Category: Malware

  • Everything to know about “Follina” (CVE-2022-30190)

    “Follina”, or CVE-2022-30190 is a widely used exploit that allows an attacker to remotely execute Powershell code on Windows machines from a Microsoft Word document or a URL.

    What it does

    Follina can do anything the attacker desires. Follina is a remote-code execution scheme, which means that a hacker can run any code the hacker wants on your machine without your knowledge. Some examples include lateral movement, privilege escalation, and the ability to steal browser credentials.

    How it works

    Follina takes advantage of URL protocols. URL protocols are used to run applications from a URL. Many people let this happen, mainly because URL protocols are not supposed to invoke code from applications. For example, if you are on a Windows machine, and you type “ms-calculator://” into the address bar, Windows should launch the calculator. However, the specific URL protocol Follina takes advantage of is “ms-msdt://”. This will launch the Microsoft Support Diagnostics Tool, which is mainly used by support professionals to gain information about your system. If you put some special parameters into the URL though, you can trick the program into running Powershell code, and sending the results to the hacker.

    How it was discovered

    The thing about Follina is that it was first discovered early-to-mid April of 2022 by someone who goes by the name of “crazyman” as part of the Shadow Chaser Group. However, Microsoft dismissed the threat, stating that it is not a security issue.

    The support representative stated that his sample did not work at his lab. MSDT requires a password on startup, but the original script had enough junk and padding to make this file over 4096 bytes, and according to my tests and speculations, MSDT will only open if the exploiting file is over 4096 bytes. Also, this can be exploited through Rich Text Documents and URLs or URL shortcuts, not just Word documents. Another reason that this is a dangerous threat is that, when saved as a Rich Text file, simply navigating to it and opening it up in the preview pane in File Explorer could trigger the execution, meaning that you don’t even have to open the file for the code to be invoked.

    However, this file was only brought to the community’s attention when a Twitter user by the name of “nao_sec”, was looking for documents on VirusTotal using an older exploit, CVE-2021-40444, found this document and alerted the community about it.

    How to protect yourself

    Because Follina is a zero-day exploit, there is no guaranteed patch. There is one solution that Microsoft acknowledged. The solution disables the “ms-msdt://” URL protocol.

  • How to create a ZIP Bomb in Windows

    LightLightDarkDark

    Okay, what is this “ZIP Bomb” anyway?

    A Zip bomb is a small file that only contains something like “42 Kilobytes”. However, when extracted, this can be, like, petabytes.

    Sign up for our newsletter!

    How to make one yourself: What you will need

    How to make one yourself: Step 1 – Create the junk

    Now what you have to do is launch Dummy File Creator (Dummy.exe)

    It will prompt you to size. Choose something like 30 Gigabytes. If it does not let you, choose 10.

    Now click “Create”.

    How to make one yourself: Step 2 – Make the folders

    Now put the dummy file in a folder.

    Duplicate the folder as much as you can.

    Put that all in one folder.

    How to make one yourself: Step 3 – Zipping it all up

    Right-Click the folder with lots of other folders and go to 7-Zip > Add to [THAT FOLDERS NAME].zip\.

    How to make one yourself: Step 4 – Done!