New PowerDrop Malware Focusing on U.S. Aerospace Trade

Jun 07, 2023Ravie LakshmananMalware / Cyber Assault

PowerDrop Malware

An unknown risk actor has been noticed concentrating on the U.S. aerospace trade with a brand new PowerShell-based malware known as PowerDrop.

“PowerDrop makes use of superior strategies to evade detection corresponding to deception, encoding, and encryption,” in accordance with Adlumin, which found the malware implanted in an unnamed home aerospace protection contractor in Could 2023.

“The identify is derived from the instrument, Home windows PowerShell, used to concoct the script, and ‘Drop’ from the DROP (DRP) string used within the code for padding.”

PowerDrop can be a post-exploitation instrument, that means it is designed to assemble data from sufferer networks after acquiring preliminary entry by different means.


The malware employs Web Management Message Protocol (ICMP) echo request messages as beacons to provoke communications with a command-and-control (C2) server.

The server, for its half, responds again with an encrypted command that is decoded and run on the compromised host. An analogous ICMP ping message is used for exfiltrating the outcomes of the instruction.

PowerDrop Malware

What’s extra, the PowerShell command is executed by way of the Home windows Administration Instrumentation (WMI) service, indicating the adversary’s makes an attempt to leverage living-off-the-land ways to sidestep detection.

“Whereas the core DNA of the risk just isn’t significantly refined, its capability to obfuscate suspicious exercise and evade detection by endpoint defenses smacks of extra refined risk actors,” Mark Sangster, vp of technique at Adlumin, stated.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we publish.