Royal Baby: Third in Line to the Throne, First in Line as a Threat Lure!
Posted by Jason Hill on 24 July 2013 03:57 PM
Following yesterday's news, the Duke and Duchess of Cambridge are now the proud parents of a baby boy and future heir to the British throne. While they revel in the joy of being a family, cyber-criminals have predictably been busy delivering various malicious campaigns in order to piggyback on the news. The Websense ThreatSeeker® Intelligence Cloud has been tracking malicious cyber-campaigns that started in the hours following the official announcement that the Duchess of Cambridge was in labor.
The campaigns detected so far are utilizing email lures, which either redirect unsuspecting victims to Blackhole Exploit Kit URLs or, indeed, provide malicious attachments in the form of Windows SCR files in an attempt to dupe users. These kinds of threats are often launched when topical or global news stories develop. We'll step through both current campaigns in order to relate them to our 7 Stages of Advanced Threats and will detail how they propagate, as well as illustrate that the kill chain leading to malicious content breaks if any one link breaks.
Email Lure: Links to Redirect URLs ...
A different campaign, using multiple lures containing malicious attachments has been detected in lower volumes with enticing subjects designed to pique interest and encourage victims to open the message:
In addition to varied but Royal Baby-themed subjects, the message bodies encourage victims to open the attached "image," although the file, itself, is a malicious binary used to contact command and control (C2) infrastructure and download further malicious payloads:
Email Lure: Malicious attachment ...
Should you receive any email news alerts or unsolicited messages regarding topical events, be sure that the message is legitimate before clicking any links or downloading any attachments. It is unlikely that reputable news agencies will send unsolicited email, and, therefore, any unexpected message should be treated with caution.
By their very nature, lures rely on human curiosity and our thirst for knowledge. In addition to needing an integrated security solution that is able to detect and protect against lures, be they delivered via social web or email, users need to also be educated to be wary of unsolicited links or messages and to consider visiting reputable news sites directly to gain the latest information.
Should users fall for the ScribbleLIVE/CNN lure, they are taken to intermediate websites that redirect victims to sites hosting exploit code, in this case the Blackhole Exploit Kit. The redirect sites, as is often the case, are legitimate websites that have been compromised or injected with malicious code that is hidden and obfuscated in order to abuse the compromised host site's reputation. Real-time analysis of these sites at the point-of-click provides immediate protection and can effectively break the chain before a victim is redirected to an exploit.
Another thing we see in these broad topical and global news campaigns is the use of common and accessible exploit kits, such as Blackhole, which allows the cyber-criminals to rapidly deploy their attack infrastructure and snare as many victims as possible. Once the exploit kit URL has been visited, the victim's machine is likely to be assessed for vulnerabilities that can be exploited in order to deliver malicious payloads. In this case, as well as delivering malware, such as Zeus, which is designed to pilfer financial information from victims, the site utilizes a social-engineering method to trick the victim into installing a fake Adobe Flash Player update:
Real-time analysis of web content and malicious payloads protects users from both known and unknown threats.
Should exploitation be successful, dropper and/or downloader files are used to install additional malicious payloads onto a victim's machine. In the campaigns detailed so far, one relies on the victim falling for the lure and then being redirected to an exploit site from which this would be delivered, while the other simply attaches a malicious file directly to the initial email lure. These files are often encrypted and packed to thwart detection by traditional signature-based solutions, and, therefore, require more advanced solutions to recognize malicious behavior, such as Websense ThreatScope™. Using the email attachment as an example, the ThreatScope™ Analysis Report nicely illustrates how the file sent requests to malicious hosts, as well as wrote further executable files to the local file system ...
Once a victim's machine has its malicious payload installed, it will attempt to "call home' and contact the C2 infrastructure to receive commands by those behind the campaign. Real-time detection of nefarious outbound communications, in lieu of a threat being caught at an earlier stage, can prevent this call home and prevent attackers from achieving their goals.
The exfiltration of data—be that personally identifiable information (PII) from an individual, company confidential data, or even a list of potential royal baby names—is often the attackers' endgame. Utilizing methods such as slowly "drip-feeding" data out of a compromised network or creating custom encryption routines to stay hidden, attackers attempt to steal data, which can then be used for further attacks or simply for criminal gain. Advanced data loss and theft prevention features, such as Drip DLP, OCR analysis, and the detection of custom encryption routines can be deployed to keep your data where it belongs and out of the hands of cyber-criminals.
