What you need to know
- China-based state-sponsored threat actor group Hafnium is stirring the pot once again.
- You may remember Hafnium from the Microsoft Exchange server drama of early 2021.
- Now, Hafnium is utilizing malware to evade Windows defenses and ensure compromised environments remain vulnerable.
Microsoft is once again sounding the alarm so that you, the user, stay informed about the latest malware campaigns and cyber threats. This time, the alert is for Tarrask, a "defense evasion malware" that uses Windows Task Scheduler to hide a device's compromised status from itself.
The attack comes from Hafnium, the state-sponsored, China-based group that you may recall to be a big deal because of its involvement in the Microsoft Exchange meltdown of 2021. The data gathered during that ordeal has been speculated to be fuel for AI innovations by the Chinese government.
Microsoft is currently tracking Hafnium's activity when it comes to novel exploits of the Windows subsystem. Hafnium is using Tarrask malware to ensure that compromised PCs remain vulnerable, employing a Windows Task Scheduler bug to clean up trails and make sure that on-disk artifacts of Tarrask's activities don't stick around to reveal what's going on.
Microsoft has high-level recommendations for how to combat Tarrask, which you can check out at the company's blog post on the subject (opens in new tab) (via BleepingComputer). Cyber resistance guidance in this case includes modifying audit policies, checking for scheduled tasks without SD (security descriptor) values, and more.
If you find these sorts of Microsoft PSAs to be useful, be sure to check out the company's security summit on May 12, wherein it will explore the latest cybersecurity threats in-depth and give you a chance to ask Redmond's in-house experts questions live.
Robert Carnevale is the News Editor for Windows Central. He's a big fan of Kinect (it lives on in his heart), Sonic the Hedgehog, and the legendary intersection of those two titans, Sonic Free Riders. He is the author of Cold War 2395. Have a useful tip? Send it to email@example.com.
"checking for scheduled tasks without SD (security descriptor) values, " That sounds like a good job for Defender... or the Malicious Software Removal Tool...
but yeah, I'm down with doing your job for you manually. 😞
Oh c'mon,If it's not the russians,it's the chinese,and in reverse .
Let me see some solid proof,some evidence,not just generic western propaganda,and I'll jump in the East-blaming train.
You don't expect Microsoft to accurately track the origins of cybercriminals attacking its products?
Get the best of Windows Central in in your inbox, every day!
Thank you for signing up to Windows Central. You will receive a verification email shortly.
There was a problem. Please refresh the page and try again.