{"id":83484,"date":"2016-09-30T16:39:39","date_gmt":"2016-09-30T11:09:39","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=83484"},"modified":"2016-09-30T16:39:39","modified_gmt":"2016-09-30T11:09:39","slug":"hackers-launching-multiple-attacks-using-one-email","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/hackers-launching-multiple-attacks-using-one-email\/","title":{"rendered":"Hackers Launching Multiple Attacks using One Email"},"content":{"rendered":"<p>What makes cybercriminals more notorious is that they do not stay idle. They keep themselves busy in improving their game and formulating newer methods to trap their preys. A case in point is a recent observation made by Quick Heal Labs where attackers are using a new open source <a href=\"https:\/\/github.com\/theori-io\/cve-2016-0189\">exploit<\/a> called \u2018<a href=\"https:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0189\">CVE-2016-0189<\/a>\u2019 for Internet Explorer. In this malicious campaign, attackers are using exploits of Microsoft Office and Internet Explorer in a single email instead of multiple ones. This campaign was active in August 2016 and was found to be targeting some private organizations in India.<\/p>\n<p><strong>What is the reason behind using multiple exploits in one email?<\/strong><\/p>\n<p>To increase the success rate of exploitation and execution of the delivered malware on the victim\u2019s machine against security vulnerabilities present in Internet Explorer and Microsoft Office.<\/p>\n<p><strong>A mashup of different exploits to cause double damage<\/strong><\/p>\n<p>In this campaign, attackers combined an Internet Explorer exploit called \u2018CVE-2016-0189\u2019 with old Microsoft Office exploits called \u2018CVE-2012-0158\u2019 and \u2018<a href=\"https:\/\/blogs.quickheal.com\/new-cve-in-spammers-toolkit\/\" target=\"_blank\">CVE-2015-2545<\/a>\u2019. This was done for to increase the chances of a reliable execution of the malware.<\/p>\n<p><strong>How does this attack begin?<\/strong><\/p>\n<p>The victim receives an email containing HTML and RTF files as attachments (fig 1).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-83485 \" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/09\/Multiple-weapon-1.jpg\" alt=\"multiple-weapon-1\" width=\"777\" height=\"580\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/09\/Multiple-weapon-1.jpg 849w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/09\/Multiple-weapon-1-300x224.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/09\/Multiple-weapon-1-768x574.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/09\/Multiple-weapon-1-789x589.jpg 789w\" sizes=\"(max-width: 777px) 100vw, 777px\" \/><\/p>\n<p style=\"text-align: center\">Fig 1<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83486\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/09\/Multiple-weapon-2.jpg\" alt=\"multiple-weapon-2\" width=\"734\" height=\"632\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/09\/Multiple-weapon-2.jpg 734w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/09\/Multiple-weapon-2-300x258.jpg 300w\" sizes=\"(max-width: 734px) 100vw, 734px\" \/><\/p>\n<p style=\"text-align: center\">Fig 2<\/p>\n<p>If the receiver\u2019s computer has an unpatched (outdated) version of Microsoft Office or Internet Explorer, then opening the attached files exploit the vulnerabilities in these applications, downloading and executing the malware on the victim\u2019s machine.<\/p>\n<p>Both the RTF and HTML exploit download the malware payload from the same URL path.<\/p>\n<p>Some of the URLs used for downloading the malware are as follows:<\/p>\n<ul>\n<li>hxxp:\/\/www.pgathailand.com\/overnight[.]exe<\/li>\n<li>hxxp:\/\/maxcoffe.co\/famozsymboss[.]exe<\/li>\n<li>hxxp:\/\/ksmovement.pl\/ComCom[.]exe<\/li>\n<\/ul>\n<p>Quick Heal detects the downloaded malware as \u201c<strong>TrojanPWS.ZBot<\/strong>\u201d and \u201c<strong>Trojan.Dynamer<\/strong>\u201d. These are designed to steal sensitive information stored on the infected machine and they can also download and install other malware components.<\/p>\n<p><strong>Download the PDF file below for the technical analysis of this campaign<\/strong><\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/09\/Multiple_Weapons_in_Single_Mail_PDF.pdf\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-82869\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/PDF-icon.png\" alt=\"PDF icon\" width=\"84\" height=\"85\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon.png 256w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-150x150.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-70x70.png 70w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-80x81.png 80w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/PDF-icon-45x45.png 45w\" sizes=\"(max-width: 84px) 100vw, 84px\" \/><\/a><\/p>\n<p><strong>\u00a0How to stay safe against such attacks<\/strong><\/p>\n<ol>\n<li>Apply all recommended security updates for your computer\u2019s Operating System and all other programs such as Adobe, Java, Internet Browsers, etc.<\/li>\n<li>Do not click on links or download attachments that arrive in emails from unwanted or unexpected sources.<\/li>\n<li>Even if such emails seem to be from a known source, it is better to call up the sender and verify them first.<\/li>\n<li>Install an <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security\" target=\"_blank\">antivirus software<\/a> that gives has multilayered protection. It must have Email Security that can block fake, infected or phishing emails. And it should also have a strong Web Protection feature that can automatically block access to websites that could be infected with malware.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What makes cybercriminals more notorious is that they do not stay idle. They keep themselves busy in improving their game and formulating newer methods to trap their preys. A case in point is a recent observation made by Quick Heal Labs where attackers are using a new open source exploit called \u2018CVE-2016-0189\u2019 for Internet Explorer. [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":83488,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-83484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83484"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=83484"}],"version-history":[{"count":1,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83484\/revisions"}],"predecessor-version":[{"id":83489,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83484\/revisions\/83489"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/83488"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=83484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=83484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=83484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}