Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Harnessing Chisel for Covert Operations: Unpacking a Multi-Stage PowerShell Campaign

    Harnessing Chisel for Covert Operations: Unpacking a Multi-Stage PowerShell Campaign

    November 12, 2024

    PowerShell Campaign

    The Cyble Research and Intelligence Lab (CRIL) has recently uncovered a sophisticated multi-stage infection chain, primarily driven by PowerShell scripts. This campaign, which targets organizations through a variety of attack vectors, has been designed to maintain persistence, bypass security measures, and enable further malicious activities.  

    One of the most interesting findings from this analysis is the utilization of the Chisel tunneling tool, which plays a crucial role in the adversary’s lateral movement and command-and-control (C&C) operations. 

    Key Takeaways from the PowerShell Campaign 

    CRIL’s in-depth investigation into this PowerShell-based attack revealed an intricate multi-stage infection process, beginning with a seemingly innocuous LNK file. Once executed, this LNK file triggers the first in a series of obfuscated PowerShell scripts that download additional malicious payloads. Each stage of the infection builds on the last, with the ultimate goal of enabling the threat actor (TA) to maintain a foothold on the compromised system and network. 

    The use of PowerShell scripts in this campaign highlights the threat actor’s proficiency in leveraging native Windows tools to execute complex attack strategies while evading detection. Additionally, the discovery of a Chisel DLL file suggests that the TA is also using this tool to establish covert tunneling connections, allowing them to bypass firewalls and infiltrate protected internal networks. 

    The Multi-Stage PowerShell Campaign 

    The attack begins with a malicious LNK (Windows shortcut) file that serves as the initial infection vector. While the exact delivery mechanism of the LNK file is unclear, once executed, it triggers a PowerShell script that begins the infection process. This script, which is obfuscated to avoid detection, downloads and executes a secondary PowerShell script from a remote server. The aim of this first-stage script is to establish persistence on the victim’s system by setting up further malicious payloads. 

    Once the first PowerShell script is executed, it drops a second-stage PowerShell script along with several batch files designed to ensure that the infection persists even after a system reboot. The second-stage script maintains communication with the attacker’s C&C server, allowing it to fetch the third and final stage of the infection. 

    The third-stage PowerShell script is the most complex, continuously communicating with the C&C server to receive a chain of commands. These commands can be used to perform various malicious activities, including data exfiltration, lateral movement within the network, and further payload deployment. 

    PowerShell and Obfuscation Techniques 

    A critical component of this attack is the use of PowerShell as the primary tool for executing the attack chain. PowerShell’s powerful capabilities allow the adversary to bypass traditional security mechanisms and remain stealthy. The first PowerShell script, for instance, sets the execution policy to “Bypass,” which allows it to run without being blocked by standard Windows defenses. Additionally, the script is executed in hidden mode, making it invisible to the user. 

    Second and Third Stages of the Attack 

    The second-stage PowerShell script maintains communication with the C&C server to retrieve additional malicious payloads. Like the first stage, it decodes and executes these scripts, continuing the infection chain. 

    In the third stage, the PowerShell script operates with greater complexity. It sets up variables to control its interaction with the C&C server, including $CHAIN for tracking the communication status and $JITTER to introduce random delays to avoid detection by security systems. The script also continues to retrieve system information, such as the hostname, which it Base64-encodes before using it to establish a connection with the server. 

    At this stage, the script can receive and execute a series of commands from the C&C server. If the command is not a “WAIT” instruction, the script executes the provided PowerShell code. The communication between the infected system and the C&C server is designed to be persistent and stealthy, with data being transferred in small chunks to evade detection by traditional security measures. 

    Leveraging Chisel for Covert Operations 

    An intriguing aspect of this campaign is the use of Chisel, a fast TCP/UDP tunneling tool that allows the attacker to establish a secure communication channel over HTTP and bypass firewall restrictions. Chisel is commonly used by threat actors to enable lateral movement within compromised networks and maintain persistence even when traditional communication channels are blocked. 

    CRIL’s analysis found a Chisel DLL file on the infected system, suggesting that the TA may use Chisel for establishing a tunnel between the compromised machine and the C&C server. This tunnel allows the attacker to communicate with internal systems that are otherwise shielded from external access. 

    The Chisel tool can be used for a variety of malicious purposes. One of the primary functions is to scan internal networks for additional vulnerable systems. By deploying the Chisel client on a compromised machine, the TA can use it as a SOCKS proxy to bypass network defenses and perform reconnaissance using tools like Nmap. 

    Once internal systems are identified, the attacker can use Chisel to create a tunnel that enables them to move laterally across the network, gaining access to systems that were previously isolated. Furthermore, the Chisel client allows the attacker to enable internet access for machines that may otherwise be disconnected, enabling them to download additional payloads and maintain control over the compromised network. 

    Proxying and Evasion Techniques 

    The campaign also utilizes the Netskope proxy, which helps the attacker obfuscate their C&C communication. By routing traffic through the Netskope proxy, the TA can evade detection by traditional network defenses, such as firewalls and intrusion detection systems. This proxy-based communication provides a flexible and secure method for the TA to interact with the infected network and maintain control over the compromised systems. 

    The use of Chisel in combination with the Netskope proxy allows the attacker to bypass firewalls, scan internal systems, and exfiltrate data without being detected. This multi-layered approach makes it extremely difficult for defenders to identify and block the attack, as it leverages legitimate tools and proxies to hide malicious activity. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleNorth Korean Hackers Target macOS Using Flutter-Embedded Malware
    Next Article 5 Ways Behavioral Analytics is Revolutionizing Incident Response

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48187 – RAGFlow Authentication Bypass

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-4745 – Apache Code-projects Employee Record System Cross-Site Scripting

    Common Vulnerabilities and Exposures (CVEs)

    More extensions arrive in Microsoft Edge for Android, but when are they coming officially?

    Development

    Run SQL Server Linux container images with Docker

    Development

    Is Red Dead Redemption 1 on PC or Windows? Epic Games’ latest DB leak seemingly confirms it

    Development

    Highlights

    Artificial Intelligence

    With generative AI, MIT chemists quickly calculate 3D genomic structures

    January 31, 2025

    Every cell in your body contains the same genetic sequence, yet each cell expresses only…

    If I Was Starting My Career Today: Thoughts After 15 Years Spent In UX Design (Part 2)

    August 9, 2024

    Sam Altman says OpenAI is no longer “compute-constrained” — after Microsoft lost its exclusive cloud provider status

    April 15, 2025

    Europa Universalis V is the next big Paradox Interactive grand strategy game

    May 10, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.