{"id":9187,"date":"2021-02-01T09:21:00","date_gmt":"2021-02-01T09:21:00","guid":{"rendered":"https:\/\/web3unplugged.io\/blog\/?p=9187"},"modified":"2021-02-02T06:17:02","modified_gmt":"2021-02-02T06:17:02","slug":"sophos-tracks-nefilim-and-other-ransomware-attacks-to-ghost-account-credentials","status":"publish","type":"post","link":"https:\/\/web3unplugged.io\/blog\/sophos-tracks-nefilim-and-other-ransomware-attacks-to-ghost-account-credentials\/","title":{"rendered":"Sophos Tracks Nefilim And Other Ransomware Attacks To &#8220;Ghost&#8221; Account Credentials"},"content":{"rendered":"\n<p><a href=\"http:\/\/www.sophos.com\/\">Sophos<\/a>, a global leader in next-generation cybersecurity, today published its latest findings into real world attacks investigated by its <a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-threat-response\/rapid-response.aspx\">Rapid Response<\/a> team. The article,\u201c<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/01\/26\/nefilim-ransomware-attack-uses-ghost-credentials\/\">NefilimRansomware Attack Uses \u2018Ghost\u2019 Credentials<\/a>,\u201d details how a&nbsp;failure to keep close tabs on \u201cghost\u201d account credentials facilitated two recent cyberattacks, one of which involved Nefilimransomware.<\/p>\n\n\n\n<p>Nefilim,also known as<a href=\"https:\/\/news.sophos.com\/en-us\/2020\/02\/06\/living-off-another-land-ransomware-borrows-vulnerable-driver-to-remove-security-software\/\">Nemty<\/a> ransomware, combines data <a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/04\/the-realities-of-ransomware-the-evasion-arms-race\/\">theft<\/a> with encryption. The target hit by Nefilimhad more than 100 systems impacted. Sophos responders traced the initial intrusion to an admin account with high level access that attackers had compromised more than four weeks before they released the ransomware. During this time, the attackers were able to quietly move through the network, steal credentials for a domain admin account, and find and exfiltrate hundreds of GB of data, before unleashing the ransomware that revealed their presence.<\/p>\n\n\n\n<p>The hacked admin account that enabled this belonged to an employee who had sadly passed away around three months previously. The company had kept the account active because it was used for a number of services.<\/p>\n\n\n\n<p>In the second, unrelated attack, Sophos responders found that intruders had created a new user account and added it to the target\u2019s domain admin group in Active Directory. With this new domain admin account, the attackers were able to delete approximately150 virtual servers and encrypt the server backups using Microsoft Bitlocker \u2013 all without setting off alerts.<\/p>\n\n\n\n<p>\u201cIf it wasn\u2019t for the ransomware that flagged the presence of intruders, how long might the attackers have had domain admin access to the network without the company knowing?\u201d said Peter Mackenzie, manager, Sophos Rapid Response. \u201cStaying on top of account credentials is basic, but critical cybersecurity hygiene. We see far too many incidents where accounts have been set up, often with considerable access rights, that are then forgotten about, sometimes for years. Such \u2018ghost\u2019 accounts are a prime target for attackers.<\/p>\n\n\n\n<p>\u201cIf an organization really needs an account after someone has left the company, they should implement a service account and deny interactive logins to prevent any unwanted activity. Or, if they don\u2019t need the account for anything else, disable it and carry out regular audits of Active Directory.<\/p>\n\n\n\n<p>\u201cThe danger is not just keeping outdated and unmonitored accounts active; it is also giving employees greater access rights than they need. Fewer accounts need to be a domain admin than most people think. No account with privileges should be used by default for work that doesn&#8217;t require that level of access. Users should elevate to using the required accounts when needed and only for that task. Further, <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/plan\/security-best-practices\/audit-policy-recommendations\">alerts<\/a> should be set so that if the domain admin account is used or if a new admin account is created, someone knows.\u201d&nbsp;<\/p>\n\n\n\n<p>Nefilim ransomware was first reported on in March 2020. Like other ransomware families such as <a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/12\/color-by-numbers-inside-a-dharma-ransomware-as-a-service-attack\/\">Dharma<\/a>, Nefilim mainly targets vulnerable Remote Desktop Protocol (RPD) systems as well as exposed Citrix software. It is one of a <a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/technical-papers\/sophos-2021-threat-report.pdf\">growing number of ransomware families<\/a>, alongside DoppelPaymer and others that engages in so-called \u201csecondary extortion,\u201dwith attacks that combine encryption with data theft and the threat of public exposure.<\/p>\n\n\n\n<p>Further information on the incidents, including Indicators of Compromise (IoCs) and tactics, techniques and procedures (TTPs) for the Nefilim attack, can be found in \u201c<a href=\"https:\/\/news.sophos.com\/en-us\/?p=72133&amp;\">Nefilim Ransomware Attack Uses \u2018Ghost\u2019 Credentials<\/a>.