Article Details
Scrape Timestamp (UTC): 2024-04-15 20:35:59.716
Original Article Text
Click to Toggle View
New SteganoAmor attacks use steganography to target 320 orgs globally. A new campaign conducted by the TA558 hacking group is concealing malicious code inside images using steganography to deliver various malware tools onto targeted systems. Steganography is the technique of hiding data inside seemingly innocuous files to make them undetectable by users and security products. TA558 is a threat actor that has been active since 2018, known for targeting hospitality and tourism organizations worldwide, focusing on Latin America. The group's latest campaign, dubbed "SteganoAmor" due to the extensive use of steganography, was uncovered by Positive Technologies. The researchers identified over 320 attacks in this campaign that affected various sectors and countries. SteganoAmor attacks The attacks begin with malicious emails containing seemingly innocuous document attachments (Excel and Word files) that exploit the CVE-2017-11882 flaw, a commonly targeted Microsoft Office Equation Editor vulnerability fixed in 2017. The emails are sent from compromised SMTP servers to minimize the chances of the messages getting blocked as they come from legitimate domains. If an old version of Microsoft Office is installed, the exploit will download a Visual Basic Script (VBS) from the legitimate 'paste upon opening the file. ee' service. This script is then executed to fetch an image file (JPG) containing a base-64 encoded payload. PowerShell code inside the script contained in the image downloads the final payload hidden inside a text file in the form of a reversed base64-encoded executable. Positive Technologies has observed several variants of the attack chain, delivering a diverse array of malware families, including: The final payloads and malicious scripts are often stored in legitimate cloud services like Google Drive, taking advantage of their good reputation to evade getting flagged by AV tools. Stolen information is sent to compromised legitimate FTP servers used as command and control (C2) infrastructure to make the traffic appear normal. Positive Technologies discovered over 320 attacks, most focused in Latin American countries, but the targeting scope extends worldwide. Using a seven-year bug in TA558's attack chain makes it fairly easy to defend against SteganoAmor, as updating Microsoft Office to a more recent version would render these attacks ineffective. A complete list of the indicators of compromise (IoCs) is available at the bottom of the report.
Daily Brief Summary
TA558 hacking group employs steganography, embedding malicious code in images to distribute malware.
Over 320 organizations worldwide, especially in the hospitality and tourism sectors, targeted by the SteganoAmor campaign.
Attacks initiate through malicious emails exploiting the CVE-2017-11882 vulnerability in Microsoft Office, reliant on outdated system versions.
Malicious payload disguised within legitimate-looking document attachments and images, fetched using compromised legitimate services like Google Drive.
Positive Technologies identifies a diverse array of malware delivered through these tactics, posing severe security risks.
The use of legitimate cloud and FTP services to host malware and control servers helps avoid detection by traditional antivirus tools.
Updating Microsoft Office can significantly mitigate the threat by closing the exploited security vulnerability.