Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted Attacks

0
332
Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted Attacks


Feb 22, 2023Ravie LakshmananExploitation Framework / Cyber Threat

Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted Attacks

An open supply command-and-control (C2) framework often known as Havoc is being adopted by risk actors as a substitute for different well-known professional toolkits like Cobalt Strike, Sliver, and Brute Ratel.

Cybersecurity agency Zscaler stated it noticed a brand new marketing campaign to start with of January 2023 concentrating on an unnamed authorities group that utilized Havoc.

“While C2 frameworks are prolific, the open-source Havoc framework is a complicated post-exploitation command-and-control framework able to bypassing essentially the most present and up to date model of Windows 11 defender because of the implementation of superior evasion methods resembling oblique syscalls and sleep obfuscation,” researchers Niraj Shivtarkar and Niraj Shivtarkar stated.

The assault sequence documented by Zscaler begins with a ZIP archive that embeds a decoy doc and a screen-saver file that is designed to obtain and launch the Havoc Demon agent on the contaminated host.

Demon is the implant generated by way of the Havoc Framework and is analogous to the Beacon delivered by way of Cobalt Strike to realize persistent entry and distribute malicious payloads.

Havoc Framework for Post-Exploitation

It additionally comes with all kinds of options that makes it troublesome to detect, turning it right into a profitable instrument within the palms of risk actors at the same time as cybersecurity distributors are pushing again towards the abuse of such professional pink workforce software program.

“After the Demon is deployed efficiently on the goal’s machine, the server is ready to execute varied instructions on the goal system,” Zscaler stated, including the server logs the command and its response upon execution. The outcomes are subsequently encrypted and transmitted again to the C2 server.

Havoc has additionally been employed in reference to a fraudulent npm module dubbed aabquerys that, as soon as put in, triggers a three-stage course of to retrieve the Demon implant. The bundle has since been taken down.

Found this text attention-grabbing? Follow us on Twitter and LinkedIn to learn extra unique content material we put up.

LEAVE A REPLY

Please enter your comment!
Please enter your name here