Wednesday, August 10, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Qakbot Attack Uses Email Threads Hijacked From ProxyLogon Compromises

Researcher by Researcher
July 30, 2022
in Cybersecurity
0
Microsoft to Block Macros by Default in Office Apps
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Attackers are using hijacked email threads, harvested in bulk from previous Microsoft ProxyLogon attacks, in order to send messages to victims that deliver the Qakbot malware.

The campaign utilizes a known tactic that researchers with Cisco Talos call external thread hijacking. Attackers first compromise third-party Exchange servers and exfiltrate their email threads for later use. At a later date, they then use a script to process these aggregated emails at bulk into spoofed responses to email contacts the victim had previously corresponded with, with links to malicious URLs that lead to the deployment of Qakbot.

“After parsing the emails they then seek to weaponize them, but don’t have access to the actual Exchange server that sent the messages initially, just copies of the emails from the ones that received them,” said Nate Pors, senior incident response commander with Cisco Talos. “In this case, they spoofed the addresses to make them appear to come from the original recipient.”

The QakBot campaign was observed as recently as June and coincides with a resurgence of Qakbot that researchers have observed over the past few months, with the malware in March spotted targeting enterprise organizations to infect them with a tangle of payloads. Researchers said due to ongoing investigations they can’t describe victimology; however, higher-value targets could include companies that have potentially strong or trusted relationships with their email contacts, which would make spoofed emails from the attacker seem more legitimate. Qakbot, which has been around since 2007 when it first emerged as a banking trojan, has since grown into a multi-purpose malware with multiple functionalities, including tools for performing reconnaissance, exfiltrating data and delivering other payloads. Qakbot’s modular nature gives it flexibility for keeping up with the changing threat landscape, allowing attackers to pick and choose the components needed for specifically tailored attacks.

Researchers assess that the hijacked email threads were likely stolen in an earlier campaign that targeted the ProxyLogon flaw in vulnerable Microsoft Exchange servers. The dates of the old emails matched the timeframe of the ProxyLogon exploitation campaign, and Pors said that researchers were able to match a public breach disclosure from one of the identified source organizations.

One red flag for spotting an external thread hijacking attack is if the email is from a spoofed, external sender address, even if the existing email thread looks familiar, said researchers. Another telltale sign is the use of old email threads that may be from 2021 or even 2020 (though Talos observed one email thread as recently as May 2022, indicating that attackers may be using newly harvested threads). Finally, researchers said to keep an eye out for emails with a “malformed” appearance, which may be partly legitimate but also coupled with malicious content or that contain partially scrubbed emails.

External thread hijacking shares similarities with email thread hijacking, where attackers use a single compromised organization’s emails to deliver their threat, as opposed to a bulk aggregation of multiple organizations’ harvested emails. External thread hijacking is advantageous to threat actors as it potentially increases the amount of threads to weaponize, said Pors along with Terryn Valikodath with Cisco Talos, in Wednesday research.

“This many-to-one approach is unique from what we have generally observed in the past and is likely an indirect effect of the widespread compromises and exfiltration of large volumes of email from 2020 and 2021,” said researchers.



Source link

Related articles

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022
Tags: attackCompromisesEmailhijackedProxyLogonQakbotThreads
Share76Tweet47

Related Posts

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
0

A former Twitter worker was found guilty on Tuesday of spying for Saudi officials keen to unmask critics on the...

How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022
0

Learn how to reset your Windows 10 password whether you use a Microsoft Account or a local account. Uh-oh, you’ve...

VMware Warns of Critical Authentication Bypass Flaw

Exploit Available for Critical VMware Bug CVE-2022-31656

August 9, 2022
0

The researcher who discovered two critical vulnerabilities in VMware ONE Workspace Access has released a proof-of-concept exploit for one of...

High-Severity Flaw in Argo CD is Information Leak Risk

Privya Emerges From Stealth With Data Privacy Code Scanning Platform

August 9, 2022
0

Privya emerged from stealth mode on Tuesday with a data privacy-focused code scanning platform and $6 million in seed funding....

How older security vulnerabilities continue to pose a threat

How older security vulnerabilities continue to pose a threat

August 9, 2022
0

Security flaws dating back more than 10 years are still around and still pose a risk of being freely exploited,...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022
Quantum networking: Defining the next wave of networking and communications

Quantum networking: Defining the next wave of networking and communications

August 9, 2022

Recent Posts

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp scams security Software TFT Threat vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved