Guterres Egypt's efforts to achieve SDGs, promote human rights    Sudan says countries must cooperate on vaccines    Johnson & Johnson: Second shot boosts antibodies and protection against COVID-19    Egypt to tax bloggers, YouTubers    Egypt's FM asserts importance of stability in Libya, holding elections as scheduled    We mustn't lose touch: Muller after Bayern win in Bundesliga    Egypt records 36 new deaths from Covid-19, highest since mid June    Egypt sells $3 bln US-dollar dominated eurobonds    Gamal Hanafy's ceramic exhibition at Gezira Arts Centre is a must go    Italian Institute Director Davide Scalmani presents activities of the Cairo Institute for ITALIANA.IT platform    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Saudi Arabia cyber security firm detects new attack
Published in Amwal Al Ghad on 20 - 11 - 2017

Saudi Arabia's National Cyber Security Centre (NCSC), a part of the Ministry of Interior, has detected Monday a new Advanced Persistent Threat (APT) that is targeting the Kingdom.
The observed malicious activities used by the threat actor, was a PowerShell based malware connects to multiple known-bad domains, the NCSC said in a tweet on Monday.
The malicious PowerShell utilizes HTTP tunneling to communicate with the command and control domains. The HTTP requests and responses contains data ex-filtrated from infected machines or commands to be executed by the threat actor.
The Saudi centre referred to two techniques that have been observed in the delivery and installation stages; injecting Microsoft Office documents, and accessing compromised websites.
Most of the samples observed were Microsoft Office files containing a macro or a linked object that was delivered through spear phishing emails. Additionally, NCSC said the malicious documents are sometimes compressed in a password protected RAR file to avoid mail protection mechanisms. The password is usually included in the email body.
Some samples were delivered using the watering hole or similar techniques such as cross site scripting. The infection were observed through a compromised website "legitimate websites" where the user is redirected to a malicious website and asked to download a malicious executable. The malicious file would infect the machine with the same VBS and PowerShell scripts.
To detect such malicious activates, the NCSC recommended in a statement following the below actions:
Review Proxy logs / SIEM or NG firewalls for query strings in HTTP requests that follows the pattern below:
*.php?c=(Base64 data)
*.aspx?c=(Base64 data)
HTTP requests to explicit IPs with no domain names
High number of HTTP traffic going to one IP or domain.
HTTP Connections to: 148.251.204.131 & 144.76.109.88
Review the email gateway for emails with password protected attachments or office attachments with macros that either been blocked or alerted.
Increase usage of PowerShell on endpoints and servers
The Saudi centre also said it recommended to have the following controls in order to identify and prevent similar activity:
Upgrade to PowerShell version 5, and remove older versions.
Enable Module Logging, Script-Block Logging and Transcript Logging in PowerShell Version 5
Implement Application whitelisting throughout the organization, this also needs to be implemented on running PowerShell scripts. Only allow the specific scripts that you need to run, if any especially on Public facing servers.
Prevent the execution of executables and scripts from user controlled folders, such as C:\Users\Username and temporary folders, such as C:\Windows\Temp
Use email filtering to scan and block incoming email for macro-enabled documents and other malicious files such as executable, Windows Host Scripting and HTA files.
Implement a File Integrity Monitoring (FIM) Solution on the www root all internet-facing applications, such as web applications, email and VPN portals. It's critical to alert on any unauthorized modification to those servers, as this might indicate a successful attack.


Clic here to read the story from its source.