Description

The ransomware strain Makop a derivative of the Phobos family first spotted in 2020, remains a growing threat worldwide. Recent findings indicate attackers are blending brute-force RDP attacks with sophisticated privilege escalation and security-bypass tools to infiltrate organizations. Alarmingly, 55 percent of reported incidents target companies in India. The typical attack chain begins with exploitation of exposed Remote Desktop Protocol (RDP) services. Attackers use brute-force utilities such as NLBrute to crack weak or reused credentials. Once inside, the attackers deploy network scanners, credential-dumping tools, antivirus-killer utilities, and privilege-escalation exploits to gain high-level access. For privilege escalation, Makop operators exploit a wide array of Windows vulnerabilities including kernel and driver flaws and use the Bring Your Own Vulnerable Driver (BYOVD) technique. They sometimes load legitimate but vulnerable signed drivers to gain kernel-level access and disable security software, effectively bypassing endpoint detection. Executables used in attacks are often disguised with benign-looking names, and dropped into normal-seeming folders like Music or RDP-shared directories to evade detection. After establishing control, attackers perform lateral movement using tools like network scanners, enumerate high-value targets and ultimately deploy the ransomware payload.