BTC $104330.3707
ETH $2510.1520
XRP $2.1630
BNB $654.1283
SOL $154.5333
DOGE $0.1903
ADA $0.6737
TRX $0.2684
stETH $2506.6324
WBTC $104198.0763
SUI $3.2539
HYPE $32.4676
wstETH $3019.9422
LINK $13.8756
AVAX $20.6916
USDS $0.9971
XLM $0.2660
BCH $403.3624
LEO $8.6647
TON $3.1362
HBAR $0.1681
WETH $2509.6504
LTC $86.6251
weETH $2681.9653
DOT $4.0474
XMR $326.6821
BSC-USD $1.0009
BGB $4.6659
BTCB $104391.3173
WBT $31.1115
USDE $1.0009
PEPE $0.0000
PI $0.6362
TAO $427.1778
AAVE $241.5329
UNI $6.1813
DAI $1.0000
sUSDe $1.1713
CRO $0.1028
OKB $50.0234
APT $4.7432
NEAR $2.4095
CBBTC $104330.1318
ICP $4.9012
ONDO $0.8276
ETC $16.8752
GT $19.2728
BTC $104330.3707
ETH $2510.1520
XRP $2.1630
BNB $654.1283
SOL $154.5333
DOGE $0.1903
ADA $0.6737
TRX $0.2684
stETH $2506.6324
WBTC $104198.0763
SUI $3.2539
HYPE $32.4676
wstETH $3019.9422
LINK $13.8756
AVAX $20.6916
USDS $0.9971
XLM $0.2660
BCH $403.3624
LEO $8.6647
TON $3.1362
HBAR $0.1681
WETH $2509.6504
LTC $86.6251
weETH $2681.9653
DOT $4.0474
XMR $326.6821
BSC-USD $1.0009
BGB $4.6659
BTCB $104391.3173
WBT $31.1115
USDE $1.0009
PEPE $0.0000
PI $0.6362
TAO $427.1778
AAVE $241.5329
UNI $6.1813
DAI $1.0000
sUSDe $1.1713
CRO $0.1028
OKB $50.0234
APT $4.7432
NEAR $2.4095
CBBTC $104330.1318
ICP $4.9012
ONDO $0.8276
ETC $16.8752
GT $19.2728
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • The FBI and CISA have issued recommendations for countering the AvosLocker ransomware

    A tried-and-true attack plan was discovered by experts and disseminated to all organizations.

    The Federal Bureau of Investigation (FBI) and the US Cybersecurity and Infrastructure Security Agency (CISA) released a joint statement that added new details about the tools that attackers using the AvosLocker ransomware, about which the FBI previously reported, were using.

    Affiliates of AvosLocker are known to remotely administer systems and steal data from business networks using open source code and reputable software.

    In order to navigate the network, increase privileges, and disable security systems, the FBI documented the use of custom PowerShell, web shells, and batch scripts.

    The following are some of the resources in the departments' updated message:

    1. Splashtop Streamer, Tactical RMM, PuTTy, AnyDesk, PDQ Deploy, and Atera Agent are examples of remote administration software.
    2. tools for a network that uses open source to tunnel: chisel, ligo;
    3. Cobalt Strike and Sliver are two frameworks for simulating attackers;
    4. tools for data collection: LaZagne and Mimikatz;
    5. FileZilla and Rclone are tools for data exfiltration.

    The hackers' toolkit also included Notepad++, RDP Scanner, 7-zip, and built-in Windows programs like PsExec and Nltest.

    Attacks frequently include malware called "NetMonitor.exe." Attackers can connect to a compromised network using this component, which acts as a reverse proxy and pretends to be a legitimate process. Even a unique YARA rule was developed by FBI specialists to find NetMonitor on the network.

    The FBI and CISA claimed that organizations in various critical infrastructure sectors in the United States had been compromised by AvosLocker affiliates, affecting Windows, Linux, and VMware ESXi environments.

    The agencies advise businesses to implement sophisticated application controls, such as whitelists, and forbid the use of portable versions of illegal utilities.

    Best practices for threat protection also call for limiting Remote Desktop Protocol (RDP) usage, implementing MFA, and following the least privilege principle. For users who do not need command line and PowerShell scripting support to complete their tasks, organizations should disable it.

    Security experts continue to recommend network segmentation, long passwords, storing them in a hashed format, and routine software and code updates.

    The latest AvosLocker manual supplements the one that was previously made available by the FBI in March of last year. It was mentioned that some AvosLocker ransomware assaults took advantage of flaws in nearby Microsoft Exchange servers.

    Author reign3d
    How do you search in the TOR network?
    New level of transparency: CISA discloses ransomware data in its notifications

    Comments 0

    Add comment