Article Details

Scrape Timestamp (UTC): 2024-04-16 13:40:07.443

Source: https://thehackernews.com/2024/04/ta558-hackers-weaponize-images-for-wide.html

Original Article Text

Click to Toggle View

TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks. The threat actor tracked as TA558 has been observed leveraging steganography as an obfuscation technique to deliver a wide range of malware such as Agent Tesla, FormBook, Remcos RAT, LokiBot, GuLoader, Snake Keylogger, and XWorm, among others. "The group made extensive use of steganography by sending VBSs, PowerShell code, as well as RTF documents with an embedded exploit, inside images and text files," Russian cybersecurity company Positive Technologies said in a Monday report. The campaign has been codenamed SteganoAmor for its reliance on steganography and the choice of file names such as greatloverstory.vbs and easytolove.vbs. A majority of the attacks have targeted industrial, services, public, electric power, and construction sectors in Latin American countries, although companies located in Russia, Romania, and Turkey have also been singled out. The development comes as TA558 has also been spotted deploying Venom RAT via phishing attacks aimed at enterprises located in Spain, Mexico, the United States, Colombia, Portugal, Brazil, Dominican Republic, and Argentina. It all starts with a phishing email containing a booby-trapped email Microsoft Excel attachment that exploits a now-patched security flaw in Equation Editor (CVE-2017-11882) to download a Visual Basic Script that, in turn, fetches the next-stage payload from paste[.]ee. The obfuscated malicious code takes care of downloading two images from an external URL that come embedded with a Base64-encoded component that ultimately retrieves and executes the Agent Tesla malware on the compromised host. Beyond Agent Tesla, other variants of the attack chain have led to an assortment of malware such as FormBook, GuLoader, LokiBot, Remcos RAT, Snake Keylogger, and XWorm, which are designed for remote access, data theft, and delivery of secondary payloads. The phishing emails are sent from legitimate-but-compromised SMTP servers to lend the messages a little credibility and minimize the chances of them getting blocked by email gateways. In addition, TA558 has been found to use infected FTP servers to stage the stolen data. The disclosure comes against the backdrop of a series of phishing attacks targeting government organizations in Russia, Belarus, Kazakhstan, Uzbekistan, Kyrgyzstan, Tajikistan, and Armenia with a malware dubbed LazyStealer to harvest credentials from Google Chrome. Positive Technologies is tracking the activity cluster under the name Lazy Koala in reference to the name of the user (joekoala), who is said to control the Telegram bots that receive the stolen data. That said, the victim geography and the malware artifacts indicate potential links to another hacking group tracked by Cisco Talos under the name YoroTrooper (aka SturgeonPhisher). "The group's main tool is a primitive stealer, whose protection helps to evade detection, slow down analysis, grab all the stolen data, and send it to Telegram, which has been gaining popularity with malicious actors by the year," security researcher Vladislav Lunin said. The findings also follow a wave of social engineering campaigns that are designed to propagate malware families like FatalRAT and SolarMarker. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.

Daily Brief Summary

MALWARE // TA558 Hackers Use Steganography in Malware Campaigns Across Sectors

TA558 utilizes steganography to hide and deliver malware including Agent Tesla, FormBook, and more through VBS, PowerShell, and RTF documents disguised within images.

The campaign, named SteganoAmor, specifically targets sectors like industry, services, and construction primarily in Latin American countries, with some attacks also observed in Russia, Romania, and Turkey.

Initial attack vectors include phishing emails with infected Microsoft Excel attachments exploiting a known vulnerability (CVE-2017-11882), leading to the download of a malicious Visual Basic Script.

The malware operation involves downloading images with embedded malicious code, which executes to deploy various payloads such as remote access tools and keyloggers.

Legitimate but compromised SMTP servers are used for sending phishing emails to avoid detection and blocking by email security gateways.

TA558 also leverages compromised FTP servers to host and manage stolen data.

The disclosure of these activities coincides with other unrelated phishing and malware campaigns targeting governmental bodies in various Eurasian countries.