Article Details

Scrape Timestamp (UTC): 2024-04-08 08:39:29.111

Source: https://thehackernews.com/2024/04/cybercriminals-targeting-latin-america.html

Original Article Text

Click to Toggle View

Cybercriminals Targeting Latin America with Sophisticated Phishing Scheme. A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads to Windows systems. "The phishing email contained a ZIP file attachment that when extracted reveals an HTML file that leads to a malicious file download posing as an invoice," Trustwave SpiderLabs researcher Karla Agregado said. The email message, the company said, originates from an email address format that uses the domain "temporary[.]link" and has Roundcube Webmail listed as the User-Agent string. The HTML file points containing a link ("facturasmex[.]cloud") that displays an error message saying "this account has been suspended," but when visited from an IP address geolocated to Mexico, loads a CAPTCHA verification page that uses Cloudflare Turnstile. This step paves the way for a redirect to another domain from where a malicious RAR file is downloaded. The RAR archive comes with a PowerShell script that gathers system metadata as well as checks for the presence of antivirus software in the compromised machine. It also incorporates several Base64-encoded strings that are designed to run PHP scripts to determine the user's country and retrieve a ZIP file from Dropbox containing "many highly suspicious files." Trustwave said the campaign exhibits similarities with that of Horabot malware campaigns that have targeted Spanish-speaking users in Latin America in the past. "Understandably, from the threat actors' point of view, phishing campaigns always try different [approaches] to hide any malicious activity and avoid immediate detection," Agregado said. "Using newly created domains and making them accessible only in specific countries is another evasion technique. especially if the domain behaves differently depending on their target country." The development comes as Malwarebytes revealed a malvertising campaign targeting Microsoft Bing search users with bogus ads for NordVPN that lead to the distribution of a remote access trojan called SectopRAT (aka ArechClient) hosted on Dropbox via a phony website ("besthord-vpn[.]com"). "Malvertising continues to show how easy it is to surreptitiously install malware under the guise of popular software downloads," security researcher Jérôme Segura said. "Threat actors are able to roll out infrastructure quickly and easily to bypass many content filters." It also follows the discovery of a fake Java Access Bridge installer that serves as a conduit to deploy the open-source XMRig cryptocurrency miner, per SonicWall. The network security company said it also discovered a Golang malware that "uses multiple geographic checks and publicly available packages to screenshot the system before installing a root certificate to the Windows registry for HTTPS communications to the [command-and-control server]." Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.

Daily Brief Summary

CYBERCRIME // Phishing Campaign Hits Latin America with Malicious Payloads

Cybercriminals have launched a sophisticated phishing campaign specifically targeting the Latin American market, aiming to infect Windows systems.

The phishing email distributes a ZIP file that, when extracted, leads to the download of a RAR archive containing a malicious PowerShell script.

The script gathers system information and checks for antivirus software, using evasion techniques such as Base64-encoded PHP scripts and geographically restricted domains.

Trustwave researchers note similarities with previous Horabot malware attacks, with tactics that include using new domains and country-specific behavior to avoid detection.

Malwarebytes has reported a separate malvertising campaign using Microsoft Bing ads for a fake NordVPN to deliver the SectopRAT remote access trojan, highlighting the continued threat of malvertising.

SonicWall identifies additional threats, including a fake Java Access Bridge installer and a new Golang malware using unique geolocation checks and HTTPS command-and-control communications.

The report serves as a reminder of the evolving techniques used by threat actors to deploy malware and the importance of vigilant cybersecurity practices.