Home News Malware Exploits Microsoft’s e-Signature Verification to Target 2,000+ Victims in 111 Countries, and Counting

Malware Exploits Microsoft’s e-Signature Verification to Target 2,000+ Victims in 111 Countries, and Counting

by Khaleej Express
0 comment

Check Point Research (CPR) has seen a new malware campaign exploiting Microsoft’s digital signature verification to steal sensitive information of victims. Named ZLoader, the malware is a banking trojan that uses web injection to steal cookies, passwords, and any sensitive information. ZLoader has been known to deliver ransomware in the past and came unto CISA’s radar in September 2021 as a threat in the distribution of Conti ransomware. During the same month, Microsoft said ZLoader operators were buying Google keyword ads to distribute various malware strains, including Ryuk ransomware. Today, CPR is publishing a report that details the resurgence of ZLoader in a campaign that has taken over 2,000 victims in 111 countries. CPR has attributed the campaign to the cybercriminal group MalSmoke. 

Infection Chain

The attack begins with the installation of a legitimate remote management program   pretending to be a Java installation After this installation, the attacker has full access to the system and is able to upload/download files and also run scripts, so the attacker uploads and runs a few scripts that download more scripts that run mshta.exe with file appContast.dll as the parameterThe file appContast.dll is signed by Microsoft, even though more information has been added to the end of the fileThe added information downloads and runs the final Zloader payload, stealing user credentials and private information from victims

Victims
So far, CPR has documented 2170 unique victims. Most victims reside in the United States, followed by Canada and India. 

banner

Attribution
CPR believes that the cybercriminals behind the campaign are Malsmoke, given a few similarities with previous campaigns. 

Disclosure
CPR updated Microsoft and Atera of its findings. 

Kobi Eisenkraft, Malware Researcher at Check Point Software said, “People need to know that they can’t immediately trust a file’s digital signature. What we found was a new ZLoader campaign exploiting Microsoft’s digital signature verification to steal sensitive information from users. We first began seeing evidence of the new campaign around November 2021. The attackers, whom we attribute to MalSmoke, are after the theft of user credentials and private information from victims. So far, we’ve counted north of 2,000 victims in 111 countries and counting. All in all, it seems like the Zloader campaign authors put great effort into defense evasion and are still updating their methods on a weekly basis. I strongly urge users to apply Microsoft’s update for strict Authenticode verification, It is not applied by default”

Safety Tips

Apply Microsoft’s update for strict Authenticode verification. It is not applied by default.Do not install programs from unknown sources or sites.Do not press on links or open unfamiliar attachments that you get by mail.

Tagse-Signature Verification malware Microsoft Edit Post

You may also like

Leave a Comment

Soledad is the Best Newspaper and Magazine WordPress Theme with tons of options and demos ready to import. This theme is perfect for blogs and excellent for online stores, news, magazine or review sites.

Buy Soledad now!

Edtior's Picks

Latest Articles

u00a92022u00a0Soledad.u00a0All Right Reserved. Designed and Developed byu00a0Penci Design.