Microsoft has warned organizations of a “unique” attack campaign from IcedID malware that abuses contact forms published on websites to deliver malicious links to businesses via emails containing fake legal threats, in what’s yet another instance of adversaries abusing legitimate infrastructure to mount evasive campaigns that bypass security protections.

“The emails instruct recipients to click a link to review supposed evidence behind their allegations, but are instead led to the download of IcedID, an info-stealing malware,” the company’s threat intelligence team said in a write-up published last Friday.

IceID is a Windows-based banking trojan that’s used for reconnaissance and exfiltration of banking credentials, alongside features that allow it to connect to a remote command-and-control (C2) server to deploy additional payloads such as ransomware and malware capable of performing hands-on-keyboard attacks, stealing credentials, and moving laterally across affected networks.
Microsoft researchers said the attackers might have used an automated tool to deliver the emails by abusing the enterprises’ contact forms while circumventing CAPTCHA protections. The emails themselves employ legal threats to intimidate victims, claiming that the recipients “allegedly used their images or illustrations without their consent and that legal action will be taken against them.”
By invoking a sense of urgency, the idea is to lead the victim into revealing sensitive information, click a sketchy link, or open a malicious file. In this infection chain, it’s a link to a sites.google.com page, which requires users to sign in with their Google credentials, following which a ZIP archive file is automatically downloaded.
The ZIP file contains a heavily obfuscated JavaScript file that downloads the IcedID malware. What’s more, the malicious code has the capacity to download secondary implants like Cobalt Strike, potentially putting affected victims at further risk.
The novel intrusion route notwithstanding, the attacks are yet another sign of how threat actors constantly tweak their social engineering tactics to target companies with an intent to distribute malware while evading detection.” The scenarios […] offer a serious glimpse into how sophisticated attackers’ techniques have grown while maintaining the goal of delivering dangerous malware payloads such as IcedID,” the researchers said. “Their use of submission forms is notable because the emails don’t have the typical marks of malicious messages and are seemingly legitimate.”

Article Provided By: Hacker News
Liquid Video Technologies Logo, zero trust, Security, Video Surveillance, Greenville South Carolina, IcedID Malware

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access ControlFire, IT consultant, or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com.