Fileless Malware Targeting Corporate Systems

NJCCIC Alert

Original Release Date: 2018-08-03

Threat actors are deploying a new fileless malware to target corporate networks across the world. Dubbed PowerGhost, the fileless malware is distributed by infecting a single system in a business network and then propagates to other computers and servers on the network via PowerShell, EternalBlue, and Mimikatz. Once infected, devices are used to mine cryptocurrency, allowing threat actors to make a quick profit as the number of infected devices increases. The infection process begins with the attacker deploying exploits or remote administration tools such as Windows Management Instrumentation. During the infection process, a one-line PowerShell script runs and downloads a cryptocurrency miner, Mimikatz, EternalBlue exploit shellcode, and a reflective PE injection module. Once one machine is infected, Mimikatz is used to collect account credentials from the current machine and works together with the EternalBlue exploit to propagate through the network and infect additional devices. 

The NJCCIC recommends users and administrators review SecureList’s blog post for more information and keep all software patched and up-to-date to prevent the exploitation of known vulnerabilities.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.