Skip to content

Latest commit

 

History

History
43 lines (35 loc) · 1.75 KB

malicious-network-driver.md

File metadata and controls

43 lines (35 loc) · 1.75 KB
ID B0026
Objective(s) Lateral Movement, Persistence
Related ATT&CK Techniques None
Version 2.0
Created 1 August 2019
Last Modified 08 May 2023

Malicious Network Driver

Malicious network drivers can be installed on several machines on a network via an exploited server with high uptime. Once the drivers are installed on the host machines, they can re-infect the server if it is restarted (Persistence), can infect other machines on the network (Lateral Movement), and can redirect traffic on the network (Impact).

A malicious network driver can tunnel outside traffic into the network, allowing the attackers to access remote desktop sessions or to connect to servers inside the domain by using previously acquired credentials. Using the credentials, they can re-deploy the entire platform following a massive shutdown or power loss, causing the malware to persist on network-connected systems even after reboot. Persistence is attained after the information system connects to the server—the malware reinstalls itself on the server, with (re)infection of the remaining systems on the network ensuing.

Use in Malware

Name Date Method Description
[Malicious NDISProxy drivers] 2018 -- The LuckyMouse APT (aka APT27) spreads Trojans via malicious NDISProxy drivers. [1]

References

[1] https://www.zdnet.com/article/luckymouse-targets-govt-entities-through-malicious-ndisproxy-driver/