By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware
Tech News

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware

By Viral Trending Content 4 Min Read
Share
SHARE

Nov 06, 2024Ravie LakshmananSaaS Security / Threat Detection

VEILDrive Attack

An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi.

“Leveraging Microsoft SaaS services — including Teams, SharePoint, Quick Assist, and OneDrive — the attacker exploited the trusted infrastructures of previously compromised organizations to distribute spear-phishing attacks and store malware,” Israeli cybersecurity company Hunters said in a new report.

“This cloud-centric strategy allowed the threat actor to avoid detection by conventional monitoring systems.”

Hunters said it discovered the campaign in September 204 after it responded to a cyber incident targeting a critical infrastructure organization in the United States. It did not disclose the name of the company, instead giving it the designation “Org C.”

Cybersecurity

The activity is believed to have commenced a month prior, with the attack culminating in the deployment of a Java-based malware that employs OneDrive for command-and-control (C2).

The threat actor behind the operation is said to have sent Teams messages to four employees of Org C by impersonating an IT team member and requesting remote access to their systems via the Quick Assist tool.

What made this initial compromise method stand out is that the attacker utilized a user account belonging to a potential prior victim (Org A), rather than creating a new account for this purpose.

“The Microsoft Teams messages received by the targeted users of Org C were made possible by Microsoft Teams’ ‘External Access’ functionality, which allows One-on-One communication with any external organization by default,” Hunters said.

VEILDrive Attack

In the next step, the threat actor shared via the chat a SharePoint download link to a ZIP archive file (“Client_v8.16L.zip”) that was hosted on a different tenant (Org B). The ZIP archive came embedded with, among other files, another remote access tool named LiteManager.

The remote access gained via Quick Assist was then used to create scheduled tasks on the system to periodically execute the LiteManager remote monitoring and management (RMM) software.

Also downloading is a second ZIP file (“Cliento.zip”) using the same method that included the Java-based malware in the form of a Java archive (JAR) and the entire Java Development Kit (JDK) to execute it.

The malware is engineered to connect to an adversary-controlled OneDrive account using hard-coded Entra ID (formerly Azure Active Directory) credentials, using it as a C2 for fetching and executing PowerShell commands on the infected system by using the Microsoft Graph API.

Cybersecurity

It also packs in a fallback mechanism that initializes an HTTPS socket to a remote Azure virtual machine, which is then utilized to receive commands and execute them under the context of PowerShell.

This is not the first time the Quick Assist program has been used in this manner. Earlier this May, Microsoft warned that a financially motivated cybercriminal group known as Storm-1811 misused Quick Assist features by pretending to be IT professionals or technical support personnel to gain access and drop Black Basta ransomware.

The development also comes weeks after the Windows maker said it has observed campaigns abusing legitimate file hosting services like SharePoint, OneDrive, and Dropbox as means of evading detection.

“This SaaS-dependent strategy complicates real-time detection and bypasses conventional defenses,” Hunters said. “With zero obfuscation and well-structured code, this malware defies the typical trend of evasion-focused design, making it unusually readable and straightforward.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

State of Decay 3 Mixes the Second Game’s Systemic Features With the “Heart and Soul” of the First

IKEA Dubbelkisel Turns Standard Lights into Smart Lights

Out of Every 2026 Android, One Feature Makes Me Return to Xiaomi

5 Mysteries That the Artemis Missions to the Moon Could Finally Solve

iOS 27 Stability Update: Performance Fixes, Siri, and More

TAGGED: Cloud security, Cyber Security, Cybersecurity, Incident response, Internet, Malware, Microsoft, Ransomware, Remote Access, SaaS Security, threat detection
Share This Article
Facebook Twitter Copy Link
Previous Article Dogecoin Price Jumps 25% To Lead Market Gains, Why A Donald Trump Win Is Especially Bullish For DOGE
Next Article Westminster voters reject measure to end at-large City Council elections
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

RBL Bank shares jump 4% after exceptional Q4 update, RBI’s approval for Emirates NBD’s 74% stake acquisition
Business
Price predictions 4/6: SPX, DXY, BTC, ETH, BNB, XRP, SOL, DOGE, HYPE, ADA
Crypto
Summer holidays: Why travellers are swapping the Riviera for the Balkans
World News
Is Litecoin “Dead Money” Or Is It About To Do What Solana Did In 2024?
Crypto
Terry Crews’ Wife: Everything to Know About Rebecca King-Crews & Their Marriage
Celebrity
State of Decay 3 Mixes the Second Game’s Systemic Features With the “Heart and Soul” of the First
Gaming News
IKEA Dubbelkisel Turns Standard Lights into Smart Lights
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

RBL Bank shares jump 4% after exceptional Q4 update, RBI’s approval for Emirates NBD’s 74% stake acquisition

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
RBL Bank shares jump 4% after exceptional Q4 update, RBI’s approval for Emirates NBD’s 74% stake acquisition
April 6, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?