Masslogger Trojan Upgraded to Steal All Your Outlook, Chrome Credentials

Technology

A credential stealer infamous for targeting Windows systems has resurfaced in a new phishing campaign that aims to steal credentials from Microsoft Outlook, Google Chrome, and instant messenger apps.

Primarily directed against users in Turkey, Latvia, and Italy starting mid-January, the attacks involve the use of MassLogger — a .NET-based malware with capabilities to hinder static analysis — building on similar campaigns undertaken by the same actor against users in Bulgaria, Lithuania, Hungary, Estonia, Romania, and Spain in September, October, and November 2020.

MassLogger was first spotted in the wild last April, but the presence of a new variant implies malware authors are constantly retooling their arsenal to evade detection and monetize them.

password auditor

“Although operations of the Masslogger trojan have been previously documented, we found the new campaign notable for using the compiled HTML file format to start the infection chain,” researchers with Cisco Talos said on Wednesday.

Masslogger

Compiled HTML (or .CHM) is a proprietary online help format developed by Microsoft that’s used to provide topic-based reference information.

The new wave of attacks commences with phishing messages containing “legitimate-looking” subject lines that appear to relate to a business.

One of the emails targeted at Turkish users had the subject “Domestic customer inquiry,” with the body of the message referencing an attached quote. In September, October and November, the emails took the form of a “memorandum of understanding,” urging the recipient to sign the document.

Masslogger

Regardless of the message theme, the attachments adhere to the same format: a RAR multi-volume filename extension (e.g., “70727_YK90054_Teknik_Cizimler.R09”) in a bid to bypass attempts to block RAR attachments using its default filename extension “.RAR.”

These attachments contain a single compiled HTML file that, when opened, displays the message “Customer service,” but in fact comes embedded with obfuscated JavaScript code to create an HTML page, which in turn contains a PowerShell downloader to connect to a legitimate server and fetch the loader ultimately responsible for launching the MassLogger payload.

Aside from exfiltrating the amassed data via SMTP, FTP or HTTP, the latest version of MassLogger (version 3.0.7563.31381) features functionality to pilfer credentials from Pidgin messenger client, Discord, NordVPN, Outlook, Thunderbird, Firefox, QQ Browser, and Chromium-based browsers such as Chrome, Edge, Opera, and Brave.

“Masslogger can be configured as a keylogger, but in this case, the actor has disabled this functionality,” the researchers noted, adding the threat actor installed a version of Masslogger control panel on the exfiltration server.

With the campaign almost entirely executed and present only in memory with the sole exception of the compiled HTML help file, the significance of conducting regular memory scans cannot be overstated enough.

“Users are advised to configure their systems for logging PowerShell events such as module loading and executed script blocks as they will show executed code in its deobfuscated format,” the researchers concluded.

Products You May Like

Articles You May Like

Stranger Things’ Finn Wolfhard Rebooting Cult-Classic ’90s Horror Movie With Ghostbusters Director
Sony WF-C510 Review: Best TWS Under Rs 5,000?
Steve Madden to slash China sourcing as Trump’s tariff plan looms
‘Shrinking’ Stars Explain That Surprising Louis, Alice and Brian Scene and ‘Storm’ That Comes Next
Here’s how much control the president has over the U.S. economy