Security News New Technique Recycles Exploit Chain to Keep Antivirus Silent

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Forum Veteran
Feb 4, 2016
2,516
15,625
3,578
53
Germany / Poland
In a new malware campaign, cybercriminals modified a known exploit chain to push Agent Tesla info stealer without triggering detection from common antivirus products.
Cybercriminals set up an infrastructure to deliver multiple malware families via two public exploits for Microsoft Word vulnerabilities CVE-2017-0199 and CVE-2017-11882.

Built to drop a hale of malware

According to analysts from Cisco Talos, the campaign intended to drop at least three payloads: Agent Tesla, Loki, and Gamarue. All of them are capable to steal information and of the three, only Loki lacks remote access features.

The attack starts with an email containing a Word document (DOCX) that includes routines for downloading and opening an RTF file, which delivers the final payload. It is this RTF that passes unnoticed.

"Only two out of 58 antivirus programs found anything suspicious. The programs that flagged this sample were only warning about a wrongly formatted RTF file. AhnLab-V3 marked it for 'RTF/Malform-A.Gen,' while Zoner said it was likely flagged for 'RTFBadVersion'," the researchers write in a report today.
 
So Talos researchers only tested static signatures and after that they come with the conclusion that this technique kept antivirus in silence, is that right?

I am not trying to defend antivirus vendors, but I dont like fearmongering like this, I know that this technique is somewhat nasty, but the "conclusion" is misleading.

How about behavior blockers? Did the payload actually executed in machines protected by "old" gen antivirus solutions? And if positive, was it caught by advanced modules?

Anyway Microsoft really needs to build versions of Office and Windows 10 without all that vulnerability stuff that home users dont use or need.