
- #Project m cobalt legacy download how to#
- #Project m cobalt legacy download install#
- #Project m cobalt legacy download update#
- #Project m cobalt legacy download upgrade#
- #Project m cobalt legacy download software#
This JScript will then connect to a remote server and wait for backdoor commands. The DLL will drop and execute a malicious JScript using regsvr32.exe, another command-line utility, to download another JScript and execute it using the same regsvr32.exe. The RTF file contains macro codes that will execute a PowerShell command to retrieve a dynamic-link library (DLL) file before executing it using odbcconf.exe, a command-line utility related to Microsoft Data Access Components. Infection chain of Cobalt’s latest spear phishing campaign using malicious macro

Here’s a visualization of this infection chain:įigure 2. Spam emails containing RTF documents embedded with malicious macros We also saw other threat actors using the same security flaw of late, like the cyberespionage group ChessMaster.īelow are snapshots of some of the spam emails they sent to their targets:įigure 1. The vulnerability was used to retrieve and execute Cobalt Strike from a remote server they controlled. The second, which ran from September 20 to 21, used an exploit for CVE-2017-8759 ( patched last September), a code injection/remote code execution vulnerability in Microsoft’s. The first spam run on August 31 used a Rich Text Format (RTF) document laden with malicious macros. While they previously posed as sales and billing departments of legitimate companies, they’re now masquerading as the customers of their targets (banks), a state arbitration court, and ironically, an anti-fraud and online security company notifying the would-be victim that his “internet resource” has been blocked. The modus commonly seen in attack chains that target end users (i.e., bank customers) is now leveled against the banks themselves. The hacking group's first spam run also targeted a Slovenian bank, while the second run targeted financial organizations in Azerbaijan, Belarus, and Spain.Īpart from using a different vulnerability ( CVE-2017-8759), what’s unique in their latest spear phishing campaigns, compared to their previous spam runs and even other related cybercriminal campaigns, is an apparent role change. This resembles the tactics of another cybercriminal group, Lurk. If successful, they go on to attack financial institutions outside the country. Unlike other groups that avoid Russia (or Russian-speaking countries) to elude law enforcement, Cobalt’s attack patterns suggest that the group uses Russia as a testing ground where they try their latest malware and techniques on Russian banks. The hacking group misused Cobalt Strike, for instance, to perpetrate ATM cyber heists and target financial institutions across Europe, and interestingly, Russia. In their recent campaigns, Cobalt used two different infection chains, with social engineering hooks that were designed to invoke a sense of urgency in its recipients-the bank’s employees.Ĭobalt was named after Cobalt Strike, a multifunctional penetration testing tool similar to Metasploit. The culprit appears to be the Cobalt hacking group, based on the techniques used.

#Project m cobalt legacy download update#
#Project m cobalt legacy download how to#
If you do not know how to do this, contact your IT department.
#Project m cobalt legacy download software#
Note: If you turned off anti-virus and firewall software before installing SCENE, turn them back on.
#Project m cobalt legacy download upgrade#


We will remind you to turn it back on again at the end of this process.
#Project m cobalt legacy download install#
Installing the latest SCENE version overwrites the existing version. If you want, you can change the install location so that the latest version does not overwrite the version you are currently using. 3D Hand Held Scanner - Freestyle3D Objects
