The operators behind Dridex have a nefarious trick up their sleeves this holiday season: A widespread phishing scam promises victims a $100 Amazon gift card but instead delivers the prolific banking Trojan to target machines.
This campaign first appeared around Halloween and picked up in the beginning of November, the Cybereason Nocturnus team reports. Most targets are from the United States and Western Europe, where Amazon is very popular and people may be more likely to fall for a scam like this – especially at a time when online shopping and gift-giving is more prevalent due to COVID-19.
Victims receive an email that claims to be delivering a gift from Amazon: "We are delighted to enclose a $100 Amazon gift card as our way of saying Thank You," a sample message says. The researchers found most emails pretend to come from Amazon, though exact wording may vary.
This email prompts its recipient to download a gift card, which leads to Dridex infection through one of three different methods.
The first delivery vector is a malicious Word document with a variation of "gift card" in the file name. This file requests the victim click "enable content," which runs the macros. This is a common technique used in phishing attacks; embedded macros are usually disabled by default.
If a user enables content, an obfuscated VBScript file is executed. The macro itself contains an obfuscated, base64 encoded PowerShell script that opens a pop-up with a fake error message. This tricks the user into thinking there was an error while the macro runs in the background. The PowerShell connects to the command-and-control (C2) server and delivers the Dridex payload.
The second delivery vector involves screensaver (SCR) files, which are also popular among attackers. These enable criminals to bypass email filters solely based on file extension, as well as to bundle multiple components together, as SCR files are eventually self-executing archives.
"They can run and execute any type of code aside from the screensaver itself," explains Assaf Dahan, threat research lead at Cybereason. "So they have the potential of being malicious and they exploit this as well … to evade certain security products or email screening software."
In this campaign, the SCR files have convincing Amazon-themed icons and naming conventions, researchers point out in a writeup of their findings. One of the files contains a VBScript, an archive, a utility to extract it, and a batch file.
The third delivery method is a straightforward VBScript file that is downloaded via a malicious link in the email body. It's about 2MB in size due to an archive bundled with it, researchers say.
Dridex's use of these techniques isn't unusual, Dahan says. The tactics themselves have proved effective for years, and a variety of infections increases the likelihood of successful attacks.
"It's mainly the idea of not putting all your eggs in one basket," he explains. "If one technique gets picked up by a certain security product or email filter, they'll still have other options, so it doesn't burn out their entire operation."
Some corporate devices have security policies to block macros from being enabled, for example, and this would disrupt the first attack method.
An Unwelcome Holiday Surprise
Dridex is a notorious banking Trojan that has been active in different variants since 2012, the Cybereason team reports. It's an evasive malware that steals banking credentials and other sensitive data, with a resilient C2 infrastructure in which servers act as backups for one another.
Evil Corp, the attack group behind Dridex, makes a lot of money in attacks like these. While it's not directly stealing funds, it's obtaining access, credentials, and other valuable information it can sell on the Dark Web. Its scams cause great disruption for both people and businesses.
"When you have fraud there's a lot of collateral damage," Dahan notes. "It costs not only the victims, who may lose money or may lose sensitive information, but there's also the cost to companies that need to reimburse their customers or invest time and money and effort in investigations and mitigations."
The threat to corporate machines is high, he points out. Once Dridex lands on a device, it could steal intellectual property, administrator credentials, and other data that could escalate the attack from a commodity malware incident to a full-fledged hacking operation, Dahan says.
When asked how employees can protect themselves from the threat, his first advice is simple: "Just use common sense," he says. "There are no free gifts. If someone offers you a free gift, it's probably that they're up to no good." Victims should simply ignore or delete the email.
Skeptical recipients should check the sender's email; oftentimes in these attacks, the address will try to resemble the spoofed company's name but may contain typos or unnecessary characters. Look for grammatical errors or language that seems strange coming from Amazon or any major service provider, Dahan adds. If you do click a link and are prompted to enter credentials, close the page. Same advice applies to enabling macros.
"That's the last thing you should do," Dahan warns. "You should not enable that content because by enabling the content you will allow malicious code to run on your machine."Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio