{"id":25062,"date":"2024-08-13T03:21:24","date_gmt":"2024-08-13T11:21:24","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/08\/13\/news-18792\/"},"modified":"2024-08-13T03:21:24","modified_gmt":"2024-08-13T11:21:24","slug":"news-18792","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/08\/13\/news-18792\/","title":{"rendered":"Don&#8217;t get Mad, get wise"},"content":{"rendered":"<p><strong>Credit to Author: Angela Gunn| Date: Tue, 13 Aug 2024 09:59:22 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>The Sophos X-Ops Incident Response team has been examining the tactics of a ransomware group called Mad Liberator.\u00a0 This is a fairly new threat actor, first emerging in mid-July 2024. In this article, we\u2019ll look at certain techniques the group is using, involving the popular remote-access application Anydesk. We\u2019ll document the interesting social-engineering tactics the group has used and provide guidance both as to how to minimize your risk of becoming a victim and, for investigators, to how to see potential activity by this group.<\/p>\n<p>Before we start, we should note that Anydesk is legitimate software that the attackers are abusing in this situation. The attackers misuse that application in the manner we\u2019ll show below, but presumably any remote access program would suit their purposes. Also, we\u2019ll note up front that SophosLabs has a detection in place, Troj\/FakeUpd-K, for the binary described.<\/p>\n<p><strong>What is Mad Liberator?<\/strong><\/p>\n<p>The activity that Sophos X-Ops has observed so far indicates that Mad Liberator focuses on data exfiltration; in our own experience, we have not yet seen any incidents of data encryption traceable to Mad Liberator. That said, information on <a href=\"https:\/\/www.watchguard.com\/wgrd-security-hub\/ransomware-tracker\/mad-liberator\">watchguard.com<\/a> does suggest that the group uses encryption occasionally, and also undertakes double extortion (stealing data, then encrypting the victim\u2019s systems and threatening to release the stolen data if the victim doesn\u2019t pay to decrypt).<\/p>\n<p>Typical of threat actors who perform data exfiltration, Mad Liberator operates a leak site on which it publishes victim details, in an effort to put additional pressure on victims to pay. The site claims that the files can be downloaded \u201cfor free.\u201d<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-01.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-956776\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-01.png\" alt=\"A screen capture showing the Mad Liberator site; information from four victims is present but redacted\" width=\"640\" height=\"486\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-01.png 2464w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-01.png?resize=300,228 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-01.png?resize=768,584 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-01.png?resize=1024,778 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-01.png?resize=1536,1168 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-01.png?resize=2048,1557 2048w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 1: Mad Liberator\u2019s disclosure site<\/em><\/p>\n<p>Interestingly, Mad Liberator uses social engineering techniques to obtain environment access, targeting victims who use remote access tools installed on endpoints and servers. Anydesk, for instance, is popularly used by IT teams to manage their environments, particularly when working with remote users or devices.<\/p>\n<p><strong>How the attack works<\/strong><\/p>\n<p>Anydesk works by allocating a unique ID, in this a case a ten-digit address, to each device it is installed on.\u00a0 Once the application is installed on a device, a user can either request to access a remote device to take control by entering the ID, or a user can invite another user to take control of their device via a remote session.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-02.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-956777\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-02.png\" alt=\"A screen capture showing the location of a ten-digit Anydesk address near the top of the screen\" width=\"640\" height=\"315\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-02.png 2412w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-02.png?resize=300,148 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-02.png?resize=768,378 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-02.png?resize=1024,504 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-02.png?resize=1536,755 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-02.png?resize=2048,1007 2048w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 2: An Anydesk session with the ten-digit address prominently displayed<\/em><\/p>\n<p>We don\u2019t know at this point how, or if, the attacker targets a particular Anydesk ID. In theory it is possible to just cycle through potential addresses until someone accepts a connection request; however, with potentially 10 billion 10-digit numbers, this seems somewhat inefficient. In an instance that the Incident Response team investigated, we found no indications of any contact between the Mad Liberator attacker and the victim prior to the victim receiving an unsolicited Anydesk connection request. The user was not a prominent or publicly visible member of staff and there was no identifiable reason for them to be specifically targeted.<\/p>\n<p>When an Anydesk connection request is received, the user sees the pop-up shown in Figure 3. The user must authorize the connection before it can be fully established.