XWorm Malware Exploits Follina Vulnerability in New Wave of Attacks

0
378
XWorm Malware Exploits Follina Vulnerability in New Wave of Attacks


May 12, 2023Ravie LakshmananCyber Threat / Malware

XWorm Malware Exploits Follina Vulnerability in New Wave of Attacks

Cybersecurity researchers have found an ongoing phishing marketing campaign that makes use of a novel assault chain to ship the XWorm malware on focused programs.

Securonix, which is monitoring the exercise cluster below the title MEME#4CHAN, stated a number of the assaults have primarily focused manufacturing corporations and healthcare clinics positioned in Germany.

“The assault marketing campaign has been leveraging moderately uncommon meme-filled PowerShell code, adopted by a closely obfuscated XWorm payload to contaminate its victims,” safety researchers Den Iuzvyk, Tim Peck, and Oleg Kolesnikov stated in a brand new evaluation shared with The Hacker News.

The report builds on latest findings from Elastic Security Labs, which revealed the risk actor’s reservation-themed lures to deceive victims into opening malicious paperwork able to delivering XWorm and Agent Tesla payloads.

Cybersecurity

The assaults start with phishing assaults to distribute decoy Microsoft Word paperwork that, as an alternative of utilizing macros, weaponize the Follina vulnerability (CVE-2022-30190, CVSS rating: 7.8) to drop an obfuscated PowerShell script.

From there, the risk actors abuse the PowerShell script to bypass Antimalware Scan Interface (AMSI), disable Microsoft Defender, set up persistence, and in the end launch the .NET binary containing XWorm.

XWorm Malware

Interestingly, one of many variables within the PowerShell script is called “$CHOTAbheem,” which is probably going a reference to Chhota Bheem, an Indian animated comedy journey tv collection.

“Based on a fast examine, it seems that the person or group chargeable for the assault might have a Middle Eastern/Indian background, though the ultimate attribution has not but been confirmed,” the researchers informed The Hacker News, stating that such key phrases may be used as a canopy.

XWorm is a commodity malware that is marketed on the market on underground boards and comes with a variety of options that enables it to siphon delicate info from contaminated hosts.

UPCOMING WEBINAR

Learn to Stop Ransomware with Real-Time Protection

Join our webinar and learn to cease ransomware assaults of their tracks with real-time MFA and repair account safety.

Save My Seat!

The malware can also be a Swiss Army knife in that it could possibly carry out clipper, DDoS, and ransomware operations, unfold through USB, and drop further malware.

The actual origins of the risk actor are presently unclear, though Securonix stated the assault methodology shares artifacts much like that of TA558, which has been noticed hanging the hospitality trade previously.

“Though phishing emails hardly ever use Microsoft Office paperwork since Microsoft made the choice to disable macros by default, as we speak we’re seeing proof that it’s nonetheless vital to be vigilant about malicious doc information, particularly on this case the place there was no VBscript execution from macros,” the researchers stated.

Found this text attention-grabbing? Follow us on Twitter and LinkedIn to learn extra unique content material we submit.

LEAVE A REPLY

Please enter your comment!
Please enter your name here