Attacks/Breaches

10/24/2016
05:15 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

New Kovter Trojan Variant Spreading Via Targeted Email Campaign

The authors of a malware sample that has been around for more than two years have yet another trick for distributing it.

The Kovter malware sample that has infected systems around the world for the past couple of years is proving to be a case study in how threat actors constantly tweak their malware to keep one step ahead of the defenders.

Trojan Kovter surfaced about two years ago as a screenlocker and scareware sample masquerading as a law enforcement tool. Since then it has been used in click-fraud and malvertising campaigns, as data-encrypting ransomware, and a malware installation tool.

Kovter’s authors have used a variety of ways to distribute the malware, to avoid detection, and to gain persistence on infected systems. For instance, Kovter is among the first file-less malware tools that resides only in memory and runs from the system registry rather than the disk to evade detection by file-based malware detection products. It also has been seen masquerading as Firefox and Chrome updates and as a JavaScript downloader.

This week, security firm Morphisec reported yet another tweak to the malicious software.  Over a period of four days last week, Morphisec said it identified multiple malicious macro-based documents delivering Kovter via targeted emails.

“Compared to the previous wave in July-August, where it was delivered as Chrome or Firefox update or as a zip file, this time it came as a macro with click-based activation documents,” says Michael Gorelik, vice presient of research and development at Morphisec.  “It was not enough to enable the macro content, the user needed to also click on the image inside the macro,” Gorelik said of a Kovter sample recovered from one of the company’s customers.

The new approach allows the malware to bypass security sandbox approaches that are based entirely on macro enablement alone. The macro writers also added a restriction password on image edit to prevent the sandbox from automatically mapping the macro procedures to be activated, Gorelik said in a technical analysis of the malware.

The modified macro with the click-based execution is not the only feature that’s new in the Kovter sample that Morphisec analyzed last week. In the latest attack, the threat actors behind the campaign also used highly targeted emails to try and lure users into interacting with the macro.

Examples of the targeting included the threat actors approaching potential victims using their actual names, job titles, and company names, Gorelik says.

“Monitoring the latest campaigns, we found the often-used 'invoice/bill' email pattern,” he said in the technical analysis of the malware.

The subject and content in many of the targeted emails purport to inform the victim about an invoice that is due or a payment that needs immediate attention. As with many spear-phishing campaigns, the content in the emails is designed to convey a sense of urgency and threats of dire consequences for failure to act.

Related stories

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10016
PUBLISHED: 2019-03-25
GForge Advanced Server 6.4.4 allows XSS via the commonsearch.php words parameter, as demonstrated by a snippet/search/?words= substring.
CVE-2019-10018
PUBLISHED: 2019-03-25
An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PostScriptFunction::exec at Function.cc for the psOpIdiv case.
CVE-2019-10019
PUBLISHED: 2019-03-25
An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PSOutputDev::checkPageSlice at PSOutputDev.cc for nStripes.
CVE-2019-10020
PUBLISHED: 2019-03-25
An issue was discovered in Xpdf 4.01.01. There is an FPE in the function Splash::scaleImageYuXu at Splash.cc for x Bresenham parameters.
CVE-2019-10021
PUBLISHED: 2019-03-25
An issue was discovered in Xpdf 4.01.01. There is an FPE in the function ImageStream::ImageStream at Stream.cc for nComps.