Valak malware steals corporate data using Microsoft Exchange servers

Valak using Microsoft Exchange

Cyberreason Nocturnus experts dicho that the Valak bootloader discovered in 2019 now exploits vulnerabilities in Microsoft Exchange servers. It has become a full-fledged info-staler and attacks companies in the USA and Germany.

Researchers write that in the last six months, the malware has received more than 20 updates and now poses a complete and independent threat.

Valak spreads through phishing attacks and Microsoft Word documents containing malicious macros.

“If the malware penetrated the system, a .DLL file with the name U.tmp is downloaded to the infected machine and saved in a temporary folder. Then the WinExec API call is made and the JavaScript code is loaded, establishing a connection with the management servers. Después de eso, additional files are downloaded to the infected host, which are decoded using Base64 and XOR, and the main payload is deployed”, — say Cyberreason Nocturnus.

To securely gain a foothold in a compromised system, the malware makes changes to the registry and creates a scheduled task. Después de eso, Valak proceeds to download and run additional modules that are responsible for detecting and stealing data.

The two main payloads (project.aspx and a.aspx) perform different functions. The first manages registry keys, task scheduling and malicious activity, y el segundo (internal name PluginHost.exe) is an executable file for managing additional malware components.

The ManagedPlugin module has a variety of functions: collects system information (local and domain data); has an Exchgrabber function, the purpose of which is to penetrate Microsoft Exchange by stealing credentials and domain certificates; has a geolocation verifier and screenshot capture function; contains a Netrecon network intelligence tool.

“The theft of confidential data gives attackers access to the user of the internal domain, eso es, access to the organization’s internal mail services, as well as access to the organization’s domain certificate. With systeminfo, attackers can determine which user is the domain administrator. This creates a dangerous combination of confidential data leakage and large-scale potential compromise for cyber espionage or data theft. This demonstrates that the initial goals of this malware are primarily enterprises”, — conclude the experts.

Let me remind you that despite Microsoft eliminated an error in the Exchange Control Panel in Microsoft Exchange, according to researchers at Rapid7, administrators did not update the software and many servers remained vulnerable.

Por Vladimir Krasnogolovy

Vladimir es un especialista técnico al que le encanta dar consejos y sugerencias cualificados sobre los productos de GridinSoft. Está disponible las 24 horas del día, los 7 días de la semana para ayudarte con cualquier pregunta relacionada con la seguridad en Internet.

Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *