Source: Huntress Blog
Author: unknown
URL: https://www.huntress.com/blog/velociraptor-misuse-part-one-wsus-up
ONE SENTENCE SUMMARY:
Threat actors exploited a WSUS vulnerability to install Velociraptor for remote access, increasing incidents of dual-use tool abuse.
MAIN POINTS:
- In November, threat actors exploited a WSUS vulnerability (CVE-2025-59287) to gain initial access.
- Velociraptor, an open-source tool, was used for command-and-control (C2) communications.
- Huntress SOC observed increased misuse of Velociraptor over recent months.
- The WSUS vulnerability was patched by Microsoft on October 23.
- Cisco Talos linked Velociraptor activity to a SharePoint vulnerability called ToolShell.
- Threat actors installed Velociraptor with a malicious MSI from s3.wasabisys.com.
- PowerShell commands were used post-installation for system discovery.
- Dual-use tools like Cobalt Strike and Mimikatz have been similarly abused.
- Velociraptor is part of a larger trend of legitimate tools being misused.
- Further insights on Velociraptor misuse will continue in part two of the series.
TAKEAWAYS:
- Vigilance is crucial as legitimate tools like Velociraptor are increasingly misused for attacks.
- Regular patching can mitigate vulnerabilities, like the recently addressed WSUS flaw.
- Velociraptor’s use in attacks highlights the need for careful monitoring of network tools.
- Understanding tool behavior and misuse patterns can enhance incident response strategies.
- Expect continued evolution in the misuse of dual-purpose open-source tools by threat actors.