Featured

Published on June 11th, 2020 📆 | 7796 Views ⚑

0

Crooks hijack “Black Lives Matter” to spread zombie malware – Naked Security


iSpeech.org

Community-focused cbyersecurity website abuse.ch is warning of a malware spreading campaign that is using “Black Lives Matter” to draw victims in.

Sneakily, the crooks have broadened the reach of their attack by keeping their emails short and objective – the crooks very deliberately haven’t taken a social or political position, but have instead invited recipients to comment anonymously on the issue:

Subject: Vote anonymous about "Black Lives Matter"

Leave a review confidentially about "Black Lives Matter"

These crooks aren’t piling on any pressure; they aren’t playing on emotions such as guilt or fear; and they aren’t even requiring you to get involved under your own name.

They’re just inviting comments – in the sample shown by abuse.ch, the file has the unassuming name of e-vote_form_3438.doc.

(We haven’t received one of these ourself, but we’re assuming that the digits at the end of the filename will vary each time to mix things up a bit.)

Don’t open it – it’s a trap!

We opened it so you don’t have to, and we must grudgingly admit that the trick the crooks have used here is easy to fall for.

Remember that Word documents can contain what are commonly known as macros – embedded program code written in the Visual Basic for Applications programming language, or VBA for short.

The problem with macros is that the term sounds safe and innocent – the word harks back to the days of really simple keystroke recorders that you could use to automate simple tasks in word processors or spreadsheets.

But VBA today is as powerful and as dangerous as C, C++, Delphi, Perl, Python or any other programming language that’s associated with full-blown, standalone applications that you install and run locally.

VBA needs an Office application running (usually Word, Excel or PowerPoint) to make it work, but once you agree to let VBA code run from inside an Office file, it has full access to your computer just as if the VBA program were running outside Office.

In other words, VBA inside a Word file isn’t like JavaScript in your browser – there’s no sandbox or walled garden to restrict the damage it can do.

VBA programs can do any and all of these things:

  • Download arbitrary data off the internet into memory.
  • Decrypt or encrypt data using a wide range of cryptographic algorithms.
  • Create new files on your hard disk, or read in data you’ve already got stored there.
  • Modify or delete existing files on your hard disk or across the network.
  • Access memory directly and inject malicious code into Office or other programs without saving that code to disk first.
  • Monitor keystrokes, take screenshots, peek at network traffic, and much more.

That’s why Microsoft sets up Office with macros turned off by default, so that you can’t accidentally run embedded VBA mlaware simply by opening an infected Office file – because rogue macros can do a lot of harm.

Indeed, even though we regularly see VBA macros used inside companies as a way to automate office workflow via internal, trusted documwents…

..every emailed document we’ve ever received with macros in it was harbouring malware.

What if you open this one?

The crooks behind this attack have used to low-pressure tactics inside the document, too, giving you a surprisingly believable reason to let the embdded macros run.

When we opened the sample reported by abuse.ch, we saw this:

New updates are available for Office. They will be downloaded in the background and will not interrupt your work.

That sounds like the sort of advice you should heed, rather than ignore, and the crooks are even polite enough to remind you that:





If your internet connection is limited, be cautious – you can be charged for downloading of this data.

But that’s not all you need to be cautious of – the real danger comes in the innocent-sounding instructions at the end:

Please press “Enable Editing” and then “Enable Content” in the popup window.

As you can see, the yellow popup tries to discourage you from doing what the crooks say, warning you that macros are disabled for security reasons.

Nevertheless, the button to activate the malcious macros in this file is labelled [Enable Content], which we’ve always thought makes it sound more innocent than it really is, as if what you are seeing now were merely a preview.

So our advice is that when you see the words Enable Content, translate them mentally into: Clicking this will extract and run an embedded program that is almost certainly malware.

That will help to remind you just how risky and reckless it is to [Enable Content] just because a document asked you nicely.

What if you do click through?

The first thing you see if you do run the macros in this malware document is a Windows-like error message, complete with one of those eight-digit codes that looks familiar:

That error is fake (as you will see if you search for it online), and it acts as what’s called a decoy – a plausible reason to explain why the promised update didn’t work out.

In fact, it’s just one simple line of VBA code in the malicious macro – the MsgBox command pops up the bogus error message, after which the macro code goes to work unscrambling and running an embedded program, known as shellcode, that is disguised using a weird sort of alphabetic hexadecimal notation:

(In the long string of encoded binary data you see, the letters a to p are used to represent the hexadecimal digits 0 to f and the minus signs mean nothing.)

According to abuse.ch, the malicious document is what’s known as a downloader that currently reaches out to one of two different servers (probably hacked for this very purpose) to fetch and install a well-known strain of zombie malware called Trickbot.

Trickbot started life as a banking Trojan, which is malware that, amongst other things, tries to get unauthorised access to your financial accounts.

But as the “bot” part the name tells you, Trickbot’s underlying purpose is to act as a robot agent that can carry out a wide range of commands issued by the crooks, including a general purpose command that tells the bot to download and install some other strain of malware too, often ransomware.

So the problem with bot or zombies is that the question, “What do they do?” cannot reliably be answered in advance, because they are meant to be flexible enough for the crooks to reprogram their behaviour at will.

And the problem with document-based downloaders is that “What do they fetch?” cannot reliably be answered in advance, either, because the file that’s served up for download can be changed by the crooks at will.

What to do?

  • Don’t open attachments you didn’t ask for or expect. Getting unsolicited email is bad enough – so don’t give the spammers yet more time-of-day by opening attachments to help them out even further.
  • Never turn off security features because a document tells you to. Microsoft chose [Disable content] as the default to protect you from unscrupulous documents, especially unscrupulous documents that tell you to [Enable content].
  • Look for an anti-virus with behaviour-blocking and web filtering as well as plain file scanning. The multi-step approach used by malware like this means the crooks need to get away with less at each stage – the DOC file itself doesn’t need the full and final malware built right in. But that means you can stop the attack by blocking any of the stages, while the crooks have to succeed at all of them. You gain the upper hand if you have multiple layers of defence.

PS. Sophos Home is 100% free for Windows and Mac.

Sophos detection names for these threats are as follows:Troj/DocDl-ZGE for the document that does the downloading, and Troj/Trikbot-GB or Troj/Trikbot-GC for the downloaded Trickbot files.


Source link

Tagged with:



Comments are closed.