Recently, ActZero learned that ransomware actors are harvesting credentials from browsers during their attack. In recent attack chains our threat researchers have seen that, once the attacker gains a foothold, they are using Living-off-the-Land (LoTL) attacks to harvest the cached credentials from browsers such as Chrome. In a “Living off the Land” attack, adversaries use legitimate tools to compromise secure environments undetected.
When attackers get access to browser credentials, which are synced between personal and company devices, not only do they gain access to the personal, social, banking, and little league accounts used on the home network, but they can use those credentials for additional attacks on the user’s corporate environment. This combination of stealing more credentials and gaining access to additional web services allows the attacker to unleash additional attacks beyond the victim’s organization. Ransomware actors can then apply more pressure for payment.
A sample browser credential harvesting attack used esentutl.exe to dump the encrypted password database as shown below.
cmd.exe /Q /c esentutl.exe /y "C:\Users\<username>\AppData\Local\Google\Chrome\User Data\Default\Login Data" /d "C:\Users\<username>\AppData\Local\Google\Chrome\User Data\Default\Login Data.tmp"
Note: though this attack is against Chrome, similar attacks exist against other browsers.
These password dump commands are typically run on all accessible endpoints after a domain controller is compromised. Once the credentials are dumped, they are exported to the attacker along with the encryption keys.
How to prevent these attacks
Our team provides a few recommendations to keep your business safe from these attacks.
Endpoint Protection
Endpoint Protection
Immediately Educate Users on Phishing Callback Attacks
Reduce Attack Surface Area
How ActZero Can Help
Ransomware is an urgent security risk threatening businesses and government agencies worldwide. Aimed at small to medium-sized enterprises with IT teams with limited cybersecurity expertise, The Ransomware Task Force: Blueprint for Ransomware Defense provides a short list of recommended defensive actions that an IT leader can take to combat ransomware and other common cyber attacks.
Related: Thinking about the adversary: Offensive & Defensive Strategies & Why You Should Think Like A Hacker