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-03.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-956778\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-03.png\" alt=\"A screen capture showing a normal-appearing chat screen in Anydesk\" width=\"640\" height=\"454\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-03.png 1432w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-03.png?resize=300,213 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-03.png?resize=768,544 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-03.png?resize=1024,726 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 3: A request from \u201cUser\u201d to connect via Anydesk; as Anydesk admins know but end users may not, anyone can choose any username when setting up Anydesk, so an attacker could even call itself \u201cTech Support\u201d or something similar <\/em><\/p>\n<p>In the case our IR team handled, the victim was aware that Anydesk was used by their company\u2019s IT department. They therefore assumed that the incoming connection request was just a usual instance of the IT department performing maintenance, and so clicked Accept.<\/p>\n<p>Once the connection was established, the attacker transferred a binary to the victim\u2019s device and executed it.\u00a0 In our investigations this file has been titled \u201cMicrosoft Windows Update,\u201d with the SHA256 hash:<\/p>\n<p>f4b9207ab2ea98774819892f11b412cb63f4e7fb4008ca9f9a59abc2440056fe<\/p>\n<p>This binary was a very simple program that displayed a splash screen mimicking a Windows Update screen. The screen was animated, making it appear that the system was updating, as shown in Figure 4.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-04.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-956779\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-04.png\" alt=\"A screen capture showing an apparently normal Windows update screen (it is not a normal Windows Update screen)\" width=\"640\" height=\"313\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-04.png 2115w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-04.png?resize=300,147 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-04.png?resize=768,375 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-04.png?resize=1024,500 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-04.png?resize=1536,750 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-04.png?resize=2048,1000 2048w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 4: An all-too-unremarkable Windows Update screen\u2026 or is it?<\/em><\/p>\n<p>This program did not perform any other activity, which made it unlikely to be immediately detected as malicious by most antimalware packages. (Sophos has developed a detection [Troj\/FakeUpd-K] for this particular binary and will continue to monitor developments on this.)<\/p>\n<p>At this point, to protect the ruse from being discovered and stopped, the attacker took an extra step. Since this simple program could have been exited should the user happen to press the \u201cEsc\u201d key, the attacker utilized a feature within Anydesk to disable input from the user\u2019s keyboard and mouse.<\/p>\n<p>Since the victim was no longer able to use their keyboard, and since the above screen appeared to be something unremarkable to any Windows user, they were unaware of the activity that the attacker was performing in the background \u2013 and could not have stopped it easily even if they were suspicious.<\/p>\n<p>The attacker proceeded to access the victim\u2019s OneDrive account, which was linked to the device, as well as files that were stored on a central server and accessible via a mapped network share.\u00a0 Using the Anydesk FileTransfer facility, the attacker stole and exfiltrated these company files.\u00a0 The attacker then used Advanced IP Scanner to determine if there were other devices of interest that could be exploited within the same subnet. (They did not, in the end, laterally move to any other devices.)<\/p>\n<p>Once the stolen files were under its control, the attacker then ran another program that created numerous ransom notes. Interestingly, these ransom notes were generated in multiple locations on a shared network location which was mapped to the device, rather than on the victim\u2019s device itself.\u00a0 These ransom notes announced that data had been stolen and provided details as to how the victim should pay the ransom to prevent disclosure of those stolen files. (Tactics such as these will be all too familiar to readers of our investigation of <a href=\"https:\/\/news.sophos.com\/en-us\/2024\/08\/06\/turning-the-screws-the-pressure-tactics-of-ransomware-gangs\/\">pressure tactics currently in use<\/a> by ransomware gangs.)<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-05.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-956780\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-05.png\" alt=\"A ransom note dropped by Mad LIberator\" width=\"731\" height=\"440\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-05.png 679w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-05.png?resize=300,180 300w\" sizes=\"auto, (max-width: 731px) 100vw, 731px\" \/><\/a><em>Figure 5: The ransom note received by the victim; note the threats of reputational and regulatory damage, and note also that no ransom amount is cited<\/em><\/p>\n<p>The fake Windows Update screen shielded the attacker\u2019s actions from being seen on the victim\u2019s screen. The attack lasted almost four hours, at the conclusion of which the attacker terminated the fake update screen and ended the Anydesk session, giving control of the device back to the victim. We did note that the binary was manually triggered by the attacker; with no scheduled task or automation in place to execute it again once the threat actor was gone, the file simply remained on the affected system.