Jkp Informatika hackovana :)

Realno, ****** bi se za 5 dinara koliko vidim. Sve te price o programerima i dobrim platama se svodi na kurcenje i na umisljenost kako ste mnogo vazni i pametni.
Nikad nisam imao pare, tako da i ne osecam nikakvu potrebu da moram da zaradjujem astronomske cifre. Meni bi bilo sasvim dovoljna plata od 60k da mogu da zivim normalno i da imam vikende, slobodno vreme i sl. Jebale tebe pare, kola, bonusi i sl kad treba da danas kodiras 12 sati kao crnac i da sedis non stop na stolici i blenes u monitor. Nikad programiranje nisam voleo, nikad.
Znas kako, radim 8 sati, svaki sat prekovremeno se upisuje i placa, ne radim za vikende i praznike, imam dan za slavu.
Ne vidim neku razliku... ne vidim sad da nesto vise radim od onog u javnom sektoru. E sad to sto moras da radis na radnom
mestu mozda je to problem?
 
Znas kako, radim 8 sati, svaki sat prekovremeno se upisuje i placa, ne radim za vikende i praznike, imam dan za slavu.
Ne vidim neku razliku... ne vidim sad da nesto vise radim od onog u javnom sektoru. E sad to sto moras da radis na radnom
mestu mozda je to problem?
Da ,Ali svugde po svetu nije manje odgovorno raditi za državnu firmu, čak šta više trkaju se ko će pružiti gradjanima bolju uslugu.
Mi smo poverili privatne podatke totalno nesposobnim retardima.
Kao slučajno pred izbore :) eh..
 
Human-operated ransomware attacks: A preventable disaster


  • Microsoft Threat Protection Intelligence Team







Human-operated ransomware campaigns pose a significant and growing threat to businesses and represent one of the most impactful trends in cyberattacks today. In these hands-on-keyboard attacks, which are different from auto-spreading ransomware like WannaCry or NotPetya, adversaries employ credential theft and lateral movement methods traditionally associated with targeted attacks like those from nation-state actors. They exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.
These attacks are known to take advantage of network configuration weaknesses and vulnerable services to deploy devastating ransomware payloads. And while ransomware is the very visible action taken in these attacks, human operators also deliver other malicious payloads, steal credentials, and access and exfiltrate data from compromised networks.
News about ransomware attacks often focus on the downtimes they cause, the ransom payments, and the details of the ransomware payload, leaving out details of the oftentimes long-running campaigns and preventable domain compromise that allow these human-operated attacks to succeed.
Based on our investigations, these campaigns appear unconcerned with stealth and have shown that they could operate unfettered in networks. Human operators compromise accounts with higher privileges, escalate privilege, or use credential dumping techniques to establish a foothold on machines and continue unabated in infiltrating target environments.
Human-operated ransomware campaigns often start with “commodity malware” like banking Trojans or “unsophisticated” attack vectors that typically trigger multiple detection alerts; however, these tend to be triaged as unimportant and therefore not thoroughly investigated and remediated. In addition, the initial payloads are frequently stopped by antivirus solutions, but attackers just deploy a different payload or use administrative access to disable the antivirus without attracting the attention of incident responders or security operations centers (SOCs).
Some well-known human-operated ransomware campaigns include REvil, Samas, Bitpaymer, and Ryuk. Microsoft actively monitors these and other long-running human-operated ransomware campaigns, which have overlapping attack patterns. They take advantage of similar security weaknesses, highlighting a few key lessons in security, notably that these attacks are often preventable and detectable.
Combating and preventing attacks of this nature requires a shift in mindset, one that focuses on comprehensive protection required to slow and stop attackers before they can succeed. Human-operated attacks will continue to take advantage of security weaknesses to deploy destructive attacks until defenders consistently and aggressively apply security best practices to their networks. In this blog, we will highlight case studies of human-operated ransomware campaigns that use different entrance vectors and post-exploitation techniques but have overwhelming overlap in the security misconfigurations they abuse and the devastating impact they have on organizations.
PARINACOTA group: Smash-and-grab monetization campaigns
One actor that has emerged in this trend of human-operated attacks is an active, highly adaptive group that frequently drops Wadhrama as payload. Microsoft has been tracking this group for some time, but now refers to them as PARINACOTA, using our new naming designation for digital crime actors based on global volcanoes.
PARINACOTA impacts three to four organizations every week and appears quite resourceful: during the 18 months that we have been monitoring it, we have observed the group change tactics to match its needs and use compromised machines for various purposes, including cryptocurrency mining, sending spam emails, or proxying for other attacks. The group’s goals and payloads have shifted over time, influenced by the type of compromised infrastructure, but in recent months, they have mostly deployed the Wadhrama ransomware.
The group most often employs a smash-and-grab method, whereby they attempt to infiltrate a machine in a network and proceed with subsequent ransom in less than an hour. There are outlier campaigns in which they attempt reconnaissance and lateral movement, typically when they land on a machine and network that allows them to quickly and easily move throughout the environment.
PARINACOTA’s attacks typically brute forces their way into servers that have Remote Desktop Protocol (RDP) exposed to the internet, with the goal of moving laterally inside a network or performing further brute-force activities against targets outside the network. This allows the group to expand compromised infrastructure under their control. Frequently, the group targets built-in local administrator accounts or a list of common account names. In other instances, the group targets Active Directory (AD) accounts that they compromised or have prior knowledge of, such as service accounts of known vendors.
The group adopted the RDP brute force technique that the older ransomware called Samas (also known as SamSam) infamously used. Other malware families like GandCrab, MegaCortext, LockerGoga, Hermes, and RobbinHood have also used this method in targeted ransomware attacks. PARINACOTA, however, has also been observed to adapt to any path of least resistance they can utilize. For instance, they sometimes discover unpatched systems and use disclosed vulnerabilities to gain initial access or elevate privileges.
Wadhrama PARINACOTA attack chain

