Menu
Cybercriminals use sophisticated PowerShell-based malware

Cybercriminals use sophisticated PowerShell-based malware

Two separate threats that use malicious Windows PowerShell scripts were identified in the past few weeks by malware researchers

Cybercriminals have been developing increasingly sophisticated malware that make use of Windows PowerShell scripts in an attempt to fly under the radar.

The Windows PowerShell is a command-line shell and scripting environment designed for automating system and application administration tasks. It is installed by default in Windows 7 and above, but old versions are also available for Windows XP as a separate package.

The abuse of Windows PowerShell for malicious purposes is not new, but it seems that some capable malware developers have turned their focus to this powerful feature lately, as security researchers from both Symantec and Trend Micro have come across new and sophisticated threats that use it.

A newly identified malicious PowerShell script, which Symantec detects as Backdoor.Trojan, "has different layers of obfuscation and is able to inject malicious code into 'rundll32.exe' so that it can hide itself in the computer while still running and acting like a back door," Symantec security researcher Roberto Sponchioni said Monday in a blog post.

When run, the script compiles and executes malicious code embedded into it on the fly. The compiled code then injects more malicious code into rundll32, a system process, in order to make detection harder.

The rogue code in rundll32 connects to a remote server and waits for instructions, which it then executes in a stealthy way, Sponchioni said.

In late March, security researchers from antivirus vendor Trend Micro warned about a different threat that uses PowerShell scripts and is known as CRIGENT or Power Worm.

CRIGENT arrives in malicious Word and Excel documents that get dropped by other malware and download additional components when opened, including the Tor anonymity software and Polipo Web proxy.

"A PowerShell script (detected as VBS_CRIGENT.LK or VBS_CRIGENT.SM) is downloaded which includes all the code necessary to carry out CRIGENT's malicious behavior," the Trend Micro researchers said at the time in a blog post.

The PowerShell script also contains routines to infect clean Word and Excel documents with the malicious CRIGENT code, making the threat a self-propagating computer worm.

The combined use of Tor, Polipo, PowerShell and cloud storage services in this malware highlights the fact that cybercriminals want to use legitimate features in their attacks, the Trend Micro researchers said.

"Users should avoid running unknown PowerShell scripts and should not lower PowerShell's default execution settings in order to prevent potential malicious scripts from executing," the Symantec researchers said.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwaresymantectrend microDesktop security

Featured

Slideshows

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

This year’s Reseller News 30 Under 30 Tech Awards were held as an integral part of the first entirely virtual Emerging Leaders​ forum, an annual event dedicated to identifying, educating and showcasing the New Zealand technology market’s rising stars. The 30 Under 30 Tech Awards 2020 recognised the outstanding achievements and business excellence of 30 talented individuals​, across both young leaders and those just starting out. In this slideshow, Reseller News honours this year's winners and captures their thoughts about how their ideas of leadership have changed over time.​

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners
Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

This exclusive Reseller News Exchange event in Auckland explored the challenges facing the partner community on the cloud security frontier, as well as market trends, customer priorities and how the channel can capitalise on the opportunities available. In association with Arrow, Bitdefender, Exclusive Networks, Fortinet and Palo Alto Networks. Photos by Gino Demeer.

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security
Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomed 2019 inductees - Leanne Buer, Ross Jenkins and Terry Dunn - to the fourth running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing face of the IT channel ecosystem in New Zealand and what it means to be a Reseller News Hall of Fame inductee. Photos by Gino Demeer.

Reseller News welcomes industry figures at 2020 Hall of Fame lunch
Show Comments