\u201d<\/p>\n\n\n\n<p><strong>Additional Resources<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Learn more about current and emerging threats facing organisations, including ransomware, in the <a href=\"http:\/\/www.sophos.com\/threatreport\">Sophos 2021 Threat Report<\/a><\/li><li>Learn how Sophos Rapid Response and Sophos Managed Threat Response <a href=\"https:\/\/news.sophos.com\/en-us\/2020\/09\/22\/mtr-casebook-blocking-a-15-million-maze-ransomware-attack\/\">blocked a $15M ransomware attack<\/a><\/li><li>See how Sophos Rapid Response dissected a <a href=\"https:\/\/news.sophos.com\/en-us\/2020\/10\/14\/inside-a-new-ryuk-ransomware-attack\/\">new wave of Ryuk attacks<\/a><\/li><li>To help stop ransomware attacks, read the <a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/04\/the-realities-of-ransomware-five-signs-youre-about-to-be-attacked\">five early indicators an attacker is present<\/a><\/li><li>Learn more about <a href=\"https:\/\/www.sophos.com\/en-us\/press-office\/press-releases\/2020\/10\/sophos-launches-rapid-response-service-to-identify-and-neutralize-active-cybersecurity-attacks.aspx\">Sophos\u2019 new Rapid Response service<\/a> that disrupts attacks in real-time<\/li><li>Read the latest security news and views on Sophos\u2018 award-winning news website&nbsp;<a href=\"https:\/\/nakedsecurity.sophos.com\/\">Naked Security<\/a>and on&nbsp;<a href=\"https:\/\/news.sophos.com\/\">Sophos News<\/a><\/li><li>Connect with Sophos on&nbsp;<a href=\"http:\/\/twitter.com\/sophos\">Twitter<\/a>,&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/sophos\/\">LinkedIn<\/a>,&nbsp;<a href=\"https:\/\/www.facebook.com\/securitybysophos\/\">Facebook<\/a>,&nbsp;<a href=\"https:\/\/community.spiceworks.com\/pages\/sophos\">Spiceworks<\/a>, and&nbsp;<a href=\"http:\/\/www.youtube.com\/user\/sophoslabs\">YouTube<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Sophos, a global leader in next-generation cybersecurity, today published its latest findings into real world attacks investigated by its Rapid Response team. The article,\u201cNefilimRansomware Attack Uses \u2018Ghost\u2019 Credentials,\u201d details how a&nbsp;failure to keep close tabs on \u201cghost\u201d account credentials facilitated two recent cyberattacks, one of which involved Nefilimransomware. Nefilim,also known asNemty ransomware, combines data theft [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9188,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-9187","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"rttpg_featured_image_url":{"full":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/Peter-Mackenzie-incident-response-manager-Sophos.png",468,550,false],"landscape":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/Peter-Mackenzie-incident-response-manager-Sophos.png",468,550,false],"portraits":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/Peter-Mackenzie-incident-response-manager-Sophos.png",468,550,false],"thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/Peter-Mackenzie-incident-response-manager-Sophos-150x150.png",150,150,true],"medium":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/Peter-Mackenzie-incident-response-manager-Sophos-255x300.png",255,300,true],"large":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/Peter-Mackenzie-incident-response-manager-Sophos.png",468,550,false],"1536x1536":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/Peter-Mackenzie-incident-response-manager-Sophos.png",468,550,false],"2048x2048":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/Peter-Mackenzie-incident-response-manager-Sophos.png",468,550,false],"post-thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/Peter-Mackenzie-incident-response-manager-Sophos.png",357,420,false],"graptor-sq-xs":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/Peter-Mackenzie-incident-response-manager-Sophos.png",85,100,false]},"rttpg_author":{"display_name":"admin","author_link":"https:\/\/web3unplugged.io\/blog\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/web3unplugged.io\/blog\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","rttpg_excerpt":"Sophos, a global leader in next-generation cybersecurity, today published its latest findings into real world attacks investigated by its Rapid Response team. The article,\u201cNefilimRansomware Attack Uses \u2018Ghost\u2019 Credentials,\u201d details how a&nbsp;failure to keep close tabs on \u201cghost\u201d account credentials facilitated two recent cyberattacks, one of which involved Nefilimransomware. Nefilim,also known asNemty ransomware, combines data theft&hellip;","_links":{"self":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/9187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/comments?post=9187"}],"version-history":[{"count":1,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/9187\/revisions"}],"predecessor-version":[{"id":9189,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/9187\/revisions\/9189"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media\/9188"}],"wp:attachment":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media?parent=9187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/categories?post=9187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/tags?post=9187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}