Figure 1. PARINACOTA infection chain
We gained insight into these attacks by investigating compromised infrastructure that the group often utilizes to proxy attacks onto their next targets. To find targets, the group scans the internet for machines that listen on RDP port 3389. The attackers do this from compromised machines using tools like Masscan.exe, which can find vulnerable machines on the entire internet in under six minutes.
Once a vulnerable target is found, the group proceeds with a brute force attack using tools like NLbrute.exe or ForcerX, starting with common usernames like ‘admin’, ‘administrator’, ‘guest’, or ‘test’. After successfully gaining access to a network, the group tests the compromised machine for internet connectivity and processing capacity. They determine if the machine meets certain requirements before using it to conduct subsequent RDP brute force attacks against other targets. This tactic, which has not been observed being used by similar ransomware operators, gives them access to additional infrastructure that is less likely to be blocked. In fact, the group has been observed leaving their tools running on compromised machines for months on end.
On machines that the group doesn’t use for subsequent RDP brute-force attacks, they proceed with a separate set of actions. This technique helps the attackers evade reputation-based detection, which may block their scanning boxes; it also preserves their command-and-control (C2) infrastructure. In addition, PARINACOTA utilizes administrative privileges gained via stolen credentials to turn off or stop any running services that might lead to their detection. Tamper protection in Microsoft Defender ATP prevents malicious and unauthorized to settings, including antivirus solutions and cloud-based detection capabilities.
After disabling security solutions, the group often downloads a ZIP archive that contains dozens of well-known attacker tools and batch files for credential theft, persistence, reconnaissance, and other activities without fear of the next stages of the attack being prevented. With these tools and batch files, the group clears event logs using wevutil.exe, as well as conducts extensive reconnaissance on the machine and the network, typically looking for opportunities to move laterally using common network scanning tools. When necessary, the group elevates privileges from local administrator to SYSTEM using accessibility features in conjunction with a batch file or exploit-laden files named after the specific CVEs they impact, also known as the “Sticky Keys” attack.
The group dumps credentials from the LSASS process, using tools like Mimikatz and ProcDump, to gain access to matching local administrator passwords or service accounts with high privileges that may be used to start as a scheduled task or service, or even used interactively. PARINACOTA then uses the same remote desktop session to exfiltrate acquired credentials. The group also attempts to get credentials for specific banking or financial websites, using findstr.exe to check for cookies associated with these sites.
Microsoft Defender ATP alert for credential theft

