{"id":25224,"date":"2024-09-19T13:17:06","date_gmt":"2024-09-19T21:17:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/09\/19\/news-18954\/"},"modified":"2024-09-19T13:17:06","modified_gmt":"2024-09-19T21:17:06","slug":"news-18954","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/09\/19\/news-18954\/","title":{"rendered":"This Windows PowerShell Phish Has Scary Potential"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Thu, 19 Sep 2024 19:39:09 +0000<\/strong><\/p>\n<p>Many<strong> GitHub<\/strong> users this week received a novel phishing email warning of critical security holes in their code. Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes <strong>Microsoft Windows<\/strong> to download password-stealing malware. While it&#8217;s unlikely that many programmers fell for this scam, it&#8217;s notable because less targeted versions of it are likely to be far more successful against the average Windows user.<\/p>\n<p>A reader named Chris shared an email he received this week that spoofed GitHub&#8217;s security team and warned: &#8220;Hey there! We have detected a security vulnerability in your repository. Please contact us at https:\/\/github-scanner[.]com to get more information on how to fix this issue.&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-68857\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/09\/powerphish.png\" alt=\"\" width=\"681\" height=\"330\" \/><\/p>\n<p>Visiting that link generates a web page that asks the visitor to &#8220;Verify You Are Human&#8221; by solving an unusual CAPTCHA.<\/p>\n<div id=\"attachment_68856\" style=\"width: 793px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-68856\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-68856\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/09\/verifyhuman.png\" alt=\"\" width=\"783\" height=\"397\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/09\/verifyhuman.png 783w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/09\/verifyhuman-768x389.png 768w\" sizes=\"auto, (max-width: 783px) 100vw, 783px\" \/><\/p>\n<p id=\"caption-attachment-68856\" class=\"wp-caption-text\">This malware attack pretends to be a CAPTCHA intended to separate humans from bots.<\/p>\n<\/div>\n<p>Clicking the &#8220;I&#8217;m not a robot&#8221; button generates a pop-up message asking the user to take three sequential steps to prove their humanity. Step 1 involves simultaneously pressing the keyboard key with the Windows icon and the letter &#8220;R,&#8221; which opens a Windows &#8220;Run&#8221; prompt that will execute any specified program that is already installed on the system.<\/p>\n<div id=\"attachment_68855\" style=\"width: 1204px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-68855\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-68855\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/09\/githubscanner.png\" alt=\"\" width=\"1194\" height=\"679\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/09\/githubscanner.png 1194w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/09\/githubscanner-768x437.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/09\/githubscanner-782x445.png 782w\" sizes=\"auto, (max-width: 1194px) 100vw, 1194px\" \/><\/p>\n<p id=\"caption-attachment-68855\" class=\"wp-caption-text\">Executing this series of keypresses prompts the built-in Windows Powershell to download password-stealing malware.<\/p>\n<\/div>\n<p>Step 2 asks the user to press the &#8220;CTRL&#8221; key and the letter &#8220;V&#8221; at the same time, which pastes malicious code from the site&#8217;s virtual clipboard.<\/p>\n<p>Step 3 &#8212; pressing the &#8220;Enter&#8221; key &#8212; causes Windows to launch a <strong>PowerShell<\/strong> command, and then fetch and execute a malicious file from github-scanner[.]com called &#8220;<strong>l6e.exe<\/strong>.&#8221;<span id=\"more-68849\"><\/span><\/p>\n<p>PowerShell is a powerful, cross-platform automation tool built into Windows that is designed to make it simpler for administrators to automate tasks on a PC or across multiple computers on the same network.<\/p>\n<p>According to <a href=\"https:\/\/www.virustotal.com\/gui\/file\/d737637ee5f121d11a6f3295bf0d51b06218812b5ec04fe9ea484921e905a207\/details\" target=\"_blank\" rel=\"noopener\">an analysis<\/a>\u00a0at the malware scanning service <strong>Virustotal.com<\/strong>, the malicious file downloaded by the pasted text is called <strong>Lumma Stealer<\/strong>, and it&#8217;s designed to snarf any credentials stored on the victim&#8217;s PC.<\/p>\n<p>This phishing campaign may not have fooled many programmers, who no doubt natively understand that pressing the Windows and &#8220;R&#8221; keys will open up a &#8220;Run&#8221; prompt, or that Ctrl-V will dump the contents of the clipboard.<\/p>\n<p>But I bet the same approach would work just fine to trick some of my less tech-savvy friends and relatives into running malware on their PCs. I&#8217;d also bet none of these people have ever heard of PowerShell, let alone had occasion to intentionally launch a PowerShell terminal.<\/p>\n<p>Given those realities, it would be nice if there were a simple way to disable or at least heavily restrict PowerShell for normal end users for whom it could become more of a liability.<\/p>\n<p>However, Microsoft strongly advises against nixing PowerShell because some core system processes and tasks may not function properly without it. What&#8217;s more, doing so requires tinkering with sensitive settings in the Windows registry, which can be a dicey undertaking even for the learned.<\/p>\n<p>Still, it wouldn&#8217;t hurt to share this article with the Windows users in your life who fit the less-savvy profile. Because this particular scam has a great deal of room for growth and creativity.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2024\/09\/this-windows-powershell-phish-has-scary-potential\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/09\/powerphish.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Thu, 19 Sep 2024 19:39:09 +0000<\/strong><\/p>\n<p>Many GitHub users this week received a novel phishing email warning of critical security holes in their code. Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download password-stealing malware. While it&#8217;s unlikely that many programmers fell for this scam, it&#8217;s notable because less targeted versions of it are likely to be far more successful against the average Windows user.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[16740,10904,11863,16888,31926,31927,18500,17006],"class_list":["post-25224","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-a-little-sunshine","tag-captcha","tag-github","tag-latest-warnings","tag-lumma-stealer","tag-microsoft-powershell","tag-virustotal-com","tag-web-fraud-2-0"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25224"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25224\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}