Scams & Phishing News Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing

Practical Response

Level 8
Thread author
Mar 10, 2024
366
Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a stealer that targets crypto wallets.

The email messages come with Scalable Vector Graphics (SVG) file attachments that, when clicked, activate the infection sequence, Fortinet FortiGuard Labs said in a technical report.

The modus operandi is notable for the use of the BatCloak malware obfuscation engine and ScrubCrypt to deliver the malware in the form of obfuscated batch scripts.
 

Trident

Level 28
Verified
Top Poster
Well-known
Feb 7, 2023
1,742
The article seems to be very vague on details and presents the attack as one-click exploit.

However Symantec describes something different.
It seems like users would be presented with a download prompt and instructions how to proceed. They then need to unpack the archive and perform the initial execution.
March 04, 2024
Copy Link
A recent Guloader malspam campaign has been found to be smuggling malicious ZIPs inside of attached SVG files. These SVGs contain JavaScript code that, upon opening the file, generates a malicious ZIP that proceeds automatically display a download prompt. The ZIP file contains a WSF file which downloads the final infection payload.
Example Email Subjects:
  • INVOICE-INVOICE#RVBSA09SGSA
  • Payment Confirmation
  • Solicitud de Cotización #PO-SJ005182824013710
  • Please confirm Payment
Symantec protects you from this threat, identified by the following:
Email-based
  • Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
File-based
  • ISB.IcedID!gen2
  • Scr.Guloader!gen3
  • Scr.Malcode!gen
  • VBS.Downloader.Trojan

Additional resources:
 
Last edited:

Practical Response

Level 8
Thread author
Mar 10, 2024
366
And clickbait!
This is the best kind of clickbait because it doubles as a "learn from this" platform. It looks scary, designed even to be, but in reality, a simple "awareness" renders this most likely ineffective. If you combine "verifying" to that, most likely becomes almost non existent.
 
  • Hundred Points
Reactions: Trident

wat0114

Level 12
Verified
Top Poster
Well-known
Apr 5, 2021
576
However Symantec describes something different.
It seems like users would be presented with a download prompt and instructions how to proceed. They then need to unpack the archive and perform the initial execution.

Well this threat must be fooling enough dummies into following all the necessary steps for infection, otherwise it wouldn't be in circulation. And from Symantec's vantage point, they are using this to promote their own product:

Symantec protects you from this threat, identified by the following:
Email-based
  • Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
File-based
  • ISB.IcedID!gen2
  • Scr.Guloader!gen3
  • Scr.Malcode!gen
  • VBS.Downloader.Trojan
 

Trident

Level 28
Verified
Top Poster
Well-known
Feb 7, 2023
1,742
Well this threat must be fooling enough dummies into following all the necessary steps for infection, otherwise it wouldn't be in circulation. And from Symantec's vantage point, they are using this to promote their own product:
The article is not in their blog but in their coversge bulletin. There they explain briefly how new threats are covered. It’s normal to contain this info.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top