Skip to main content

This phishing campaign delivers fake ransomware

 

EXECUTIVE SUMMARY:

Feint and punch? This ransomware fake-out might mean that your team will have to put up a good fight in order to avoid a flash knockdown…

Microsoft reports an active phishing campaign in which threat actors distribute a computer infection that spreads “fake ransomware”. The ransomware look-a-like involved is in fact trojan malware that can result in a full computer takeover.

In Windows systems, this malware offers hackers an easy backdoor entry point. Once in the system, passwords and other credentials can be harvested from both email clients and web browsers. The roster of user platforms at risk of compromise include Outlook, Internet Explorer, Firefox and Chrome.

The email campaign

First, emails purporting to contain payment-related information arrive in users’ inboxes. Then, users who open the emails and click on the attachment are immediately connected to a malicious domain. Ultimately, this leads to the download of the Java-based STRRAT malware.

This malware not only collects passwords, it can also log keystrokes, run remote commands and PowerShell and more. If so desired, hackers can usurp full control over infected computers. Victims and their files remain at the mercy of hackers.

Updated malware

The STRAAT threat has persisted for more than a year. Since the launch of the campaign, attackers have launched a beta version of their malware trojan. The latest malware is “notably more obfuscated and modular than previous versions,” say researchers.

In an effort to disguise the attack as a ransomware scheme, the malware includes a .crimson file name extension. Nonetheless, in the wake of the attack, users’ files are not actually encrypted.

Why the .crimson?

Cyber attackers aim to dupe victims with this. It could reflect an attempt to obscure the fact that the computer is infected with a remote access trojan.

As the STRRAT malware continues to make its way around the web, this phishing campaign may continue to evolve. These hackers are committed to their endeavors. Will hackers manipulate email accounts owned by victims in an effort to further disseminate the malware?

Avoiding this phishing attack

While anti-phishing software can protect systems, several other tactics may also prove worthy of pursuit in dodging this fake ransomware threat.

  • IT teams can inform employees to remain wary of unexpected messages, especially those mentioning monetary gain.
  • Organizations can advise caution in regards to opening emails from unknown email senders.
  • Phishing training isn’t a one-and-done deal. Consider offering flexible, regular workshops regarding phishing.

Comments

Popular posts from this blog

Applications and Threats Content Release Notes

  Threat Intelligence Report Top Attacks and Breaches The biochemical systems at an Oxford university research lab currently studying the Covid-19 pandemic has been  breached . Clinical research was not affected by the incident. Breached systems include machines used to prepare biochemical samples, and hackers are currently attempting to  sell  their access to those machines. Twitter has permanently  suspended  multiple accounts found to be part of four disinformation campaign networks, most likely operated by state-sponsored actors associated with Iran, Russia and Armenia. The Iranian infrastructure was previously used to disrupt the 2020 US presidential campaign discourse. Gmail accounts of global pro-Tibet organizations have been  targeted  by the Chinese APT TA413, an espionage group known for its operations against civil dissidents. The campaign leverages a customized malicious Mozilla Firefox browser extension to gain control over the victims’ Gmail accounts. Npower, a British ga

Cisco Releases Security Updates for Cisco ASA 5506-X, 5508-X, 5516-X and Firepower// Cisco Bug IDs: CSCvp36425

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note:  Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability. Cisco has rel

Site-to-site IPsec VPN with two FortiGates

In this example, you will allow transparent communication between two networks that are located behind different FortiGates at different offices using route-based IPsec VPN. The VPN will be created on both FortiGates by using the VPN Wizard's   Site to Site - FortiGate   template. In this example, one office will be referred to as HQ and the other will be referred to as Branch. 1. Configuring the HQ IPsec VPN On the HQ FortiGate, go to  VPN > IPsec Wizard . Select the  Site to Site  template, and select  FortiGate . In the  Authentication  step, set  IP Address  to the IP of the Branch FortiGate (in the example,  172.20.120.135 ). After you enter the gateway, an available interface will be assigned as the  Outgoing Interface . If you wish to use a different interface, select it from the drop-down menu. Set a secure  Pre-shared Key . In the  Policy & Routing  step, set the  Local Interface . The  Local Subnets  will be added automatically. Set  Remote