Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

12/24/2020
12:40 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Amazon Gift Card Scam Delivers Dridex This Holiday Season

Dridex operators launch a social engineering scam that promises victims a $100 gift card but delivers a banking Trojan.

The operators behind Dridex have a nefarious trick up their sleeves this holiday season: A widespread phishing scam promises victims a $100 Amazon gift card but instead delivers the prolific banking Trojan to target machines.

Related Content:

2020 Cybersecurity Holiday Gift Guide for Kids

How Data Breaches Affect the Enterprise

New From The Edge: Delivering Santa from Third-Party Risk

This campaign first appeared around Halloween and picked up in the beginning of November, the Cybereason Nocturnus team reports. Most targets are from the United States and Western Europe, where Amazon is very popular and people may be more likely to fall for a scam like this – especially at a time when online shopping and gift-giving is more prevalent due to COVID-19. 

Victims receive an email that claims to be delivering a gift from Amazon: "We are delighted to enclose a $100 Amazon gift card as our way of saying Thank You," a sample message says. The researchers found most emails pretend to come from Amazon, though exact wording may vary.

This email prompts its recipient to download a gift card, which leads to Dridex infection through one of three different methods. 

The first delivery vector is a malicious Word document with a variation of "gift card" in the file name. This file requests the victim click "enable content," which runs the macros. This is a common technique used in phishing attacks; embedded macros are usually disabled by default. 

If a user enables content, an obfuscated VBScript file is executed. The macro itself contains an obfuscated, base64 encoded PowerShell script that opens a pop-up with a fake error message. This tricks the user into thinking there was an error while the macro runs in the background. The PowerShell connects to the command-and-control (C2) server and delivers the Dridex payload.

The second delivery vector involves screensaver (SCR) files, which are also popular among attackers. These enable criminals to bypass email filters solely based on file extension, as well as to bundle multiple components together, as SCR files are eventually self-executing archives. 

"They can run and execute any type of code aside from the screensaver itself," explains Assaf Dahan, threat research lead at Cybereason. "So they have the potential of being malicious and they exploit this as well … to evade certain security products or email screening software."

In this campaign, the SCR files have convincing Amazon-themed icons and naming conventions, researchers point out in a writeup of their findings. One of the files contains a VBScript, an archive, a utility to extract it, and a batch file. 

The third delivery method is a straightforward VBScript file that is downloaded via a malicious link in the email body. It's about 2MB in size due to an archive bundled with it, researchers say.

Dridex's use of these techniques isn't unusual, Dahan says. The tactics themselves have proved effective for years, and a variety of infections increases the likelihood of successful attacks.

"It's mainly the idea of not putting all your eggs in one basket," he explains. "If one technique gets picked up by a certain security product or email filter, they'll still have other options, so it doesn't burn out their entire operation."

Some corporate devices have security policies to block macros from being enabled, for example, and this would disrupt the first attack method.

An Unwelcome Holiday Surprise
Dridex is a notorious banking Trojan that has been active in different variants since 2012, the Cybereason team reports. It's an evasive malware that steals banking credentials and other sensitive data, with a resilient C2 infrastructure in which servers act as backups for one another.

Evil Corp, the attack group behind Dridex, makes a lot of money in attacks like these. While it's not directly stealing funds, it's obtaining access, credentials, and other valuable information it can sell on the Dark Web. Its scams cause great disruption for both people and businesses. 

"When you have fraud there's a lot of collateral damage," Dahan notes. "It costs not only the victims, who may lose money or may lose sensitive information, but there's also the cost to companies that need to reimburse their customers or invest time and money and effort in investigations and mitigations."

The threat to corporate machines is high, he points out. Once Dridex lands on a device, it could steal intellectual property, administrator credentials, and other data that could escalate the attack from a commodity malware incident to a full-fledged hacking operation, Dahan says.

When asked how employees can protect themselves from the threat, his first advice is simple: "Just use common sense," he says. "There are no free gifts. If someone offers you a free gift, it's probably that they're up to no good." Victims should simply ignore or delete the email.

Skeptical recipients should check the sender's email; oftentimes in these attacks, the address will try to resemble the spoofed company's name but may contain typos or unnecessary characters. Look for grammatical errors or language that seems strange coming from Amazon or any major service provider, Dahan adds. If you do click a link and are prompted to enter credentials, close the page. Same advice applies to enabling macros. 

"That's the last thing you should do," Dahan warns. "You should not enable that content because by enabling the content you will allow malicious code to run on your machine." 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.