Original Article Text

Click to Toggle View

Windows SmartScreen flaw exploited to drop Phemedrone malware. A Phemedrone information-stealing malware campaign exploits a Microsoft Defender SmartScreen vulnerability (CVE-2023-36025) to bypass Windows security prompts when opening URL files. Phemedrone is a new open-source info-stealer malware that harvests data stored in web browsers, cryptocurrency wallets, and software like Discord, Steam, and Telegram. This data is then sent back to the attackers to be used in other malicious activities or to be sold to other threat actors. The Microsoft Defender flaw exploited in the Phemedrone campaign is CVE-2023-36025, which was fixed during the November 2023 Patch Tuesday, where it was marked as actively exploited in attacks. "The user would have to click on a specially crafted Internet Shortcut (.URL) or a hyperlink pointing to an Internet Shortcut file to be compromised by the attacker," explains the CVE-2023-36025 security bulletin. Not many details were initially shared about the exploitation of CVE-2023-36025 in the wild, but proof-of-concept exploits published shortly after elevated the risk for unpatched Windows systems. Trend Micro's researchers report that the Phemedrone campaign is not the only malware family they've seen targeting the particular flaw in Windows, with other cases involving ransomware. Bypassing SmartScreen The attackers host malicious URL files on trustworthy cloud services like Discord and FireTransfer.io and often disguise them using shortener services like shorturl.at. Usually, when opening URL files downloaded from the internet or sent via email, Windows SmartScreen will display a warning that opening the file could harm the computer. However, when the victim is tricked into opening one of the malicious URL files, they exploit the CVE-2023-36095 flaw in Windows SmartScreen so that this prompt is not shown and the command is executed automatically. The URL file downloads a control panel item (.cpl) file from the attacker's control server and executes it, launching a malicious DLL payload via rundll32.exe. The DLL is a PowerShell loader that fetches a ZIP file from a GitHub repository containing the second-stage loader masqueraded as a PDF file (Secure.pdf), a legitimate Windows binary (WerFaultSecure.exe), and 'wer.dll,' used in DLL side-loading and to establish persistence. Once launched on the compromised system, Phemedrone initializes its configuration, decrypts necessary items, and steals data from targeted applications, using Telegram for data exfiltration. Trend Micro reports that Phemedrone targets the following apps/data: Trend Micro has published the complete list of indicators of compromise (IoCs) for the newly observed Phemedrone campaign here.

Daily Brief Summary

MALWARE // Active Exploitation of Windows SmartScreen Flaw by Phemedrone Malware

A new information-stealing malware named Phemedrone has exploited a Microsoft Defender SmartScreen vulnerability, CVE-2023-36025, to avoid detection.

The malware campaign targets data from web browsers, cryptocurrency wallets, and various applications including Discord, Steam, and Telegram.

CVE-2023-36025 was patched in the November 2023 Patch Tuesday update, which was marked as an actively exploited vulnerability.

Attackers use trusted cloud services to host malicious URL files and bypass the usual Windows SmartScreen security prompts by exploiting the CVE-2023-36095 flaw.

The malicious URL downloads and executes a control panel item from the attacker's server, delivering a PowerShell loader which further installs the Phemedrone malware.

Phemedrone harvests sensitive data and uses Telegram for exfiltrating the gathered information.

Trend Micro, which reported on the malware's activities, has published indicators of compromise (IoCs) for organizations to detect and address the threat.