Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Cybersecurity agencies have issued warnings about the emergence of new variants of the TrueBot malware, which is targeting companies in the U.S. and Canada. This sophisticated threat leverages a critical vulnerability (CVE-2022-31199) found in the widely used Netwrix Auditor server and its associated agents. Exploiting this vulnerability grants unauthorized attackers the ability to execute malicious code with SYSTEM user privileges, providing them unrestricted access to compromised systems.
TrueBot malware, associated with cybercriminal collectives Silence and FIN11, aims to extract confidential data and distribute ransomware, posing a significant risk to infiltrated networks. The initial compromise occurs by exploiting the CVE-2022-31199 vulnerability, after which the TrueBot malware is installed. Once inside the network, the attackers escalate their privileges by deploying the FlawedGrace Remote Access Trojan (RAT). This RAT establishes persistence on compromised systems and facilitates additional operations.
During the execution phase of FlawedGrace, the RAT stores encrypted payloads in the registry and creates scheduled tasks to inject payloads into processes such as msiexec[.]exe and svchost[.]exe. This enables FlawedGrace to establish a command and control (C2) connection to a specific IP address and load dynamic link libraries (DLLs) to escalate privileges further.
Following the initial intrusion, the attackers initiate Cobalt Strike beacons within hours. These beacons enable post-exploitation tasks, including data theft and the installation of ransomware or other malware payloads.
In contrast to previous versions, the updated variants of the TrueBot malware utilize the CVE-2022-31199 vulnerability for initial access, allowing for broader attacks within infiltrated environments. Notably, the Netwrix Auditor software is employed by over 13,000 organizations globally, including prominent entities like Airbus, Allianz, the UK NHS, and Virgin.
The TrueBot attacks involve collaboration with the Raspberry Robin malware and other post-compromise malware such as IcedID and Bumblebee. The use of Raspberry Robin as a distribution platform enables the attackers to target a larger number of victims and amplify the impact of their malicious activities.
Specific information about the victims or the number of organizations affected by the TrueBot attacks was not disclosed. However, the participation of cybercriminal groups Silence and TA505 was emphasized, highlighting the importance of implementing robust security measures.
Organizations are advised to promptly install necessary updates to address the CVE-2022-31199 vulnerability in Netwrix Auditor and upgrade their software to version 10.5 or above. Enhancing security protocols, such as deploying multi-factor authentication (MFA), is essential. Maintaining vigilance for indicators of TrueBot contamination and promptly reporting any incidents to authorities are crucial steps in mitigating the impact of the malware.
By implementing these recommended measures, organizations can bolster their defenses against the TrueBot malware, safeguarding against data breaches, system compromise, and financial losses.