The MOVEit Transfer exploitation is not just SQL injection(👀)
We uncovered the very last stage of the attack chain to drop human2.aspx ultimately ends up gaining remote code execution ‼
We fully recreated the attack chain with a demo achieving a reverse shell & ransomware!
Check out our latest blog post where we provide a comprehensive guide on utilizing the free THOR Lite for scanning indicators of a compromised MOVEit Transfer service
Be aware that we've included a link to one of the new 'emerging threat' folders in the Sigma rule repository
Hello RichPEHeader, my new friend,
I've come to compute you again,
Because a vision softly creeping,
Through the bits and bytes while I'm sleeping,
And the hash that was planted in my brain,
Still remains, In the realm of machine strain
#LOLDrivers 2.0 Release coming soon
Okay I'm down a rabbit hole but I'm wracking my brain on this, desperately wanting to figure out how the #MOVEit exploit comes together.
We've got in the known IIS logs a procedure (coming disjointly from different IPs) that hits up
- moveitisapi.dll
- guestaccess.aspx
etc
Didn't see it on LOLBAS but Odbcconf has the "/r" flag to register a rps file to via RunOnce :) The key created uses the path of the binary you provide. I.e if you copy it to another location it'll use that instead. Useless? Maybe! But fun :) #lolbin
More: github.com/nasbench/Misc-Res…
Looking for some BYOVD coverage? No worries, #LOLDrivers got you covered. This project was created to shine the light on the darkness. We've seen multiple instances now where the driver was already on our list + some. If you haven't given this project a look and are worried about… tweeter.jakobs.systems/i/web/status/166…