Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Security

10:50 AM
Larry Loeb
Larry Loeb
Larry Loeb

Keeping It Real Can Pay Off for Old-School Attacks

Even a previously known attack can fool the security team if it is well crafted.

In the security arena, much of the effort a team will expend centers around the continual process of identifying and understanding the details of the methodology employed by the novel attacks that keep showing up.

This effort happens at such a rapid pace, it may be disconcerting to the security team to be forced by some situation to realize how well a previously known attack can succeed if it is well-crafted in all aspects.

Not clicking on unknown attachments (so as to give malware permission to run) is a classic security homily. But what if the user doesn't realize that the attachment is an unknown one and thinks that it is legitimate? It's called social engineering.

Social engineering is the method that malware authors use to conceal from the user what it is that they are actually going to be doing when they perform an action. Social engineering has as its goal giving the user the permission they need to go ahead and do something. This aspect of an attack can be the paramount factor in its outcome, eclipsing any other methodology that may be simultaneously used.

Some recent news from Proofpoint brings this into focus. It found threat actors in late October 2019 who were trying to pull off one of the oldest attack vectors around, that of a poisoned Word attachment that is just waiting to start installing malware. The user has to "open" it, of course.

The emails that were used as a lure purported to originate with the German Federal Ministry of Finance. They were targeted at IT service companies. The document itself promised a large tax refund, if only the user would open the attached refund request form. The attachment would, instead of getting the business money, go out and install the Maze ransomware on the victim's computer. Some variants attempted to load the Crowdstrike backdoor as the payload.

This campaign used similar sender email addresses in the lure to those that would be normally used by the Ministry. This attention to detail in the social engineering shows its importance to the attack, how necessary it can be to make everything appear to be legitimate.

The same actor used a different lure document in an Italian campaign occurring in late October, where the lure was supposed to be from the Italian Ministry of Taxation. Besides once again taking over a "brand," the actors again found Ministry-similar domains to front as sender email addresses.

Proofpoint says that it saw "a consistent set of TTPs (Tactics, Techniques and Procedures) that allows attribution of these campaigns to a single actor with high confidence."

Finally, the actor tried their luck in the US in November. Proofpoint observed "thousands of emails attempting to deliver malicious Microsoft Word attachments with English lures, this time impersonating the United States Postal Service (USPS) and distributing the IcedID banking Trojan." The emails seemed to be directed at the healthcare vertical.

It's not new or complicated. It's not flashy. But even a simple attack can work if it has been done right.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-09-27
An issue was discovered in Concrete CMS through 8.5.5. The Calendar is vulnerable to CSRF. ccm_token is not verified on the ccm/calendar/dialogs/event/add/save endpoint.
PUBLISHED: 2021-09-27
A SSRF issue was discovered in Concrete CMS through 8.5.5. Users can access forbidden files on their local network. A user with permissions to upload files from external sites can upload a URL that redirects to an internal resource of any file type. The redirect is followed and loads the contents of...
PUBLISHED: 2021-09-27
In Oppo's battery application, the third-party SDK provides the function of loading a third-party Provider, which can be used.
PUBLISHED: 2021-09-27
grav-plugin-admin is vulnerable to Improper Restriction of Rendered UI Layers or Frames
PUBLISHED: 2021-09-27
grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking