PowerShell-RAT is a stealthy Python and PowerShell-based backdoor that uses Gmail to exfiltrate data. It is astoundingly quick and easy to create a custom attack to exfiltrate data over Gmail. Establishing a backdoor is one of the main goals for an attacker in order to gain persistence over the targeted machines.
Currently the PowerShell-RAT tracks user keystroke activity, hijacks clipboard history, performs screen captures, and sends the information - exfiltrates the data - to the attacker as e-mail attachments. Furthermore, PowerShell-RAT allows an attacker to remotely control the victim’s machine by sending and executing system commands over email allowing two-way communication between an attacker and the compromised host via Gmail.
Frustratingly for organisations that believe they can rely on enterprise grade AV and fully patched Windows environments, the PowerShell-RAT code is currently undetectable. Why? The code is written from scratch and is not seen by AV vendors. Furthermore, using Google as an independent command and control channel is likely to be more successful than using newly created domains or domains with no reputation. Attackers can use this technique to avoid network detection by NextGen firewalls, exposing your organisation’s data assets.
During presentation, the speaker would walk through a number of defence mechanisms to detect stealthy backdoors using publicly available SysInternals Tools such as Autorun, Sysmon, Process Explorer and Process Monitor from Microsoft and some recommendations to protect organisation against such attacks.