Threat Group DeathStalker Uses PowerShell-based Implant Powersing to Hack into Financial Services Firms

Stu Sjouwerman | Sep 2, 2020

deathstalker use powershellApparently focused on more intelligence gathering than taking direct malicious action against the organizations they compromise, this attack is filled with ingenuity.

The creativity used by cybercriminals never ceases to amaze me. And, in the case of the DeathStalker group, I’m thoroughly impressed. According to security researchers at Kaspersky in a guest blog post, the attack chain used by DeathStalker seems to be intent on gathering sensitive business information rather than deploy malware, ransomware, or any other malicious action normally seen for financial gain.

What makes this attack so interesting is the resourcefulness found in the details. According to the article, the Powersing attack includes some of these capabilities:

  • A modified .LNK file is used as the malicious attachment that launched CMD.EXE, then PowerShell
  • An embedded decoy document is presented to the user while it continues its malicious actions to keep them from becoming suspicious
  • It uses drop dead resolvers – URLs that point to posts or content in legitimate sites that contain Base64 encoded strings, such as the following
sl_decepticons_deathstalker_04
  • The encoded strings reveal the address of the command and control (C2) server
  • The malware sends the C2 server screenshots periodically
  • The malware waits on the C2 server to execute desired PowerShell scripts

As previously mentioned, these attacks appear to be more hacking-for-hire than traditional cybercriminal attacks where the intent is immediately obvious, such as ransomware attacks.

What still remains the same is the method by which these attacks transpire. Spear phishing is the initial attack vector, which puts the user within your organization squarely in the middle of the attack; if they don’t engage with the .LNK attachment, the attack is over. Users that undergo Security Awareness Training are able to more effectively identify social engineering tactics inside emails, lowering the likelihood of clicking malicious attachments or links and, thus, stopping attacks in their tracks.

See KnowBe4 Security Awareness Training in Action

See how you can efficiently safeguard your organization from sophisticated social engineering threats.

Request a Demo

Secure the Digital Workforce: Human + AI

KnowBe4 empowers the modern workforce to make smarter security decisions every day. Trusted by more than 70,000 organizations worldwide, KnowBe4 is the pioneer of digital workforce security, securing both AI agents and humans. The KnowBe4 Platform provides attack simulation and training, collaboration security, and agent security powered by AIDA (Artificial Intelligence Defense Agents) and a proprietary Risk Score. The platform leverages 15 years of behavioral data to combat advanced threats including social engineering, prompt injection, and shadow AI. By securing humans and agents, KnowBe4 leads the industry in workforce trust and defense.