Amazon Gift Card Scam Delivers Dridex This Holiday Season

  /     /     /  
Publicated : 23/11/2024   Category : security


Amazon Gift Card Scam Delivers Dridex This Holiday Season


Dridex operators launch a social engineering scam that promises victims a $100 gift card but delivers a banking Trojan.



The operators behind Dridex have a nefarious trick up their sleeves this holiday season: A widespread phishing scam promises victims a $100 Amazon gift card but instead delivers the prolific banking Trojan to target machines.
This campaign first appeared around Halloween and picked up in the beginning of November, the Cybereason Nocturnus team reports. Most targets are from the United States and Western Europe, where Amazon is very popular and people may be more likely to fall for a scam like this – especially at a time when online shopping and gift-giving is more prevalent due to COVID-19. 
Victims receive an email that claims to be delivering a gift from Amazon: We are delighted to enclose a $100 Amazon gift card as our way of saying Thank You, a sample message says. The researchers found most emails pretend to come from Amazon, though exact wording may vary.
This email prompts its recipient to download a gift card, which leads to Dridex infection through one of three different methods. 
The first delivery vector is a malicious Word document with a variation of gift card in the file name. This file requests the victim click enable content, which runs the macros. This is a common technique used in phishing attacks; embedded macros are usually disabled by default. 
If a user enables content, an obfuscated VBScript file is executed. The macro itself contains an obfuscated, base64 encoded PowerShell script that opens a pop-up with a fake error message. This tricks the user into thinking there was an error while the macro runs in the background. The PowerShell connects to the command-and-control (C2) server and delivers the Dridex payload.
The second delivery vector involves screensaver (SCR) files, which are also popular among attackers. These enable criminals to bypass email filters solely based on file extension, as well as to bundle multiple components together, as SCR files are eventually self-executing archives. 
They can run and execute any type of code aside from the screensaver itself, explains Assaf Dahan, threat research lead at Cybereason. So they have the potential of being malicious and they exploit this as well … to evade certain security products or email screening software.
In this campaign, the SCR files have convincing Amazon-themed icons and naming conventions, researchers point out in a
writeup of their findings
. One of the files contains a VBScript, an archive, a utility to extract it, and a batch file. 
The third delivery method is a straightforward VBScript file that is downloaded via a malicious link in the email body. Its about 2MB in size due to an archive bundled with it, researchers say.
Dridexs use of these techniques isnt unusual, Dahan says. The tactics themselves have proved effective for years, and a variety of infections increases the likelihood of successful attacks.
Its mainly the idea of not putting all your eggs in one basket, he explains. If one technique gets picked up by a certain security product or email filter, theyll still have other options, so it doesnt burn out their entire operation.
Some corporate devices have security policies to block macros from being enabled, for example, and this would disrupt the first attack method.
An Unwelcome Holiday Surprise
Dridex is a notorious banking Trojan that has been active in different variants since 2012, the Cybereason team reports. Its an evasive malware that steals banking credentials and other sensitive data, with a resilient C2 infrastructure in which servers act as backups for one another.
Evil Corp, the attack group behind Dridex, makes a lot of money in attacks like these. While its not directly stealing funds, its obtaining access, credentials, and other valuable information it can sell on the Dark Web. Its scams cause great disruption for both people and businesses. 
When you have fraud theres a lot of collateral damage, Dahan notes. It costs not only the victims, who may lose money or may lose sensitive information, but theres also the cost to companies that need to reimburse their customers or invest time and money and effort in investigations and mitigations.
The threat to corporate machines is high, he points out. Once Dridex lands on a device, it could steal intellectual property, administrator credentials, and other data that could escalate the attack from a commodity malware incident to a full-fledged hacking operation, Dahan says.
When asked how employees can protect themselves from the threat, his first advice is simple: Just use common sense, he says. There are no free gifts. If someone offers you a free gift, its probably that theyre up to no good. Victims should simply ignore or delete the email.
Skeptical recipients should check the senders email; oftentimes in these attacks, the address will try to resemble the spoofed companys name but may contain typos or unnecessary characters. Look for grammatical errors or language that seems strange coming from Amazon or any major service provider, Dahan adds. If you do click a link and are prompted to enter credentials, close the page. Same advice applies to enabling macros. 
Thats the last thing you should do, Dahan warns. You should not enable that content because by enabling the content you will allow malicious code to run on your machine. 

Last News

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Amazon Gift Card Scam Delivers Dridex This Holiday Season