March 14, 2025
By Esentry team

The BackConnect Boogeyman Strikes Again!

Cybercriminals associated with Black Basta and Cactus ransomware have been observed exploiting social engineering tactics, legitimate remote access tools, and cloud-based infrastructure to gain initial access and establish persistent control over enterprise networks. These attacks are facilitated by BackConnect malware, a tool that enables attackers to remotely manipulate compromised systems.

Attack Methodology

Initial Access: Social Engineering& Remote Access Abuse

·      Email Flooding & Reconnaissance: Attackers first flood targets with phishing emails, some containing malicious links or attachments, while others are mere distractions.

·      Impersonation via Microsoft Teams: Attackers pose as IT support personnel and reach out to employees under the guise of troubleshooting an urgent issue.

·      Gaining Remote Access: Targets are tricked into launching Quick Assist or other remote access tools like Any Desk or TeamViewer.

Execution & Persistence: Weaponizing OneDrive Updater

·      Payload Deployment: Attackers drop malicious DLLs and executables into the victim’s Microsoft OneDrive directory.

·      They exploit OneDriveStandaloneUpdater.exe to sideload these malicious DLLs.

·      WinSCP for File Transfers: Attackers leverage WinSCP to exfiltrate data and move additional payloads within the compromised environment.

·      Registry Modifications & Scheduled Tasks: Persistence is achieved by modifying the Windows Registry and creating scheduled tasks that execute the malicious payloads at system startup.

Command & Control (C2) and Lateral Movement

·      Establishing Remote Access via BackConnect Malware: BackConnect malware allows attackers to maintain persistent access, enabling interactive sessions whenever needed.

·      Spreading Across the Network: Attackers leverage Windows Remote Management (WinRM) and Server Message Block(SMB) to move laterally.

·      Compromised machines communicate with known C2 IP addresses linked to Black Basta.

Privilege Escalation & Credential Dumping:

·      Attackers attempt to escalate privileges using tools like Mimikatz to dump credentials and gain domain-wide access.

Data Exfiltration & Ransomware Deployment

·      Exfiltration via Cloud Services & Encrypted Tunnels: Stolen data is exfiltrated to attacker-controlled cloud storage services or TOR-based destinations.

·      Ransomware Deployment: Once valuable data is exfiltrated, ransomware is deployed to encrypt files, locking victims out of their systems.

·      A ransom note is dropped, demanding payment in cryptocurrency.

Affected Industries

·      Manufacturing, Real Estate, Construction, and Financial Services are key targets.

Mitigation & Recommendations

  1. Enhance Employee Awareness:
       
    • Conduct security awareness training to recognize phishing and social engineering attacks.
    •  
    • Warn employees about impersonation tactics using Microsoft Teams and Quick Assist.
  2.  
  3. Restrict Remote Access Tools:
       
    • Limit the use of remote support software such as Quick Assist.
    •  
    • Implement strong authentication for IT support interactions.
  4.  
  5. Monitor OneDrive and Cloud Storage Usage:
       
    • Restrict unauthorized file downloads and executions from cloud storage services.
    •  
    • Use endpoint detection solutions to identify and block suspicious DLL side-loading      activities.
  6.  
  7. Network  Segmentation & Access Control:
       
    • Implement strict access controls and segmentation to limit lateral movement.
    •  
    • Disable unnecessary SMB and WinRM services.
  8.  
  9. Monitor & Block Malicious C2 Communications:
       
    • Implement network monitoring tools to detect outbound traffic to known C2 IPs.
    •  
    • Block identified malicious domains and IPs in firewall and proxy configurations.

You can access our Github repo for Indicators of Compromise