Zeus Trojan and MWI Exploit Kit Used Against Israeli Public Sector

Status
Not open for further replies.

Exterminator

Community Manager
Thread author
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
Security vendor interrupts hacking campaign targeting Israeli security firms, government agencies, and hospitals
Security experts have identified and isolated a series of attacks that were targeting the Israeli public sector. In this particular case, the hackers were using the MWI (Microsoft Word Intruder) exploit kit to deliver a modified version of the Zeus info-stealing trojan on infected PCs.

The discovery was made by Check Point security researchers after one of its high-profile clients submitted a suspicious RTF file for an in-depth analysis.

Apparently, the file in question arrived in the organization via spam email sent to multiple staff members, a few of which took the careless steps of downloading and opening the file.

RTF documents infected with the Microsoft Word Intruder kit
After Check Point's analysis, the file was found to be infected with the MWI exploit kit, a well-known package which specifically targets Word files on Windows PCs.

The exploit kit is quite complex, leveraging multiple known vulnerabilities, to deliver other more dangerous payloads on the infected user's PC. In this case, it was a slightly modified off-the-shelf variant of the Zeus trojan.

The Zeus trojan is a cyber-weapon developed to specifically target the corporate environment, and can steal browser passwords, banking credentials, and various other authentication details from its victims.

The C&C server was used to host multiple campaigns targeting Israeli agencies
The researchers were also able to track down the MWI kit's C&C server to a German IP address, and with the help of its ISP, investigate the server's content and logs.

Findings reveal that the server was used to manage and track several MWI-based campaigns, each in different stages of infections, and using different payloads, not just the Zeus trojan.

Analyzing the targeted IP addresses, researchers were also able to discover that over 49% of machines were from Israel.

While Check Point researchers say that "there are many reasons campaigns can end up with a lopsided geographical distribution of infection victims; that, alone, does not necessarily imply a 'targeted campaign' scenario." This was not the case.

Analyzing each of the Israeli IP addresses, researchers were able to discover that over 200 PCs in 15 different Israeli locations were targeted, belonging to various government agencies, hospitals, research agencies, and security firms.

This clearly was not just an accident, and the attackers were looking for specific information during this campaign.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top