

NV.html, tracked by Microsoft as EnvyScout, can be best described as a malicious dropper capable of de-obfuscating and writing a malicious ISO file to disk. The list of indicators in the appendix expands beyond this single wave. While this post focuses on a single wave of the campaign comprised of the mentioned four malware families, it also highlights variations in the campaign wherein methodologies were altered per wave. We anticipate that as these operations progress, NOBELIUM will continue to mature their tools and tactics to target a global audience. Since December, the security community has identified a growing collection of payloads attributed to the actor, including the GoldMax, GoldFinder, and Sibot malware identified by Microsoft, as well as TEARDROP ( FireEye), SUNSPOT ( CrowdStrike), Raindrop ( Symantec) and, most recently, FLIPFLOP ( Volexity).ĭespite growing community visibility since the exposure of the SolarWinds attack in late 2020, NOBELIUM has continued to target government and diplomatic entities across the globe. We suspect that NOBELIUM can draw from significant operational resources that are often showcased in their periodic campaigns. NOBELIUM is an actor that operates with rapid operational tempo, often leveraging temporary infrastructure, payloads, and methods to obfuscate their activities. Such design and deployment patterns, which also include staging of payloads on a compromised website, hamper traditional artifacts and forensic investigations, allowing for unique payloads to remain undiscovered. VaporRage can download, decode, and execute an arbitrary payload fully in-memory.
#Cobalt strike beacon dll update#
Update : We updated the NOBELIUM IOCs to include MD5 hashes. Note: The NOBELIUM indicators of compromise (IOCs) associated with this activity are available in CSV on the MSTIC GitHub. These tools have been observed being used in the wild as early as February 2021, attempting to gain a foothold on a variety of sensitive diplomatic and government entities.Īs part of this blog, Microsoft Threat Intelligence Center (MSTIC) is releasing an appendix of indicators of compromise (IOCs) for the community to better investigate and understand NOBELIUM’s most recent operations.

In this blog, we highlight four tools representing a unique infection chain utilized by NOBELIUM: EnvyScout, BoomBox, NativeZone, and VaporRage. We continue to monitor this active attack and intend to post additional details as they become available. Microsoft Purview Data Lifecycle ManagementĪs we reported in earlier blog posts, the threat actor NOBELIUM recently intensified an email-based attack that it has been operating and evolving since early 2021.Microsoft Purview Information Protection.Information Protection Information Protection.Microsoft Purview Communication Compliance.Microsoft Purview Insider Risk Management.Risk Management & Privacy Risk Management & Privacy.Identity Threat Protection Identity Threat Protection.Microsoft Defender Vulnerability Management.Azure Active Directory part of Microsoft Entra.
