XWorm Malware Exploits Follina Vulnerability in New Wave of Attacks

May 12, 2023Ravi LakshmananCyber ​​Threat/Malware

XWorm malware

Cybersecurity researchers have discovered an ongoing phishing campaign that utilizes a unique attack chain to deliver XWorm malware to targeted systems.

We track activity clusters under the name Securonix. Meme #4-chanSome of the attacks were primarily aimed at manufacturing companies and medical clinics located in Germany, according to the company.

“The attack campaign utilized some rather unusual meme-ridden PowerShell code, which was then used to infect victims with a highly obfuscated XWorm payload,” said security researcher Den Iuzvyk, Tim. Peck, Oleg Kolesnikov said in a new analysis shared with The Hacker News.

This report is based on recent research by Elastic Security Labs, in which reservation-themed threat actors lure malicious documents that can trick victims into delivering XWorm and Agent Tesla payloads. It became clear that the .

cyber security

Instead of using macros, this attack is a phishing distributing decoy Microsoft Word document that drops an obfuscated PowerShell script, weaponized with the Follina vulnerability (CVE-2022-30190, CVSS score: 7.8) Start with an attack.

From there, the attackers exploit PowerShell scripts to bypass the Anti-Malware Scanning Interface (AMSI), disable Microsoft Defender, establish persistence, and finally launch a .NET binary containing XWorm.

XWorm malware

Interestingly, one of the variables in the PowerShell script is named “$CHOTAbheem”, which is likely a reference to: Chota Beaman Indian animated comedy-adventure television series.

The researchers told HackerNews, “A quick look suggests that the individual or group involved in the attack may have a Middle Eastern or Indian background, but final attribution has yet to be confirmed. ‘ and pointed out that such keywords were included. It can also be used as a cover.

XWorm is a general-purpose malware advertised for sale on underground forums with extensive capabilities that allow it to siphon sensitive information from infected hosts.

upcoming webinars

Learn how to stop ransomware with real-time protection

Join our webinar to learn how to stop ransomware attacks using real-time MFA and service account protection.

Reserve your seat!

This malware is also a Swiss Army knife in that it can perform clipper, DDoS and ransomware operations, spread via USB and drop additional malware.

The exact origin of the threat actor is currently unknown, but Securonics said the attack technique contains artifacts similar to TA558, which has been observed to hit hospitality industries in the past.

“Since Microsoft made the decision to disable macros by default, Microsoft Office documents are rarely used in phishing emails, but today we have seen cases of malicious document files, especially VBscript execution, in this case. We still see evidence that it’s important to be vigilant, macro,” the researchers said.

Did you enjoy this article? Follow us twitter You can read more exclusive content we post on LinkedIn.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *