• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

New Exfiltrator-22 post-exploitation kit linked to LockBit ransomware

Bill Toulas by Bill Toulas
February 27, 2023
Reading Time: 3 mins read
0
Sneaky hackers reverse defense mitigations when detected

Hacker shhhing

RELATED POSTS

Online sellers targeted by new information-stealing malware campaign

Zyxel shares tips on protecting firewalls from ongoing attacks

Microsoft is killing Cortana on Windows starting late 2023

Threat actors are promoting a new ‘Exfiltrator-22’ post-exploitation framework designed to spread ransomware in corporate networks while evading detection.

Threat analysts at CYFIRMA claim that this new framework was created by former Lockbit 3.0 affiliates who are experts in anti-analysis and defense evasion, offering a robust solution in exchange for a subscription fee.

The prices for Exfiltrator-22 range between $1,000 per month and $5,000 for lifetime access, offering continuous updates and support.

Buyers of the framework are given an admin panel hosted on a bulletproof VPS (virtual private server) from where they can control the framework’s malware and issue commands to compromised systems.

The first version of the Exfiltrator-22 (EX-22) appeared in the wild on November 27, 2022, and roughly ten days later, its authors set up a Telegram channel to advertise the framework to other cybercriminals.

Telegram channel set up by EX-22 authors
Telegram channel set up by EX-22 authors (CYFIRMA)

By the end of the year, the threat actors announced new features that helped conceal traffic on compromised devices, indicating that the framework was under active development.

Buy JNews
ADVERTISEMENT

In January 2023, EX-22 was deemed 87% ready by its authors, and subscription prices were announced, inviting interested users to purchase access to the tool.

On February 10, 2023, the threat actors posted two demonstration videos on YouTube to showcase EX-22’s lateral movement and ransomware-spreading capabilities.

Exfiltrator-22 features

EX-22 includes features commonly found in other post-exploitation toolkits but also additional features geared towards deploying ransomware and data theft.

The highlight features included in the framework are:

  • Establish a reverse shell with elevated privileges.
  • Upload files to the breached system or download files from the host to the C2.
  • Activate a keylogger to capture keyboard input.
  • Activate a ransomware module to encrypt files on the infected device.
  • Capture a screenshot from the victim’s computer.
  • Start a live VNC (Virtual Network Computing) session for real-time access on the compromised device.
  • Gain higher privileges on the infected device.
  • Establish persistence between system reboots.
  • Activate a worm module that spreads the malware to other devices on the same network or the public internet.
  • Extract data (passwords and tokens) from the LSAAS (Local Security Authority Subsystem Service).
  • Generate cryptographic hashes of files on the host to help closely monitor file locations and content change events.
  • Fetch the list of running processes on the infected device.
  • Extract authentication tokens from the breached system.

The above commands are sent to compromised devices through the  Windows ‘EX22 Command & Control’ console program.

EX-22 Command & Control console application
EX-22 Command & Control console application

These commands’ outputs are then returned to the command and control server and displayed directly in the console application, as shown below.

Creating scheduled tasks through EX-22 panel
Creating scheduled tasks through EX-22’s panel (CYFIRMA)

Through the service’s web panel, cybercriminals can also set scheduled tasks, update agents to a new version, change a campaign’s configuration, or create new campaigns.

Linked to LockBit ransomware members

The CYFIRMA team has found evidence that LockBit 3.0 affiliates or members of the ransomware operation’s development team are behind EX-22.

First, they noticed that the framework uses the same “domain fronting” technique associated with the LockBit and the TOR obfuscation plugin Meek, which helps hide malicious traffic inside legitimate HTTPS connections to reputable platforms.

Upon further investigation, CYFIRMA has found that EX-22 also uses the same C2 infrastructure previously exposed in a LockBit 3.0 sample.

VirusTotal results
Recent VirusTotal scan results (CYFIRMA)

Unfortunately, Exfiltrator-22 appears to have been created by knowledgeable malware authors who possess the skills to develop an evasive framework.

Hence, it is expected to generate much interest in the cybercrime community despite its high price, naturally resulting in further code development and feature improvements.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

Beware: Hackers now use OneNote attachments to spread malware
Cyber Security

Online sellers targeted by new information-stealing malware campaign

June 3, 2023
Zyxel warns of critical vulnerabilities in firewall and VPN devices
Cyber Security

Zyxel shares tips on protecting firewalls from ongoing attacks

June 3, 2023
Microsoft is killing Cortana on Windows starting late 2023
Cyber Security

Microsoft is killing Cortana on Windows starting late 2023

June 2, 2023
Hackers use new, fake crypto app to breach networks, steal cryptocurrency
Cyber Security

The Week in Ransomware – June 2nd 2023 – Whodunit?

June 2, 2023
Microsoft fixes Windows 11 22H2 file copy performance hit
Cyber Security

Windows 11 to require SMB signing to prevent NTLM relay attacks

June 2, 2023
FBI warns of spike in ‘pig butchering’ crypto investment schemes
Cyber Security

NSA and FBI: Kimsuky hackers pose as journalists to steal intel

June 2, 2023

Recommended Stories

Windows 11 KB5020044 preview update released with 25 changes

Microsoft removes Windows 11 update block for PCs with gaming issues

December 15, 2022
As community questions ARB transfer, Arbitrum Foundation takes this step

As community questions ARB transfer, Arbitrum Foundation takes this step

April 3, 2023
SHIB sellers intensify bearish bias; can bulls push for a recovery?

SHIB sellers intensify bearish bias; can bulls push for a recovery?

May 2, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • How Blur achieved a new milestone from an unexpected source
  • Why Bitcoin will not retest $20,000 anytime soon
  • TRON bulls could push for another 5% hike given…

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?