Keeping It Real Can Pay Off for Old-School Attacks

  /     /     /  
Publicated : 23/11/2024   Category : security


Keeping It Real Can Pay Off for Old-School Attacks


Even a previously known attack can fool the security team if it is well crafted.



In the security arena, much of the effort a team will expend centers around the continual process of identifying and understanding the details of the methodology employed by the novel attacks that keep showing up.
This effort happens at such a rapid pace, it may be disconcerting to the security team to be forced by some situation to realize how well a previously known attack can succeed if it is well-crafted in all aspects.
Not clicking on unknown attachments (so as to give malware permission to run) is a classic security homily. But what if the user doesnt realize that the attachment is an unknown one and thinks that it is legitimate? Its called social engineering.
Social engineering is the method that malware authors use to conceal from the user what it is that they are actually going to be doing when they perform an action. Social engineering has as its goal giving the user the permission they need to go ahead and do something. This aspect of an attack can be the paramount factor in its outcome, eclipsing any other methodology that may be simultaneously used.
Some recent news from Proofpoint
brings this into focus. It found threat actors in late October 2019 who were trying to pull off one of the oldest attack vectors around, that of a poisoned Word attachment that is just waiting to start installing malware. The user has to open it, of course.
The emails that were used as a lure purported to originate with the German Federal Ministry of Finance. They were targeted at IT service companies. The document itself promised a large tax refund, if only the user would open the attached refund request form. The attachment would, instead of getting the business money, go out and install the Maze ransomware on the victims computer. Some variants attempted to load the Crowdstrike backdoor as the payload.
This campaign used similar sender email addresses in the lure to those that would be normally used by the Ministry. This attention to detail in the social engineering shows its importance to the attack, how necessary it can be to make everything appear to be legitimate.
The same actor used a different lure document in an Italian campaign occurring in late October, where the lure was supposed to be from the Italian Ministry of Taxation. Besides once again taking over a brand, the actors again found Ministry-similar domains to front as sender email addresses.
Proofpoint says that it saw a consistent set of TTPs (Tactics, Techniques and Procedures) that allows attribution of these campaigns to a single actor with high confidence.
Finally, the actor tried their luck in the US in November. Proofpoint observed thousands of emails attempting to deliver malicious Microsoft Word attachments with English lures, this time impersonating the United States Postal Service (USPS) and distributing the IcedID banking Trojan. The emails seemed to be directed at the healthcare vertical.
Its not new or complicated. Its not flashy. But even a simple attack can work if it has been done right.
— Larry Loeb has written for many of the last centurys major dead tree computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Last News

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Keeping It Real Can Pay Off for Old-School Attacks