Low-Cost Crimeware Kit Gaining Popularity in Underground Markets

  /     /     /  
Publicated : 22/11/2024   Category : security


Low-Cost Crimeware Kit Gaining Popularity in Underground Markets


At $150 for a three-month subscription, Rubella Malware Builder presents a threat to enterprises, Flashpoint says.



When it comes to malware and cybercriminals, sometimes cheap and fast clearly trumps tested and sophisticated.
Thats the case with Rubella Macro Builder, a recently discovered crimeware kit that, despite being new and relatively unsophisticated, has been gaining popularity among cybercriminals - including members of the suspected Russian gang behind the Panda banking malware.
Security vendor Flashpoint, which issued an advisory on the threat this week, described Rubella as enabling criminals to generate Microsoft Word (.doc) and Microsoft Excel (.xls) payloads
.
  The Rubella-generated malware acts as a first-stage loader for other subsequent malware downloads and installations on targeted machines, says Vitali Kremez, director of research for Flashpoint.
Since it surfaced in February, Rubella Macro Builder has been used as a first-stage loader in one of the most recent Panda campaigns. The group behind the distribution appears to have targeted victims through various social media platforms and through webinjects, Flashpoint says.
Flashpoint identified Rubella malware infection leading to the execution of the Panda banking malware version 2.6.6 and Gootkit banking malware, Kremez says. Panda and Gootkit are designed to harvest credentials, infect browsers through webinjects and enable remote PC access via a hidden virtual network-computing module, he says.
When it first surfaced in February, the authors of the Rubella crimeware kit priced it at a relatively low $500 per month. Since then, prices for the kit have dropped even further to just around $150 for a three-month subscription even as it has acquired several new capabilities, according to FlashPoint.
The Rubella crimeware kit currently includes support for XOR and Base64 encryption algorithms, PowerShell, Microsoft.XMLHTTP, and Bitsadmin download methods and multiple payload execution options including Visual Basic Script and JavaScript.
Rubella Macro Builder does not exploit any security vulnerabilities. Rather, it relies on social engineering techniques to force victims to enable malicious macro execution to run it, Kremez says. It is typically distributed to intended victims via Microsoft Word or Excel email attachments during spam campaigns. It comes with some rudimentary but nevertheless effective obfuscation methods for bypassing basic AV tools.
The macro builder has a clear appeal for cybercriminals: it’s cheap, fast, and can defeat basic static anti-virus detection, Kremez says.
Rubella is somewhat similar to ThreadKit, a more advanced malware kit that researchers at Proofpoint discovered last October and
described
in an alert in March. ThreadKit, like Rubella is a Microsoft Office document exploit builder, but packs more features, including a mechanism for reporting infection statistics back to the operators of the malware.
ThreadKit has been used quite extensively to spread numerous malware payloads including Trickbot and remote access Trojans like Loki Bot and FormBook. One well-known crime group that has been using the kit is the Cobalt Gang, a threat actor associated with various ATM heists.
Microsoft Office macro-based malware appears to still be threat actors preferred method for obtaining initial access to compromised machines, Flashpoint said in its advisory. Microsoft Office-based loader malware like Rubella work well as an intial decoy because they look like commonly exchanged Word and Excel documents and attachments.
According to the security vendor, Rubella Macro Builder represents a moderate threat for enterpises given its ability to beat static AV tools and its low pricing model. To mitigate their exposure to the threat, organizations should pay attention to email messages with suspicious Word or Excel attachments, especially those that ask permission to Enable Content for running macros, FlashPoint said.
Related Content:
Microsoft Office Docs New Vessel for Loki Malware
Fileless Malware: Not Just a Threat, but a Super-Threat
5 Email Security Tips to Combat Macro-Enabled Ransomware
Join Dark Reading LIVE for an intensive Security Pro Summit at Interop ITX and learn from the industry’s most knowledgeable IT security experts. Check out the agenda 
here
.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Low-Cost Crimeware Kit Gaining Popularity in Underground Markets