Investigating a Mimikatz-Enabled Ransomware Attack on a Financial Institution

Investigating a Mimikatz-Enabled Ransomware Attack on a Financial Institution

This article recounts a detailed forensic analysis of a ransomware attack on a financial institution, initiated through a misconfigured Microsoft Exchange Server. The attackers exploited a known vulnerability, deployed Mimikatz for credential theft, and encrypted critical data, leading to severe financial implications. The investigation highlights the importance of patching vulnerabilities and monitoring for unusual activities to enhance cybersecurity defenses. Affected: financial institutions

Keypoints :

  • Financial institutions are prime targets for cybercriminals due to sensitive financial data.
  • The attack began with a compromised Microsoft Exchange Server exposed to the internet.
  • Attackers exploited an unpatched security flaw and utilized Mimikatz to extract credentials.
  • They demonstrated their access by compromising an executive’s Zoom account.
  • The attack resulted in the encryption of critical files and a multi-million dollar ransom demand.
  • Attackers used PuTTY for data exfiltration, complicating detection efforts.
  • Credential theft and ransomware deployment were executed through lateral movement across systems.
  • The investigation utilized the MITRE ATT&CK framework to analyze the attack’s progression.
  • Remediation efforts emphasized the necessity of proactive security measures and monitoring.

MITRE Techniques :

  • T1210 – Exploitation for Privilege Escalation: Attackers exploited the vulnerability in Microsoft Exchange Server to gain access.
  • T1059.001 – PowerShell: Attackers executed PowerShell commands to maintain a foothold in the environment.
  • T1003 – OS Credential Dumping: Mimikatz was used to extract plaintext credentials and NTLM hashes.
  • T1558.003 – Kerberoasting: Attackers dumped domain credentials for lateral movement across financial systems.
  • T1003.001 – LSASS Memory: Unauthorized access to LSASS memory indicated credential dumping.
  • T1078 – Valid Accounts: Multiple failed RDP authentication attempts from new IPs were detected.
  • T1021.002 – SMB/Windows Admin Shares: Lateral movement to high-value targets through administrative shares.
  • T1486 – Data Encrypted for Impact: Ransomware was deployed across critical systems encrypting essential data.
  • T1490 – Inhibit System Recovery: Attackers deleted volume shadow copies to hinder recovery efforts.
  • T1562 – Impair Defenses: Scripts were executed to disable endpoint security controls.

Full Story: https://medium.com/@paulvolosen/investigating-a-mimikatz-enabled-ransomware-attack-on-a-financial-institution-7914c46531d1?source=rss——cybersecurity-5