Windows Subsystem for Linux: Threats Still Lurk Below the (Sub)SurfaceLumen security research reveals threats still lurk in Windows Subsystem for LinuxBlack Lotus Labs discovers evolving capabilities of Linux binaries used as loaders in WSLLast fall, Black Lotus Labs, the threat intelligence team at Lumen Technologies discovered what had – until then – only been theorized: Linux binaries were being used as loaders in Windows Subsystem for Linux (WSL). Since then, the team has analyzed more than 100 samples that indicate the capability is evolving. Several of the samples leveraged custom-developed and open-source tools (OSTs) that could be used by actors to evade detection while gaining access into endpoints and computer networks. "This new class of WSL-based
attack demonstrates the blurring boundaries between operating systems,"
said Michelle Lee, director of threat intelligence at Black Lotus Labs.
"Because the types of users running WSL tend to have greater network
privileges, organizations that use WSL as part of their day-to-day operations
should take note to bolster their defenses as quickly as possible."
Tech Talk
o The increase in custom modules suggests the WSL attack surface is a growing area of interest. o While many of the samples did not yet appear to be fully functional, they demonstrate attack methods that are actively being tested and refined.
o OSTs enable actors to minimize development time by using publicly available tools rather than creating their own. o All the OST-based samples that leveraged the WSL also relied upon third-party services such as Discord and Telegram for command and control. o Black Lotus Labs suspects that by using third-party network services and operating in a nebulous subsystem space, threat actors may be trying to evade some standard detection mechanisms. Source: Lumen media announcement |