Cybercriminals Use Havoc Post-Exploitation Framework in Attack Campaigns

2023-02-24 By admin

According to security analysts, malicious actors have started using an open-source command and control (C2) framework called Havoc as an alternative to more expensive solutions like Cobalt Strike and Brute Ratel. One of the most noteworthy features of Havoc is its cross-platform compatibility. In addition, it can evade Microsoft Defender on contemporary Windows 11 systems using sleep obfuscation, return address stack spoofing, and indirect syscalls.

Similar to other exploitation kits, Havoc features a range of modules that enable penetration testers and malicious hackers to undertake various operations on compromised devices. These include command execution, process management, downloading of additional payloads, manipulation of Windows tokens, and execution of shellcode. These tasks can be performed through a web-based management console, which provides the attacker with visibility into all of their compromised devices, events, and the output of tasks.

In early January, an unnamed threat group leveraged this post-exploitation kit in a campaign aimed at an unidentified government agency. According to the Zscaler ThreatLabz research team, who detected the kit in the wild, the shellcode loader that is deployed on compromised systems will deactivate Event Tracing for Windows (ETW). Moreover, the ultimate Havoc Demon payload is loaded without DOS and NT headers to evade detection.

ADVERTISEMENT

Additionally, the framework was disseminated via a malevolent npm package (Aabquerys), which was camouflaged as a legitimate module through typosquatting, as disclosed by a report from ReversingLabs’ research team earlier this month.

ReversingLabs threat researcher, Lucija Valenti?, has stated that “Demon.bin” is a malevolent agent that possesses conventional remote access trojan (RAT) capabilities, and was created using an open-source command and control framework called Havoc. ‘It supports building malicious agents in several formats including Windows PE executable, PE DLL and shellcode.’

Additional Cobalt Strike alternatives have been deployed

Cobalt Strike has emerged as the most prevalent tool employed by numerous threat actors for the deployment of “beacons” on compromised networks. These beacons facilitate the subsequent distribution and delivery of further malevolent payloads. Nonetheless, some malicious actors have begun to search for alternative solutions as security practitioners have become more adept at identifying and impeding their operations.

As previously reported by BleepingComputer and others, Brute Ratel and Sliver are among the options that can help evade antivirus software and Endpoint Detection and Response (EDR) solutions. These two C2 frameworks have been field-tested by a diverse range of threat groups, from financially-motivated cybercriminal organizations to government-sponsored hacking factions.

Brute Ratel, a post-exploitation toolkit developed by Mandiant and CrowdStrike ex-red teamer Chetan Nayak, has been utilized in attacks that are believed to be linked to the Russian-sponsored hacking group APT29 (also referred to as CozyBear). However, it is also possible that some Brute Ratel licenses have ended up in the hands of former members of the Conti ransomware gang.

In August 2022, Microsoft observed that multiple threat actors, including state-sponsored groups and cybercriminal organizations (such as APT29, FIN12, Bumblebee/Coldtrain), have turned to the Go-based Sliver C2 framework, which was developed by cybersecurity researchers at BishopFox, as an alternative to Cobalt Strike.

Cybercriminals wreak Havoc in attack campaigns

Cybercriminals wreak Havoc in attack campaigns

Advertisement

About Russell Kidson

I hail from the awe-inspiring beauty of South Africa. Born and raised in Pretoria, I’ve always had a deep interest in local history, particularly conflicts, architecture, and our country’s rich past of being a plaything for European aristocracy. ‘Tis an attempt at humor. My interest in history has since translated into hours at a time researching everything from the many reasons the Titanic sank (really, it’s a wonder she ever left Belfast) to why Minecraft is such a feat of human technological accomplishment. I am an avid video gamer (Sims 4 definitely counts as video gaming, I checked) and particularly enjoy playing the part of a relatively benign overlord in Minecraft. I enjoy the diverse experiences gaming offers the player. Within the space of a few hours, a player can go from having a career as an interior decorator in Sims, to training as an archer under Niruin in Skyrim. I believe video games have so much more to teach humanity about community, kindness, and loyalty, and I enjoy the opportunity to bring concepts of the like into literary pieces.