<\/p>\n<p><strong>Lessons and mitigations<\/strong><\/p>\n<p>This was a straightforward attack that relied on the victim believing that the Anydesk request was part of day-to-day activity. As far as our investigators could determine, the attack did not involve any additional social engineering efforts by the attacker &#8212; no email contact, no phishing attempts, and so forth. As such it highlights the importance of ongoing, up-to-date staff training, and it indicates that organizations should set and make known a clear policy regarding how IT departments will contact and arrange remote sessions.<\/p>\n<p>Beyond user education, we highly recommend that administrators implement the Anydesk Access Control Lists to only allow connections from specific devices in order to greatly minimize the risk of this type of attack, AnyDesk provide some very valuable guidance and how to do this as well as additional security measures in the following link:<\/p>\n<ul>\n<li><a href=\"https:\/\/support.anydesk.com\/knowledge\/security-tips\">https:\/\/support.anydesk.com\/knowledge\/security-tips<\/a><\/li>\n<\/ul>\n<p>With additional advice available here:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.anydesk.com\/the-ultimate-guide-to-anydesks-security-features\/\">https:\/\/blog.anydesk.com\/the-ultimate-guide-to-anydesks-security-features\/<\/a><\/li>\n<li><a href=\"https:\/\/anydesk.com\/en\/security\">https:\/\/anydesk.com\/en\/security<\/a><\/li>\n<\/ul>\n<p>Procedural notes for investigators follow the conclusion of this article.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Ransomware groups rise and fall constantly, and Mad Liberator may prove to be a significant new player, or just another flash in the pan. However, the social-engineering tactics the group used in the case described above are noteworthy \u2013 but they are not unique. Attackers will always continue to develop and employ a variety of tactics to try and exploit both the human element and the technical security layers.<\/p>\n<p>It can be a difficult task to balance security against usability when implementing tools within an environment, especially when these tools help facilitate remote access for the very people tasked with caring for business-critical systems.\u00a0 However, we always recommend that when applications are deployed across a network, especially ones that can be leveraged to obtain remote access to devices, that careful review of the security recommendations by the vendor is considered. Where those recommendations are not followed, that choice should be documented as part of your risk management process so that it can be continually reviewed, or so other mitigations can be put in place to ensure it remains within the risk appetite of your organization.<\/p>\n<p><strong>Appendix: Investigating Mad Liberator<\/strong><\/p>\n<p>If you are investigating an incident in which you suspect that attackers may have leveraged Anydesk, look for useful event and connection data stored in the following files:<\/p>\n<ul>\n<li>C:ProgramDataAnyDeskconnection_trace.txt<\/li>\n<li>C:ProgramDataAnyDeskad_svc.trace<\/li>\n<li>C:Users%AppDataRoamingAnyDeskad.trace<\/li>\n<\/ul>\n<p>The connection_trace.txt\u00a0 file only contains the Address ID of recent connections and may not be all that useful on its own.\u00a0 But it does at least allow you to narrow down the offending ID.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-06.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-956781\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-06.png\" alt=\"A screen capture showing activity in connection_trace.txt; the four states listed below all appear\" width=\"640\" height=\"148\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-06.png 1134w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-06.png?resize=300,69 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-06.png?resize=768,177 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-06.png?resize=1024,237 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 6: A look at connection_trace.txt, with information on the result of each event<\/em><\/p>\n<p>There are four possible states for each connection:<\/p>\n<ul>\n<li>REJECTED \u2013 the end-user rejected a connection request<\/li>\n<li>User \u2013 the end-user accepted a connection request<\/li>\n<li>Passwd \u2013 password entered by the remote system to gain access<\/li>\n<li>Token \u2013 \u2018Login Automatically\u2019 option checked by the remote system<\/li>\n<\/ul>\n<p>The ad_svc.trace and ad.trace files contain quite a lot of granular detail. These can be opened and viewed with a text editor such as Notepad and along with other events also contains connection data.\u00a0 The ad_svc.trace file contains details of the source IP addresses of remote connections.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-07.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-956775\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-07.png\" alt=\"An ad_svc.trace log screen capture showing Mad Liberator activity\" width=\"640\" height=\"115\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-07.png 1280w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-07.png?resize=300,54 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-07.png?resize=768,138 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-07.png?resize=1024,184 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 7: A look at ad_svc.trace; a questionable connection is highlighted in the image<\/em><\/p>\n<p>The ad.trace file contains logs relating to file transfers, and events such as where user input is disabled.