Cybercriminals Hide Malware Commands in Malicious Memes

Trend Micro security researchers have discovered a new piece of malware that receives commands via malicious memes its operators published on Twitter. 

The method used to conceal malicious commands is called steganographyand has long been abused by cybercriminals to hide malicious payloads inside files in order to evade security solutions. Several years ago, security researchers observed the technique being abused in exploit kitand malvertising campaigns.

The use of social media platforms such as Twitter to send commands to malware isn't new either. Malware that abuses such services has been aroundfor several years. 

As part of the newly analyzedattack, the actor published two memes (images that are humorous in nature) containing malicious commands on their Twitter account. The memes were published in late October, but the account had been created last year. 

The embedded command is parsed by the malware after the malicious meme is downloaded onto the victim's machine. Detected as TROJAN.MSIL.BERBOMTHUM.AA, the malware itself wasn't downloaded from Twitter, but managed to infect the victim's machine via an unknown mechanism.

The memes contained the "/print" command, which instructs the malware to take screenshots of the infected machine's desktop. The malware then sends the screenshots to a command and control (C&C) server address that it had obtained through a hard-coded URL on pastebin.com.

Once executed on an infected machine, the malware can download memes to extract and then execute the commands embedded inside. The URL address used in the attack is an internal or private IP address, which the security researchers believe is a temporary placeholder used by the attackers.

Based on the commands received via Twitter, the malware could capture the screen, retrieve a list of running processes, capture clipboard content, retrieve the username from infected machine, or retrieve filenames from a predefined path (such as desktop, %AppData% etc.), the security researchers reveal. 

Twitter has already suspended the account used in these attacks. 

"Users and businesses can consider adopting security solutions that can protect systems from various threats, such as malware that communicate with benign-looking images, through a cross-generational blend of threat defense techniques," Trend Micro concludes. 

RelatedSundown Exploit Kit Starts Using Steganography

RelatedAndroid Botnet Uses Twitter for Receiving Commands

Copyright 2010 Respective Author at Infosec Island

via Infosec Island Latest Articles http://bit.ly/2RuyT2S
RSS Feed

If New feed item from http://www.infosecisland.com/rss.html, then send m


Unsubscribe from these notifications or sign in to manage your Email Applets.

IFTTT

Comments

Popular posts from this blog

PowerCLI で VM 停止しないように CD/DVD ドライブからメディアを取り出してみる。

The best air conditioner

Lenovo’s Yoga 730 2-in-1 laptop has Alexa built in