Story image

New email spam campaign ditches traditional Office macro infection tactic

19 Feb 2018

Researchers at Trustwave’s SpiderLabs Blog have spotted a wave of spam emails that use Microsoft Office documents to download password stealers without having to activate Macros.

Often malware will hide in infected Microsoft Office documents commonly attached to spam emails. That malware will be disguised as a downloader that is launched if a victim allows Macros in a malicious document.

This is a common sight in spam delivered from the Necurs botnet, however a new sample has ditched the macro approach entirely and instead uses a Microsoft Office vulnerability to steal details from victims.

Researchers have been tracking an email spam campaign that uses a four-stage infection process to deliver attachments and then a password stealer.

That password stealer can also steal credentials from email clients, FTP and browser clients.

According to researchers, the spam campaign uses a number of different subject lines, often variations of the following:

  • TNT STATEMENT OF ACCOUNT – {random numbers}.
  • Request for Quotation (RFQ) - <{random numbers}>
  • Telex Transfer Notification
  • SWIFT COPY FOR BALANCE PAYMENT

Researchers explain:

“Word documents with Office 2007 Open XML Formats are based on XML and ZIP archive technologies. Anyone can easily manipulate data in a Word 2007 file programmatically or manually. As shown below, the DOCX attachment contains an embedded OLE object that has external references. This 'feature' allows external access to remote OLE objects to be referenced in the document.xml.rels.”

If a victim opens the document, it triggers the download and execution of a remote document file in the form of a rich text file (RTF).

The RFT exploits the MS Equation Editor Tool and in turn downloads a MSHTA command line that leads to a remote HTA file. That HTA file eventually leads to VBScript with obfuscated code, and a PowerShell script that runs a remote binary file.

The binary file then executes the password stealer malware.

The entire process draws on a Microsoft Office vulnerability discovered in July 2017. The vulnerability, CVE-2017-11882, affects multiple Microsoft Office platforms including Microsoft Office 200 7 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016.

Attackers can run arbitrary code by failing to properly handle objects in memory, also known as a Microsoft Office Memory Corruption vulnerability.

“It's pretty unusual to find so many stages and vectors being used to download malware,” researchers comment.

“This approach can be very risky for the malware author. If any one stage fails, it will have a domino effect on the whole process. Another noticeable point is that the attack uses file types (DOCX, RTF and HTA), that are not often blocked by email or network gateways unlike the more obvious scripting languages like VBS, JScript or WSF.”

Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Tech community rocked by deaths of Atta Elayyan and Syed Jahandad Ali
Both men were among the 50 killed in the shooting in Christchurch last Friday when a gunman opened fire at two mosques.
NZ ISPs block internet footage of Christchurch shootings
2degrees, Spark, Vodafone and Vocus are now blocking any website that shows footage of the mosque shootings.
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.