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-08.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-956782\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-08.png\" alt=\"A screen capture showing the moment at which mad Liberator disabled the user's input devices\" width=\"640\" height=\"56\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-08.png 1963w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-08.png?resize=300,26 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-08.png?resize=768,67 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-08.png?resize=1024,89 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-08.png?resize=1536,134 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 8: The user\u2019s input options are disabled<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-09.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-956783\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-09.png\" alt=\"A screen capture showing the Mad LIberator attacker preparing files to be exfiltrated\" width=\"640\" height=\"25\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-09.png 1848w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-09.png?resize=300,12 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-09.png?resize=768,30 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-09.png?resize=1024,39 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-09.png?resize=1536,59 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 9: The file-transfer events<\/em><\/p>\n<p>Although the logs will indicate the folder and how many files were transferred during data exfiltration, unfortunately the logs will not detail each file name.<\/p>\n<p>If you have Sophos Intercept X installed, collecting this data is simplified. The following OSquery can be used within Live Discover in the Sophos Central Dashboard:<\/p>\n<pre>SELECT      strftime('%Y-%m-%dT%H:%M:%S', substr(grep.line, instr(grep.line, 'info') + 5, 19)) AS Datetime,     grep.path,     CASE        WHEN grep.pattern = 'Logged in from' THEN 'Login'        WHEN grep.pattern = 'Preparing files' THEN 'File Transfer from this Host'        WHEN grep.pattern = 'Accepting from' THEN 'Accepted Connection Request'        WHEN grep.pattern = 'Incoming session request:' THEN 'Incoming Session Request'        WHEN grep.pattern = 'Remote OS:' THEN 'Remote OS'        WHEN grep.pattern = 'Disabling user input.' THEN 'Disable Mouse and Keyboard'        WHEN grep.pattern = 'Download started' THEN 'File Transfer to this Host'        WHEN grep.pattern = 'Received a sysinfo request.' THEN 'System Information Request'        WHEN grep.pattern = 'Authenticated with permanent token' THEN 'Authenticated with Token'        WHEN grep.pattern = 'Authenticated with correct passphrase' THEN 'Authenticated with Password'        WHEN grep.pattern = 'Profile was used:' THEN 'Profile Assigned'     END AS 'Operation',     grep.line as Data  FROM file  CROSS JOIN grep ON (grep.path = file.path)  WHERE  (     file.path LIKE 'C:ProgramDataAnyDeskad_svc.trace'     OR file.path LIKE 'C:Users%AppDataRoamingAnyDeskad.trace'  )  AND  (     --AnyDesk     grep.pattern = 'Logged in from'     OR grep.pattern = 'Preparing files'     OR grep.pattern = 'Accepting from'     OR grep.pattern = 'Incoming session request:'     OR grep.pattern = 'Remote OS:'     OR grep.pattern = 'Disabling user input.'     OR grep.pattern = 'Download started'     OR grep.pattern = 'Received a sysinfo request.'     OR grep.pattern = 'Authenticated with permanent token'     OR grep.pattern = 'Authenticated with correct passphrase'     OR grep.pattern = 'Profile was used:'     )     ORDER BY Datetime DESC<\/pre>\n<p>The query even helps to sort the data into a usable table, as seen in Figure 10.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-956784\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-10.png\" alt=\"A screen capture showing the results of the query shown above, displayed in tabular form\" width=\"640\" height=\"150\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-10.png 2628w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-10.png?resize=300,70 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-10.png?resize=768,180 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-10.png?resize=1024,240 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-10.png?resize=1536,360 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/madlib-figure-10.png?resize=2048,480 2048w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 10: The output of the OSquery shown above, in useful tabular format<\/em><\/p>\n<p><strong>Acknowledgements<\/strong><\/p>\n<p>Harshal Gosalia, Ollie Jones, and Andy French contributed to this research.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2024\/08\/13\/dont-get-mad-get-wise\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/08\/shutterstock_2440815129-1.jpg\"\/><\/p>\n<p><strong>Credit to Author: Angela Gunn| Date: Tue, 13 Aug 2024 09:59:22 +0000<\/strong><\/p>\n<p>The \u201cMad Liberator\u201d ransomware group leverages social-engineering moves to watch out for<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[24557,129,12657,31770,3764,24552,10510,16771],"class_list":["post-25062","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-anydesk","tag-featured","tag-incident-response","tag-mad-liberator","tag-malware","tag-security-operations","tag-social-engineering","tag-threat-research"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25062"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25062\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}