Nobelium Uses Custom Malware To Backdoor Windows Domain

Share post:

A new malware called “FoggyWeb” is being used by the Nobelium hacking group, the attackers behind the SolarWinds supply chain attack of 2020.

The malware, a passive and highly targeted backdoor that abuses the Security Assertion Markup Language token, helps attackers steal sensitive information from compromised Active Directory Federation Services (AD FS) servers.

Microsoft explained: “NOBELIUM uses FoggyWeb to remotely exfiltrate the configuration database of compromised AD FS servers, decrypted token-signing certificate and token-decryption certificate as well as to download and execute additional components. It can also receive additional malicious components from a command-and-control (C2) server and execute them on the compromised server.”

While Microsoft has already notified companies that use this backdoor, organizations that possibly breached are advised to follow certain procedures. Those include auditing on-site and cloud infrastructure, removing user and app access, verifying configuration for each individual, issuing new and strong credentials, and finally, using a hardware security module to prevent secrets from being exfiltrated by FoggyWeb.

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways