{"id":82966,"date":"2016-05-30T15:03:13","date_gmt":"2016-05-30T09:33:13","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=82966"},"modified":"2016-06-06T15:09:18","modified_gmt":"2016-06-06T09:39:18","slug":"infostealer-campaign-detected-in-the-wild","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/infostealer-campaign-detected-in-the-wild\/","title":{"rendered":"Infostealer Campaign detected in the wild"},"content":{"rendered":"<p>Quick Heal Threat Research Lab has recently observed an active cybercrime campaign designed to steal user info. The campaign has been noticed to make use of three keyloggers (malicious software that records information entered by a user on their computer keyboard) iSpy logger, Predator logger and Knight Logger. These software are easily available on the Internet and can be used for keylogging, stealing passwords and capturing screenshots.<\/p>\n<p>In May 2016, Quick Heal detected an attack related to this campaign, on the computers of multiple users. The attack uses spear phishing emails with attachments of malicious Microsoft Office documents (RTF). These documents are loaded with codes that exploit the CVE-RTF-2012-0158 vulnerability. When the receiver opens any of these RTF documents, a keylogger component is dropped on the computer, which then does rest of the job.<\/p>\n<p><strong>Infection Vector<br \/>\n<\/strong>The user receives an email about the arrival of a shipment. The email carries a malicious attachment containing the code to exploit the CVE-RTF-2012-0158 vulnerability. Once the document is opened, one of the software (iSpy, Predator, Knight Logger) is dropped on the victim\u2019s computer.<\/p>\n<p>Below is what the email looks like.<\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/DHL_email.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82977\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/DHL_email.jpg\" alt=\"DHL_email\" width=\"881\" height=\"431\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/DHL_email.jpg 1094w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/DHL_email-300x147.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/DHL_email-1024x501.jpg 1024w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/DHL_email-789x386.jpg 789w\" sizes=\"(max-width: 881px) 100vw, 881px\" \/><\/a><\/p>\n<p><strong>Download this PDF to read the full report<\/strong><\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Infostealer_Campaign_Report.pdf\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82869 alignnone\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/PDF-icon.png\" alt=\"PDF icon\" width=\"96\" height=\"97\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon.png 256w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-150x150.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-70x70.png 70w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-80x81.png 80w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-45x45.png 45w\" sizes=\"(max-width: 96px) 100vw, 96px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Security measures to take<\/strong><\/p>\n<ul>\n<li>Avoid clicking on links or downloading attachments in emails sent from unwanted, unexpected or unknown sources.<\/li>\n<li>Update your Operating system, and programs like Microsoft Office, Adobe Reader, Java, etc.<\/li>\n<li>Avoid saving passwords for email clients, online accounts in browsers and FTP servers.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #666666;\">ACKNOWLEDGEMENT<\/span><\/p>\n<p><strong>Subject Matter Expert<\/strong><\/p>\n<p>\u2022 Sagar Daundkar (Threat Research &amp; Response Team, Quick Heal)<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Heal Threat Research Lab has recently observed an active cybercrime campaign designed to steal user info. The campaign has been noticed to make use of three keyloggers (malicious software that records information entered by a user on their computer keyboard) iSpy logger, Predator logger and Knight Logger. These software are easily available on the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":82975,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,842],"tags":[1326,807],"class_list":["post-82966","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-privacy","tag-infostealer","tag-keyloggers"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82966"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=82966"}],"version-history":[{"count":6,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82966\/revisions"}],"predecessor-version":[{"id":83024,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82966\/revisions\/83024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/82975"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=82966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=82966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=82966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}