Microsoft Warns of Storm-1811 Cybercriminal Group Abusing Quick Assist for Ransomware Attacks

https://icaro.icaromediagroup.com/system/images/photos/16215960/original/open-uri20240516-18-c19ey9?1715893204
ICARO Media Group
Politics
16/05/2024 20h59

In a recent report, Microsoft's Threat Intelligence team has uncovered the activities of a cybercriminal group known as Storm-1811. This group has been exploiting the client management tool, Quick Assist, to carry out social engineering attacks and deploy Black Basta ransomware on unsuspecting victims.

Storm-1811, a financially motivated cybercriminal group, has been identified as the perpetrator behind these attacks. According to Microsoft, they employ a sophisticated attack chain that involves voice phishing and impersonation techniques to deceive users into installing remote monitoring and management (RMM) tools, ultimately leading to the delivery of QakBot, Cobalt Strike, and Black Basta ransomware.

Quick Assist, a legitimate application by Microsoft used for remote troubleshooting, has been misused by threat actors to appear as trusted contacts, including Microsoft technical support or IT professionals from the victim's own company. By gaining initial access to the target device, the attackers can run scripts and exploit vulnerabilities, ultimately deploying the Black Basta ransomware throughout the network.

To make their attacks more convincing, the threat actors engage in link listing attacks, bombarding targeted email addresses with subscribed content from legitimate email subscription services. This ploy allows them to masquerade as the victim's IT support team, offering assistance in solving the influx of spam. The unsuspecting users are then convinced to grant access to their devices through Quick Assist, thereby providing the attackers with control.

Microsoft is aware of these attacks and is taking steps to address the misuse of Quick Assist. They are working on incorporating warning messages within the software to alert users about potential tech support scams that could facilitate ransomware delivery.

The campaign, which began in mid-April 2024, has targeted various industries, including manufacturing, construction, food and beverage, and transportation. Rapid7, a leading cybersecurity firm, emphasizes the opportunistic nature of these attacks due to the low barrier of entry and the significant impact they have on victims.

Robert Knapp, Senior Manager of Incident Response Services at Rapid7, stated, "The low barrier of entry into conducting these attacks, coupled with the significant impacts these attacks have on their victims, continue to make ransomware a very effective means to an end for threat actors seeking a payday."

Black Basta ransomware, described by Microsoft as a "closed ransomware offering," does not operate as a ransomware-as-a-service (RaaS) operation. It is distributed by a small number of threat actors who rely on other entities for initial access, malicious infrastructure, and malware development.

Microsoft urges organizations to block or uninstall Quick Assist and similar remote monitoring and management tools if not in use. Additionally, they emphasize the importance of training employees to recognize and avoid falling victim to tech support scams.

As the threat landscape continues to evolve, it is crucial for organizations to remain vigilant and take proactive measures to protect against ransomware attacks and other cybersecurity threats.

(Note: This article is written based on the information provided by the user and contains no additional entities, numbers, or dates outside of that information.

The views expressed in this article do not reflect the opinion of ICARO, or any of its affiliates.

Related