Track Common Adversary Tasks Performed Using BadPatch

 





To know more about it, you can go through my detailed document by clicking here













Overview

BadPatch, a Windows trojan that was used in a Gaza Hackers-linked campaign was first detected in 2017 and spreads via phishing emails containing the macro-laced attachments with payload of the malware. Although it attacks only Windows systems, but, there are evidences of it being used in targeting Android devices via a bogus app.

Capabilities

After successful infiltration, BadPatch may allow the attackers to:
  • Collect information related to the hardware and software host.
  • Look for certain filetypes and filenames, which will be targeted for exfiltration.
  • Swap between SMTP and HTTP C&C (Command & Control) servers.
  • Take screenshots of the active windows and the user's desktop.
  • Execute a keylogging module that would trace the keystrokes of the victim.


Remedy

The following measures may help in the prevention and mitigation of this trojan:
  • Regular application update is necessary in order to protect against known vulnerabilities;

  • User input validation should be employed so that local as well as remote file inclusion vulnerabilities can be restricted;

  • Use of web application firewall, regular signature virus checkups, application fuzzing, code reviews, server network analysis, etc. can be of much help;

  • Regular system and application vulnerability scans can also highlight any possible areas of concern; etc...


















To know more about it, you can go through my detailed document by clicking here




























































Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements