AI
AI

Polyglot Files Exploited to Distribute New Backdoor

Photo credit: www.csoonline.com

In addressing a recent inquiry, Proofpoint revealed that a fraudulent message took advantage of an established relationship between a compromised sender and their targets. This communication employed a business-to-business sales strategy, featuring a seemingly legitimate order form and company background information. The email included links that appeared to direct recipients to the official INDIC Electronics website, but they actually redirected users to a counterfeit domain named “indicelectronics[.]net.” This fraudulent site hosted a zip archive that claimed to contain an Excel spreadsheet and two PDF documents.

This deceptive tactic was sophisticated enough to potentially mislead even those with a critical view of unsolicited emails, as well as some cybersecurity defenses. While the file named with an XLS extension was presented as a spreadsheet, it was actually a LNK file with a double extension format (filename[.]xls[.]lnk). Additionally, the PDF files served as polyglots; one included an HTA (HTML Application) component, while the other was appended with a zip archive.

According to the report, the LNK file initiated cmd[.]exe, which subsequently triggered mshta[.]exe to process the PDF/HTA polyglot file. The mshta[.]exe tool navigates through the file, disregarding the PDF segment until it locates the HTA signature, leading it to execute the embedded script. This HTA script functions as a controller, instructing cmd[.]exe to extract the executable and the URL file from the second PDF. Ultimately, this executable is programmed to seek out the Sosano backdoor concealed within the zip archive.

Source
www.csoonline.com

Related by category

Google Warns of Increasing Enterprise-Specific Zero-Day Exploits

Photo credit: www.csoonline.com The Evolving Landscape of Mobile Security Vulnerabilities Recent...

Cybersecurity Leaders Condemn ‘Political Persecution’ of Chris Krebs in Letter to the President

Photo credit: www.csoonline.com In November 2018, President Trump appointed Chris...

Broadcom-Supported SAN Devices Vulnerable to Code Injection Attacks Due to Critical Fabric OS Flaw

Photo credit: www.csoonline.com Critical Vulnerability Found in Broadcom’s Brocade Fabric...

Latest news

Kolkata Hotel Fire Claims at Least 14 Lives, According to Police

Photo credit: www.cbsnews.com New Delhi — A devastating fire engulfed...

Raphinha Transforms from Unsung Hero to Ballon d’Or Contender for Barcelona

Photo credit: www.theguardian.com Raphinha: A Journey Through Missed Opportunities and...

An Existential Moment: Greens Challenge Reform for Disenchanted Voters

Photo credit: www.theguardian.com With its picturesque thatched cottages and rural...

Breaking news