Figure 2. Microsoft Defender ATP alert for credential theft
With credentials on hand, PARINACOTA establishes persistence using various methods, including:
  • Registry modifications using .bat or .reg files to allow RDP connections
    fig2-1.png
  • Setting up access through existing remote assistance apps or installing a backdoor
  • Creating new local accounts and adding them to the local administrators group
    fig2-2.png
To determine the type of payload to deploy, PARINACOTA uses tools like Process Hacker to identify active processes. The attackers don’t always install ransomware immediately; they have been observed installing coin miners and using massmail.exe to run spam campaigns, essentially using corporate networks as distributed computing infrastructure for profit. The group, however, eventually returns to the same machines after a few weeks to install ransomware.
The group performs the same general activities to deliver the ransomware payload:
  • Plants a malicious HTA file (hta in many instances) using various autostart extensibility points (ASEPs), but often the registry Run keys or the Startup folder. The HTA file displays ransom payment instructions.
  • Deletes local backups using tools like exe to stifle recovery of ransomed files.
  • Stops active services that might interfere with encryption using exe, net.exe, or other tools.
fig3-PARINACOTA-stopping-services-and-processes.png

Figure 3. PARINACOTA stopping services and processes
  • Drops an array of malware executables, often naming the files based on their intended behavior. If previous attempts to stop antivirus software have been unsuccessful, the group simply drops multiple variants of a malware until they manage to execute one that is not detected, indicating that even when detections and alerts are occurring, network admins are either not seeing them or not reacting to them.
As mentioned, PARINACOTA has recently mostly dropped the Wadhrama ransomware, which leaves the following ransom note after encrypting target files:
fig4-Wadhrama-ransom-note.png

Figure 4. Wadhrama ransom note
In several observed cases, targeted organizations that were able to resolve ransomware infections were unable to fully remove persistence mechanisms, allowing the group to come back and deploy ransomware again.
fig5-Microsoft-Defender-ATP-reinfection.png

Figure 5. Microsoft Defender ATP machine view showing reinfection by Wadhrama
PARINACOTA routinely uses Monero coin miners on compromised machines, allowing them to collect uniform returns regardless of the type of machine they access. Monero is popular among cybercriminals for its privacy benefits: Monero not only restricts access to wallet balances, but also mixes in coins from other transactions to help hide the specifics of each transaction, resulting in transactions that aren’t as easily traceable by amount as other digital currencies.
As for the ransomware component, we have seen reports of the group charging anywhere from .5 to 2 Bitcoins per compromised machine. This varies depending on what the attackers know about the organization and the assets that they have compromised. The ransom amount is adjusted based on the likelihood the organization will pay due to impact to their company or the perceived importance of the target.

Vise na ... https://www.microsoft.com/security/...ed-ransomware-attacks-a-preventable-disaster/
 
Inače u proseku najviše je zaposlio SPS pa posle DS a tek na zadnjem mestu je SNS. Tako da iako je vlast u rukama SNS-a najviše zaposlenih po JP-ima ima SPS a odmah posle DS.
Ovo ne da nije tacno vec nema veze sa zivotom. Znam dosta ljudi koji rade u JP, recimo Urbanzam i ostalo i broj zaposlenih se poevcao 3x za vreme SNS-a, primaju ljude koji jedva da su osnovnu zavrsili....
 
Ovo ne da nije tacno vec nema veze sa zivotom. Znam dosta ljudi koji rade u JP, recimo Urbanzam i ostalo i broj zaposlenih se poevcao 3x za vreme SNS-a, primaju ljude koji jedva da su osnovnu zavrsili....
Markons lupetaš i to idiotski , ali to što ti lupetaš ovde a to nema veze sa ovom temom već se rasprava i tome treba da se vodi na politici. Ti slobodno otvori temu a ja ću pisati tamo i sve ono što napišem i potkrepiću dokazima.
A ako je potrebno sve zaposlene u JP-u gde radim znam kako je došao do posla i ko ga je doveo i kada i sa kojom vlašću je dotični došao.
Tako da slobodno mogu da ti napišem znajući sve ono šta znam veoma otvoreno ove dve reči NE SERI- bez papira.
 

Back
Top