Researchers at SentinelOne observed a new phishing campaign that targets organizations in Eastern European countries with the Remcos RAT malware by using an old Windows User Account Control bypass which was discovered over two years ago. Windows UAC is a protection mechanism that Microsoft introduced in Windows Vista, which asks the users to confirm before executing high-risk application. These phishing emails are sent from top-level domains that match the recipient's country and are usually masked as invoices, tender documentation, and other financial documents. The emails contain only what is required to point the recipient's attention to the attachment, a tar.lz archive containing the DBatLoader executable. However, the unusual format of the file reduces the chances of the victims clicking the link but also helps in evading detection from antivirus and email security tools. The first stage payload of the malware loader impersonates Microsoft Office, LibreOffice, or PDF document using double extensions and app icons to trick the victim into opening it. After launching the malware loader, a second-stage payload is fetched from a public cloud service, such as Microsoft OneDrive or Google Drive. Further, DBatLoader creates a Windows batch script to exploit a Windows UAC bypassing method before loading Remcos RAT, which uses a combination of DLL hijacking and mock trusted directories to bypass UAC and run malicious code without prompting the user. Some folders such as C:\Windows|System32\, are trusted by Windows, allowing executables to auto-elevate without displaying a UAC prompt, and a mock directory is a fake directory which has a trailing space. The problem is that some Windows programs like File Explorer, treat "C:\Windows" and "C:\Windows " as the same folder, and tricks the operating system into thinking the directory as trusted folder and have its files auto-elevate without a UAC prompt. The script used in this case creates mock trusted directories in the same way, creating a "C:\Windows \System32" folder and copies legitimate executables ("easinvoker.exe") and malicious DLLs ("netutils.dll") to it. In addition, easinvoker.exe is prone for DLL hijacking enabling the execution of the malicious netutls.dll in its context. The malware loader adds a malicious code ("KDECO.bat") which hides in the DLL Microsoft's Defender exclusion list and establishes persistence for Remcos by creating a new registry key. Then the Remcos is executed through process injection, configured with the ability to take screenshot and key logging capabilities.
Researchers at Mysterium VPN have identified 12,088,677 IP addresses serving publicly accessible .env-style files, exposing credentials and tokens at massive scale. The United Stat...
The job search process has become a new attack surface for software engineers, as Microsoft Defender Experts uncovered a coordinated campaign leveraging malicious repositories disg...
Online home improvement marketplace ManoMano has reportedly suffered a significant data breach impacting approximately 38 million users. Threat actors claim to have accessed and ex...