Track Common Adversary Tasks Performed Using ACAD/Medre.A

 









To know more about it, you can go through my detailed document by clicking here






Overview

ACAD/Medre.A is basically a worm written in AutoLISP (a dialect used in AutoCAD) capable of stealing operational information via collecting AutoCAD files with drawings. This worm has an immense capacity to be used as an industrial espionage. For example the attack of this worm may result in automatic sending of all the new designs or files to the operator of this malware leading a lot of money loss to the legitimate owner as the cybercriminals have the designs even before they are introduced in the market.

Functions

This worm performs following key functions:
  • It can copy itself to various locations so that it can install and spread quickly throughout the system.
  • It steals AutoCAD drawings from the infected systems.

Tactics

The ACAD/Medre.A spreads rapidly through your system or network and uses following tactics to carry out its attack:
  • It can detect all AutoCAD files with the DWG extension and then send them to a remote server by email.

  • It can steal email information from Outlook or Thunderbird so that it can attack in future.

  • It can also create a RAR archive containing all the stolen data and its code.

Remedy

As generally ACAD/Medre.A spreads through malicious email attachment, it is advised to scan all the AutoCAD files via an updated antimalware program before it can affect your system. However, those who don't use AutoCAD files are not affected by this attack, it is a matter of serious concern for those who uses these files.








To know more about it, you can go through my detailed document by clicking here



Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements