Malware News Iranian Hackers Use QUADAGENT Backdoor in Recent Attacks

silversurfer

Super Moderator
Thread author
Verified
Top Poster
Staff Member
Malware Hunter
Forum Veteran
Aug 17, 2014
12,743
123,910
8,399
A series of recent attacks attributed to an Iran-linked cyber-espionage group delivered a PowerShell backdoor onto compromised machines, Palo Alto Networks has discovered.

The attacks, observed between May and June 2018, were attributed to the OilRig group, which is also known as APT34 and Helix Kitten. Active since around 2015, the actor was seen using two new backdoors (RGDoor and OopsIE) earlier this year, as well as a new data exfiltration technique.

Aimed at a technology services provider and a government entity in the Middle East, the new attacks were “made to appear to have originated from other entities in the same country” and employed the QUADAGENT backdoor, Palo Alto Networks reveals.
 
You have to disable PowerShell. It's just a plain menace.

The amount of damage caused by maliciously abused PowerShell totals well into the millions of dollars per year.

Ok I am now wondering why I was advised to untick it in guarded apps and add it to user space? Now I am confused again.
 
Ok so I should be good to go then?
The thing is like this: the "guarded" apps list is stronger than the "user space:yes" list. So if you have a process on both lists, the guarded list wins. The process will run, but guarded. If you untick it on the guarded list, then the user space list will make sure it doesn't run at all. This applies not just to powershell but to anything else you might want to disable, such as cmd.exe, for instance. If you want to block it altogether, you must untick it in the guarded list, or else the guarded list will win.