Dragonfly/Energetic Bear: Bleeping computer originally reported that it was believed Russian hackers were behind a breach at the San Francisco Airport in March, but at the time of the report, it was not known how employee credentials had been stolen. Now, according to researchers at ESET, they believe they have found the way that the group managed to steal credentials from the employees. The attackers managed to breach the San Francisco Airport (SFO) employee websites SFOconnect[dot]com and SFOConstruction[dot]com. After the intrusion, the threat actors added JavaScript which injects a 1×1 pixel image into the HTML of the websites. The source for the image used the “file://” protocol followed by the remote site that the file will be downloaded from (51.159.28[.]101/icon.png). When a Windows web browser attempts to load a file referenced that way, it uses the SMB file-sharing protocol, which by default will send the user’s Windows account name and hashed password during NTLM authentication with the remote server. Since the attackers have control over the remote server, they can steal the credentials and crack them to recover passwords or use them in a pass-the-hash attack to login to the victim company’s Windows network.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security