Websense customers are protected by ACE, our Advanced Classification Engine, against emerging cyber-threats of this nature at multiple stages throughout the kill chain. While we await further official announcements regarding the Royal Baby, the Websense Security Labs™ team is monitoring developments and will post updates should further campaigns surface.
Read more »
Margaret Thatcher's Death Used in Cyber Attacks
Posted by uwang on 10 April 2013 08:09 AM
As the world remembers former British Prime Minister Margaret Thatcher, cyber attackers are participating too, but in their own tricky ways. Websense® Security Labs™ and the Websense ThreatSeeker® Intelligence Cloud have detected that attackers are sending malicious email spam with a topic referencing the death of Mrs. Thatcher. Actually, it is not new for an attacker to use a hot topic (like the death of Hugo Chavez) to spread malware. In this case, the lure email is very simple, with just a few words related to Mrs. Thatcher, but it pretends to be from your friends by using the "Re: Fwd:" notation. Internet-savvy customers will know that it looks suspicious and should not be tempted to click the link in the email.
When recipients click the malicious link, they are taken to a redirection page first, and then redirected to a Blackhole Exploit Kit landing page. The landing page detects the browser and plugin information in the client, and then serves the vulnerability file based on the plugin information. The final payload is a Cridex trojan, as seen in our ThreatScope™ report and in the VirusTotal report here. Cridex is known in breaking CAPTCHA codes and you can see this trojan in action on our previous blog here.
Server-side polymorphic technology has been applied to evade traditional AV detection.
It is not the first time we have seen the Blackhole malicious email campaign. It has evolved over time in combination with hot topics like the current crisis in Korea or major companies filing for bankruptcy. Please be careful about any email that contains 1 of the following subjects:
Fwd: Dollar Bank bankruptcy
Re: Shedding light on 'dark matter'
Re: Why Washington is corrupt
Re: Kissinger: Thatcher's strong beliefs
Re: Tax havens busted
Fwd: Re: First Citizens Bank bankruptcy
Fwd: Re: Living large in Don Draper's New York
Fwd: Re: Kissinger: Thatcher's strong beliefs
Re: Fwd: California Bank & Trust bankruptcy
Fwd: Re: Bank of America bankruptcy
Fwd: Allowing knives on planes is 'insane'
Fwd: Re: War with N. Korea
Fwd: Air Canada goes 'Gangnam style'
Fwd: Re: NASA plans to catch an asteroid
Re: Fwd: Dollar Bank bankruptcy
Fwd: Why Washington is corrupt
Fwd: Blast kills 29 on bus in New-York
Fwd: Shedding light on 'dark matter'
Fwd: Re: Marikana massacre aftermath
Re: Fwd: Kissinger: Thatcher's strong beliefs
Fwd: Re: PNC Bank bankruptcy
Re: Fwd: Bank Of The West bankruptcy
Re: Fwd: M&I Bank bankruptcy
Re: Bank Of The West bankruptcy
Fwd: Bank Of The West bankruptcy
Re: Fwd: PNC Bank bankruptcy
Re: Bank of America bankruptcy
Re: Fwd: War with N. Korea
Re: California Bank & Trust bankruptcy
Re: Blast kills 29 on bus in New-York
Re: Fwd: Blast kills 29 on bus in New-York
Re: Sending out SOS for 'America's flagship'
Re: Fwd: Marikana massacre aftermath
Re: Living large in Don Draper's New York
Re: War with N. Korea
Fwd: Re: Death penalty 'harms Bali's reputation'
Re: Fwd: Death penalty 'harms Bali's reputation'
Re: PNC Bank bankruptcy
Re: NASA plans to catch an asteroid
Re: Northern Trust Bank bankruptcy
Fwd: Tax havens busted
Re: Fwd: Why Washington is corrupt
Re: Fwd: Tax havens busted
Fwd: M&I Bank bankruptcy
Re: Fwd: Fashion designer Lilly Pulitzer dies
Re: First Citizens Bank bankruptcy
Re: Fwd: Shedding light on 'dark matter'
Re: Fwd: Living large in Don Draper's New York
Re: Fwd: Northern Trust Bank bankruptcy
Fwd: Re: California Bank & Trust bankruptcy
Re: Air Canada goes 'Gangnam style'
Re: Fashion designer Lilly Pulitzer dies
Re: Dollar Bank bankruptcy
Fwd: Sending out SOS for 'America's flagship'
Websense technologies can protect customers in a multi-stage attack:
Read more »