PowerExchange is a PowerShell backdoor that has been used by OilRig since at least 2023 including against government targets in the Middle East.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .003 | Application Layer Protocol: Mail Protocols |
PowerExchange can receive and send back the results of executed C2 commands through email.[1] |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
PowerExchange can use PowerShell to execute commands received from C2.[1] |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
PowerExchange can decode and decrypt C2 commands received via email.[1] |
|
Enterprise | T1041 | Exfiltration Over C2 Channel |
PowerExchange can exfiltrate files via its email C2 channel.[1] |
|
Enterprise | T1105 | Ingress Tool Transfer |
PowerExchange can decode Base64-encoded files and call |