Trojanized TeamViewer Used in Targeted Attacks Against Multiple Embassies

  /     /     /  
Publicated : 23/11/2024   Category : security


Trojanized TeamViewer Used in Targeted Attacks Against Multiple Embassies


Motive remains unclear though financial theft appears to be one possibility, Check Point Research says.



A recent cyberattack campaign employed a weaponized version of TeamViewer and malware disguised as a top secret US government document to target officials in several embassies in Europe.
The malware, phishing documents, and other artifacts used in the attacks appear to all be the work of a single individual using the handle EvaPiks, whos been active in an illegal Russian-carding forum for some time. However, whats still not entirely clear is if the same individual is also solely carrying out the attacks as well, or if others are involved, according to researchers at Check Point Software Technologies who spotted the attacks.
According to our findings, we can tell that EvaPiks is behind the development of the entire infection chain, says Lotem Finkelsteen, threat intelligence group manager at Check Point.
But the type of victims being targeted, and the multiple-stage nature of the attacks, are more indicative of nation-sponsored actors or sophisticated cyber groups, he says.
Therefore, we wonder whether he joined others to carry [these] attacks, or he just tunneled others attack through his successful infection chain, using an attack-as-a-service model, Finkelsteen says.
Embassy officials from at least seven countries have been targeted so far—Italy, Kenya, Bermuda, Nepal, Guyana, Lebanon, and Liberia. In each instance, the targeted individuals appeared to have been carefully selected and were tied to government revenue related roles and the financial sector, suggesting a possible financial motive for the attack.
So far though, theres no evidence of the attacker attempting to gain access to any bank accounts belonging to the governments that have been targeted, Finkelsteen says. Espionage is another possible explanation for the attacks, but its hard to tell for sure if there are any geopolitical motives based solely on the list of countrys and victims targeted, he notes.
Military Financing Program
In each attack, the threat actors have sent targeted individuals an XLSM document containing malicious macros via email with the subject Military Financing Program.
The document itself is reasonably well-crafted, with a logo of the US Department of State on it and marked as top secret. But while EvaPiks appears to have put in some effort to make the document look authentic, he appears to have overlooked certain Cyrillic artifacts within that point to the source of the attack,
Check Point said
.
The macros - when enabled - extract two files from encoded cells within the XLSM document. One of them is a legitimate AutoHotkey (AHK) program. The other is a malicious version of AHK that connects to a command-and-control server and downloads and executes a malicious version of TeamViewer that allows the attacker to take remote control of the infected system.
The malicious TeamViewer can also download and execute other commands, including one for hiding the TeamViewer interface so the victim doesnt know its running, and another for saving session credentials to a text file.
Evolving Functionality
Check Point says its research shows that EvaPiks has been involved in previous campaigns where a weaponized version of TeamViewer was used to try and gain remote control of targeted systems. Over the course of these campaigns, the hacker has kept changing the functionality of the malicious TeamViewer DLL.
The first variant that Check Point analyzed had the ability to send some basic system information back to the attacker and to self-delete. A second version that surfaced in 2018 featured a new command system and a long list of banks, crypto markets, and ecommerce sites of interest to the attacker.
The third and current variant has added a DLL execution feature and uses external AutoHotKey scripts to gather information and session credentials, Check Point said.
Overall, the infection chain is not all that sophisticated. Even so, the attacker has succeeded in going under the radar and victimizing officials in key positions, Finkelsteen says. It means that you dont have to introduce an innovative attack in order to do a good job.
Related Content:
Who Gets Targeted Most in Cyberattack Campaigns
Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods
Microsoft Office: The Go-To Platform for Zero-Day Exploits
Real-World Threats That Trump Spectre & Meltdown
 
 
 
Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industrys most knowledgeable IT security experts. Check out the
Interop agenda
here.

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Trojanized TeamViewer Used in Targeted Attacks Against Multiple Embassies