A new dropping the Quant Loader Trojan bypasses scanners and sandboxes.

When it comes to malware, email still reigns supreme as the delivery mechanism of choice. The reasoning is simple: It’s cheap, it’s easily spoofed, and recipients are accustomed to getting messages from various sources. That when a new attack is found, there’s a good possibility that it will spread successfully.

Researchers at Barracuda Networks found, through analyzing on its customer network, a new Quant Loader Trojan campaign using Samba shares as a mechanism – rather than the more common http:// protocol. The result could be a new wave of ransomware attempts, a new round of keystroke loggers, or worse.

The new campaign has similarities to the FlawedAmmyy RAT campaign identified by Proofpoint several weeks ago. In both campaigns, the file:// URL prefix is used to trigger a file download via either SMB protocol or Samba. According to Fleming Shi, senior vice president of advanced technology at Barracuda, this mechanism has several benefits to the attacker when compared to traditional Web downloads.

First, because the URL is malformed and doesn’t involve the http:// prefix, it isn’t flagged by many defense systems as malicious. “So when they actually analyzed the file, analyzed the behavior, they found it not malicious because the URL was not active,” Shi says. “At a later date they’ll activate the URL, do the secondary download, and launch the attack.”

Quant Loader itself is a Trojan that can be used to distribute a variety of malware payloads, including ransomware and password stealers. It is sold on underground forums and allows the user to configure the payload(s) upon infection using a management panel.

Stephen Boyer, CTO and co-founder of Bitsight, says that it’s no wonder that criminals are still using email as a primary attack vector for malware. “I can send you a message without any previous relationship, or knowledge, or authentication scheme,” he says. “So that’s that’s why it’s been so effective.”

In spite of the potential danger, email is still the most messaging form used by business, so there’s no real option that includes simply not looking at, opening, or responding to email.

This latest campaign has not limited itself to a single malware payload, Shi says, so it can’t be assumed to all be from a single source. In addition, he says there’s a characteristic of this campaign that made it especially interesting to researchers.

“We believe the sophistication in this is the ability to alter the packaging at a pretty rapid pace,” Shi says. “And also, this wasn’t just one day and they went away – they actually kept going.”

He says he and his team saw the campaign repeated over more than three weeks, with evidence of its evolution within that timeframe.

Unlike some recent malware outbreaks that have been geographically targeted, Shi says that this latest campaign has had targets all over the UK and North America. The one constant, he says, is English used as the language in the email, though that could easily be changed in future attacks.

Related Content:

Interop ITX 2018  -  7Bc4ea0bb7 059e 4ef6 a860 71a7f500d0da 7D InteropITX18 Logo HorizDates Color383 - New Email Campaign Employs Malicious URLs

Join Dark Reading LIVE for an intensive Pro Summit at Interop IT X and from the industry’s most knowledgeable IT security . Check out the agenda here.Register with Promo Code DR200 and save $200.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

More Insights



Source link

No tags for this post.

LEAVE A REPLY

Please enter your comment!
Please enter your name here