In yet another case of bring your own vulnerable driver (BYOVD)
attack, the operators of the BlackByte ransomware are leveraging a
flaw in a legitimate Windows driver to bypass security
solutions.
“The evasion technique supports disabling a whopping list of
over 1,000 drivers on which security products rely to provide
protection,” Sophos threat researcher Andreas Klopsch said[1]
in a new technical write-up.
BYOVD is an attack technique[2]
that involves threat actors abusing vulnerabilities in legitimate,
signed drivers to achieve successful kernel-mode exploitation and
seize control of compromised machines.
Weaknesses in signed drivers have been increasingly co-opted by
nation-state threat groups in recent years, including Slingshot[3], InvisiMole[4], APT28[5], and most recently, the
Lazarus Group[6].
BlackByte, believed to be an offshoot of the now-discontinued Conti group[7], is part of the big game
cybercrime crews, which zeroes in on large, high-profile targets as
part of its ransomware-as-a-service (RaaS) scheme.
According to the cybersecurity firm, recent attacks mounted by
the group have taken advantage of a privilege escalation and code
execution flaw (CVE-2019-16098[8], CVSS score: 7.8)
affecting the Micro-Star MSI Afterburner RTCore64.sys driver to
disable security products.
What’s more, an analysis of the ransomware sample[9]
has uncovered multiple similarities between the EDR[10] bypass implementation
and that of a C-based open source tool called EDRSandblast[11], which is designed to
abuse vulnerable signed drivers to evade detection.
BlackByte is the latest ransomware family to embrace the BYOVD
method to achieve its goals, after RobbinHood[12] and AvosLocker[13], both of which have
weaponized bugs in gdrv.sys (CVE-2018-19320[14]) and asWarPot.sys to
terminate processes associated with endpoint protection
software.
To protect against BYOVD attacks, it’s recommended to keep track
of the drivers installed on the systems and ensure they are
up-to-date, or opt to blocklist drivers known to be
exploitable.
References
- ^
said
(news.sophos.com) - ^
attack
technique (www.eset.com) - ^
Slingshot
(thehackernews.com) - ^
InvisiMole
(thehackernews.com) - ^
APT28
(thehackernews.com) - ^
Lazarus
Group (thehackernews.com) - ^
now-discontinued Conti group
(thehackernews.com) - ^
CVE-2019-16098
(nvd.nist.gov) - ^
ransomware sample
(www.virustotal.com) - ^
EDR
(en.wikipedia.org) - ^
EDRSandblast
(github.com) - ^
RobbinHood
(www.welivesecurity.com) - ^
AvosLocker
(thehackernews.com) - ^
CVE-2018-19320
(nvd.nist.gov)
Read more https://thehackernews.com/2022/10/blackbyte-ransomware-abuses-vulnerable.html