Just in:
Big Four Accounting Firm EY Makes Blockchain Play for Streamlined Contracts // On Its 100 Years Anniversary, LUX Aims to Change Feminine Identity With ‘In Her Name’ // Rich Correll’s “Hollywood’s Icons of Darkness” Passes 2000 Collectors Item Mark // House of Streams, Presented by SHRIMP.co (Stream House Media Productions Ltd.), Premieres as an Original Reality Series in Spring 2024 // Putien at Galaxy Macau Marks Anniversary with Culinary Extravagant Showcase Featuring Authentic Fujian Delicacies by Six-hands Awarded Chefs // Abu Dhabi Police on High Alert for Potential Weather Disruptions // Embracing TradeTech: UAE Paves the Path for a Sustainable, Accessible Trading Future // Coffee that Cares: 7CAFÉ Marks Earth Day With the New Limited-Edition Pistachio Flavoured Cereal Oat Milk Coffee and Enjoy Bring Your Own Cup Buy One Get One Free Offer on All 7CAFÉ Drinks // KL Home Care Commits To Excellence Professional Maid Services For The Residents Of Hong Kong // Expanding Media Landscape: WAM and BRICS TV Forge Content-Sharing Pact // I’m still learning how to answer this question. In the meantime, try Google Search. // Andertoons by Mark Anderson for Thu, 18 Apr 2024 // Political Upheaval in India as BJP Leader Kidnapped in Arunachal Pradesh // Alaska Air Grounded Briefly Due to System Issue // Electric Cars Get Refueled, Not Charged: Obrist HyperHybrid Ready for Production // DFA Hong Kong Young Design Talent Award 2024 // Dubai Anticipates Rise in Water Consumption // Moomoo and Nasdaq Announce Global Strategic Partnership // Bitcoin Halving: Bitcoin Nears Block Reward Reduction // Zayed International Airport Maintains Normal Operations //

This 'highly personalized' malware campaign targets retailers with phony customer queries

1481475424 email used to deliver august malware

istock-cyber-spy.jpg

August remains undetected while stealing data.


Image: iStock

Cybercriminals are using personalized malware campaigns against staff at retailers in order to steal credentials and sensitive documents.

A group known as TA530, is distributing the information stealing malicious software through socially engineered emails which encourage victims to download an attachment containing the relatively new ‘August’ malware (lines in the malware’s code as well as the control panel for stolen credentials all refer to the month).

ADVERTISEMENT

Cybersecurity researchers at Proofpoint have been monitoring the August campaign and say the lures used in the subject lines of emails make reference to purchases the hackers claim to have made on the targeted company’s website, asking the targeted victim to provide support for a false purchase.

Subject lines are personalized using the target’s company name, with false queries relating to topics including erroneous or duplicate charges, items vanishing from the online cart and help with orders, while the text of the email points the victim towards a document supposedly containing more information.

The Word document requires the user to enable macros and using similar sandbox evasion techniques as the Ursnif banking Trojan, the enabled macro will deliver a payload to infect the machine.

email-used-to-deliver-august-malware.png

An example of an email attempting to deliver August


Image: Proofpoint

Once installed, August will steal and upload files, take money from crytocurrency wallets, grab user login credentials by monitoring applications and web browsers and more, with files and information uploaded to a command and control server.

All of this occurs while August is capable of remaining undetected by the infected users thanks to evasion techniques and a fileless approach to loading the malware via PowerShell and a byte array hosted on a remote site. All of these factors result in August being difficult to detect at any point during the operation.

Those behind the scheme are mostly targeting retailers and manufacturers with large business-to-consumer sales operations, although researchers warn that August could be used to steal credentials and files “in a wide range of scenarios”. The TA530 group has previously carried out phishing campaigns against company executives using similar methods.

As email lures and phishing campaigns become more effective one simple form of protection against August – and other malware which require macros to operation – is to not enable macros. Proofpoint researchers also recommend user education to address emails which may not initially look suspicious.

Read more on cybercrime

(via PCMag)

ADVERTISEMENT

ADVERTISEMENT
Just in:
Dubai Anticipates Rise in Water Consumption // A Bridge Between Deserts and Rainforests: UAE and Costa Rica Forge Economic Ties // Arup and WWF to establish Nature-based Solutions standards for Hong Kong’s rural development // Crypto Exchange Seeks Indian Return After Regulatory Hurdles // Bitcoin Halving: Bitcoin Nears Block Reward Reduction // KL Home Care Commits To Excellence Professional Maid Services For The Residents Of Hong Kong // Andertoons by Mark Anderson for Thu, 18 Apr 2024 // Schneider Electric introduces new household EV charger ‘Schneider Charge’ – Offering HK$6,980 exclusive deal for the first 100 customers // Abu Dhabi Police on High Alert for Potential Weather Disruptions // On Its 100 Years Anniversary, LUX Aims to Change Feminine Identity With ‘In Her Name’ // Travelers Advised to Confirm Flights Before Heading to Dubai Airport’s Terminal 1 // Alaska Air Grounded Briefly Due to System Issue // Zayed International Airport Maintains Normal Operations // DFA Hong Kong Young Design Talent Award 2024 // QuickHR Honours Women Leaders with the Annual Woman of Excellence Award // Electric Cars Get Refueled, Not Charged: Obrist HyperHybrid Ready for Production // Malaysian traders to access the dynamically evolving Octa trading ecosystem // Putien at Galaxy Macau Marks Anniversary with Culinary Extravagant Showcase Featuring Authentic Fujian Delicacies by Six-hands Awarded Chefs // Expanding Media Landscape: WAM and BRICS TV Forge Content-Sharing Pact // Sanctuary for Sea Life: Al Yasat Marine Protected Area Flourishes //