05-30-2018 , 11:59 PM
Quote:Trickbot, the banking Trojan that’s been around for a while, seems to be persistent and makes its appearance once again.
Recently, security researchers discovered a new spam email campaign in which cybercriminals have decided to target the large banking company, Lloyds Bank with a spoofing attack.
In this recent spam campaign, malicious actors lure victims into clicking on a malicious word document (received via email) that pretends to come from the legitime Lloyd Bank’s website, but actually being delivered from a look-a-like site.
The unwanted email has the following details (sanitized for your own protection):
From: Lloyds Bank <secure @ lloyds-se [.] com>
Subject line: Lloyds Bank Secure Exchange: New Message Received
Content:
< This is a Lloyds Bank secure, encrypted message.
Desktop Users:
Open the attachment (message_zdm.html) and follow the instructions.
Mobile Users:
Get the mobile application.
Disclaimer: This email and any attachments are confidential and for the sole use of the recipients. If you have received this email in error please notify the sender.
Email Security Powered by Voltage IBE >
Here’s how the fake email looks like:
How the infection works
If someone is convinced to click on the malicious attachment received, it download this: https: // lloyds-dl [.]com /AccountDocuments [.] docx , and the user will actually be redirected to download an RTF file using Microsoft Equation Editor vulnerabilities.
Attackers exploit the Microsoft Office Memory Corruption Vulnerability (CVE-2017-11882) by trying to remotely control a victim’s computer from another server controlled by them. If the victim opens the malicious RTF file, it will release an arbitrary code that launches an executable file from the remote server.
Then, it will download the Trickbot binary from here: http : / /rsaustria [.] com/soperos [.] bin which is a renamed .exe file. The malicious actors use C:\Users\username\AppData\Roaming\freenet\ for the file, module & config locations, said the security researchers. More technical details can be found here.
Heimdal Security proactively blocked these malicious domains, so all Heimdal PRO and Heimdal CORP users are protected.
According to VirusTotal, only 13 antivirus products out of 60 have managed to detect this spam email campaign at the time we write this security alert.
READ THE FULL ARTICLE:
HERE