{"id":4424,"date":"2020-10-14T16:50:42","date_gmt":"2020-10-14T16:50:42","guid":{"rendered":"https:\/\/blog.gridinsoft.com\/?p=4424"},"modified":"2020-10-14T16:50:42","modified_gmt":"2020-10-14T16:50:42","slug":"hackers-are-increasingly-using-open-source-tools-for-attacks","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/hackers-are-increasingly-using-open-source-tools-for-attacks\/","title":{"rendered":"Hackers are increasingly using open source tools for attacks"},"content":{"rendered":"<h4>Speaking at the Virus Bulletin conference, Intezer Labs analysts <a href=\"https:\/\/vblocalhost.com\/uploads\/VB2020-Litvak.pdf\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">said<\/a> that hackers are increasingly using open source tools for attacks, and listed freely available tools that hackers majorly abuse.<\/h4>\n<p>Such tools can include various applications, libraries, exploits, and so on. Most often, we are talking about proof-of-concept exploits for vulnerabilities that are published by information security specialists, or freely available pentester utilities.<\/p>\n<p>The existence of such tools has long been considered a very controversial phenomenon in the information security community.<\/p>\n<blockquote><p>\u201cSo, on the one hand, such tools can help information security experts prepare systems and networks, protecting them from potential attacks. On the other hand, they help attackers reduce the cost and time of developing their own tools, and also allow them to disguise their activity among legitimate tests and pentests\u201d, \u2014 told Intezer Labs analysts.<\/p><\/blockquote>\n<p>Intezer Labs experts say that usually debates on this topic are based on the personal experience and beliefs of the participants in the discussion, and not on real data.<\/p>\n<p>The company decided to go the other way and collected data on 129 open source &#8220;offensive&#8221; tools, and then compared this data with malware samples and reports from colleagues to find out how widespread such solutions are among hackers. The results were combined in this <a href=\"https:\/\/www.intezer.com\/ost-map\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">interactive map<\/a>.<\/p>\n<p>As it turned out, all kinds of attackers actively use open source and simply publicly available solutions, from well-known government hack groups to small fraudsters. Many tools and libraries originally developed by cybersecurity researchers are now routinely used for cybercrime.<\/p>\n<blockquote><p>\u201cWe found the most popular libraries for memory injection and RAT tools. Thus, the most popular tool for memory injection is the <a href=\"https:\/\/github.com\/stephenfewer\/ReflectiveDLLInjection\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">ReflectiveDllInjection<\/a> library, followed by the <a href=\"https:\/\/github.com\/fancycode\/MemoryModule\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">MemoryModule<\/a> library. Empire, Powersploit and Quasar turned out to be the most popular among the RAT tools\u201d, \u2014 said Intezer Labs.<\/p><\/blockquote>\n<p>It is also reported that <a href=\"https:\/\/github.com\/gentilkiwi\/mimikatz\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Mimikatz<\/a> is most often used for lateral movement, and <a href=\"https:\/\/github.com\/ndilieto\/uacme\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">UACME<\/a> library is usually used to bypass UAC. That being said, Asian hacker groups tend to prefer <a href=\"https:\/\/www.pretentiousname.com\/misc\/win7_uac_whitelist2.html\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Win7Elevate<\/a>, most likely due to the large number of Windows 7 installations in the region.<\/p>\n<p><iframe loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/gkxAgaluRpM\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Basically, only credential theft tools are not popular with criminals. Researchers believe that the reason is the availability of similar solutions with broader functionality on the black market and hacker forums.<\/p>\n<p>In addition, Intezer Labs noticed that criminals rarely use tools that implement complex functions that require deep understanding for exploitation (even if their benefits are obvious). Therefore, the company believes that cybersecurity experts who are planning to publish &#8220;offensive&#8221; hacking tools should keep this in mind and deliberately complicate their code to make it harder for attackers.<\/p>\n<p>Let me remind you that that <a href=\"\/blogs\/hackers-use-legitimate-weave-scope-tool-in-attacks-on-cloud-environments\/\">hackers use legitimate Weave Scope tool<\/a> in attacks on cloud environments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Speaking at the Virus Bulletin conference, Intezer Labs analysts said that hackers are increasingly using open source tools for attacks, and listed freely available tools that hackers majorly abuse. Such tools can include various applications, libraries, exploits, and so on. Most often, we are talking about proof-of-concept exploits for vulnerabilities that are published by information [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4427,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[],"class_list":{"0":"post-4424","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2020\/10\/hacking-tools.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/4424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=4424"}],"version-history":[{"count":1,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/4424\/revisions"}],"predecessor-version":[{"id":12125,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/4424\/revisions\/12125"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/4427"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=4424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=4424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=4424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}