US restaurants targeted with fileless malware
Morphisec researchers have spotted another attack campaign using fileless malware that is believed to be mounted by the infamous FIN7 hacking group. The goal of the campaign is to gain control of the target businesses’ systems, install a backdoor, and through it perform continual exfiltration of financial information.
“Like past attacks, the initial infection vector is a malicious Word document attached to a phishing email that is well-tailored to the targeted business and its day-to-day operations,” the researchers noted.
“The Word document executes a fileless attack that uses DNS queries to deliver the next shellcode stage (Meterpreter). However, in this new variant, all the DNS activity is initiated and executed solely from memory – unlike previous attacks which used PowerShell commands.”
The researchers attribute this one important change to the group’s efforts to stay one step ahead of the defenders, and they are succeeding:
- The booby-trapped RTF documents don’t get flagged by AV solutions
- The emails are believable enough to trick employees into downloading and opening the file AND exiting Protected View
- The JavaScript code contained in the document bypasses security solutions’ behavior analysis by delaying the execution of malicious code, as well as making it so that the second stage JavaScript is not directly executed by the first stage JavaScript
- The second stage JavaScript triggers a first stage PowerShell process that then performs a second stage PowerShell process, which then injects shellcode into its own process
- That shellcode compiles next stage (encrypted) shellcode directly from memory, from snippets obtained through DNS queries.
“After decryption of the second stage shellcode, the shellcode deletes the ‘MZ’ prefix from within a very important part of the shellcode. This prefix indicates it may be a DLL, and its deletion helps the attack to evade memory scanning solutions,” the researchers found.
“If this DLL was saved on disk, many security solutions would immediately identify it as a CobaltStrike Meterpreter, which is used by many attackers and pen testers.”
But it’s not, and it passes undetected.
Fileless malware is the future
In-memory resident attacks and the use of fileless malware are on the rise, and FIN7 is one group that has been employing this approach regularly.
There can be no doubt other attackers will try to implement the same tactic.
FIN7 has previously been tied to a sophisticated spear-phishing campaign hitting US-based businesses with emails purportedly coming from the US Securities and Exchange Commission (SEC), and Morphisec researchers believe that the series of attacks leveraged against 140+ banks and other businesses earlier this year is also their work.
FIN7 is also associated with the infamous Carbanak gang, but whether they are one and the same it’s still impossible to say for sure.