Iranian hackers use Windows holes to attack critical Gulf and Emirates systems

In the ever-evolving landscape of cybersecurity, the recent surge in cyberattacks has raised significant concerns among businesses. A notable incident involved the exploitation of a vulnerable web server, specifically targeting public-facing applications. This breach was facilitated by a web shell that granted attackers the ability to execute PowerShell code and transfer files seamlessly.

Once inside the network, the attackers leveraged their initial access to deploy the remote management tool ngrok, which allowed them to navigate laterally within the compromised environment. Their strategic focus was on the Domain Controller, a critical server responsible for managing permissions within a Windows domain. This was achieved by exploiting the CVE-2024-30088 vulnerability, a Windows Kernel Elevation of Privilege flaw, as reported by Trend Micro.

The attackers employed an exploit binary, introduced through the open-source RunPE-In-Memory tool, to escalate their privileges effectively. This maneuver not only fortified their control over the system but also underscored the importance of robust cybersecurity measures in safeguarding sensitive data.

Winsage
Iranian hackers use Windows holes to attack critical Gulf and Emirates systems