Počet zobrazení stránky

čtvrtek 15. března 2012

Malicious Email Campaign Uses Current Socio-Political Events as Lure for Targeted Attack


We have recently analyzed a series of emails sent to specific users that leverage a certain prominent socio-political issue.  One of these messages is about the supposed statement from the German Chancellor regarding the protests in Lhasa, Tibet.  The From field indicates that it came from a key officer from the ATC or Australian Tibet Council.  But of course, the email is faked and the email address was just created and used to impersonate the said ATC officer. It also includes a .DOC file that supposedly contains the relevant parts of the statement. Once downloaded, the file detected as TROJ_ARTIEF.AE exploits a vulnerability in Microsoft Word (CVE-2010-3333) to drop other files. This file is detected as TSPY_MARADE.AATSPY_MARADE.AA was found to gather network and system information once specific shell commands are executed. These stolen data are then uploaded to malicious sites.
Click for larger view
We received another sample with more details in its message. It purportedly comes from the Tibetan Women’s Association Central, which contains the recent speech given by TWA during the 56th Session of the Commission on the Status of Women at the United Nation Commission. Like the first sample, it comes with a .DOC file of the complete speech.  This attachment is detected as TROJ_ARTIEF.CP and drops the malware TROJ_REDOSDR.AH.
Click for larger view
Based on our analysis, we have reason to believe that these messages are part of a targeted attack.  Both samples use specific political issues as social engineering bait.  We also noticed that the people behind these attacks have a certain level of knowledge about the important figures and organizations in the TibetMovement.  The messages spoofed the organizations TWA Central and Australian Tibet Council to appear credible to intended recipients. This is a common technique used by spammers and those behind targeted attack campaigns and does not necessarily mean that these groups were compromised.  To add to our suspicions that this is a possible targeted attack, the TWA sample email was directed specifically to the email address of a prominent Tibetan figure.
Below is a list of email we intercepted with malicious attachments related to this incident. This list, however, is not definitive as there may be other variants yet to be seen.
Email SubjectAttachment File NameAttachment TypeAttachment Detection NameDropped File Detection Name
Germany Chancellor Again Comments on Lhasa protestsGermany Chancellor Again Comments on Lhasa Protests.doc.DOCTROJ_ARTIEF.SVTSPY_MARADE.AA
TWA’s speech in the meeting of the United Nations Commission for Human RightsTheSpeech.doc.DOCTROJ_ARTIEF.CPTROJ_REDOSDR.AH
Fowarding of TWA messageEnglish_Final_Statement.doc, English_Final_Statement_1.doc.DOCTROJ_ARTIEF.DA, TROJ_ARTIEF.DBTROJ_SWISYN.GT
Open Letter To President HuLetter.doc.DOCTROJ_ARTIEF.DDTSPY_ROFU.NSS
Tibetan environmental situations for the past 10 yearsTibetan environmental statistics.xls.XLSTROJ_MDROPPR.BJBKDR_MECIV.AC
An Urgent Appeal Co-signed by Three TibetansAppeal to Tibetans To Cease Self-Immolation.doc.DOCTROJ_ARTIEF.CXTROJ_SASFIS.UL
About TYC Centrex Notice and New email id of TYC CentrexCentrex_Contact.doc.DOCTROJ_ARTIEF.CZTROJ_SHWOM.A
[Tanc] JOINS US: March 10, Saturday: 53rd Commemoration of the 1959 Tibetan National Uprising Day.march10.doc.DOCTROJ_ARTIEF.DFTROJ_SHWOM.A
10th march speech10th March final.doc, 10th March final.pdf.DOC, .PDFTROJ_ARTIEF.CUBKDR_MECIV.AA, BKDR_MECIV.AD
FW: Call for End to BurningsSupport List.xls.XLSTROJ_MDROPPR.BKBKDR_PROTUX.BK, BKDR_PROTUX.BJ
Public Talk by the Dalai Lama _ Conference du Dala_ Lama Ottawa, Saturday, 28th April 2012Public Talk by the Dalai Lama.doc.DOCTROJ_ARTIEF.DGTROJ_SWISYN.GT
Bonafide Certificate of Miss Tenzin Tselhatentselha.zip (contains tentselha.jpg, tentselha.jpg.lnk, tentselha1.jpg)ZIP (containing LNK, EXE, JPG)TROJ_REDOSDR.AHTROJ_REDOSDR.AH
TWA mourns the self immolation deaths of two female protesters this past weekendTWA mourns the self immolation deaths of two female protesters.doc.DOCTROJ_ARTIEF.SM3TSPY_MARADE.AA, TSPY_ZBOT.BPG
Self-Immolations: New heightened form of Non Violent protests in TibetTWA looks back at the aftermath and the undercurrents of the 52 years of Chinese rule in Tibet.doc.DOCTROJ_ARTIEF.DHBKDR_AGENT.ZZZZ
Arrest and protests mar ‘Losar’ week in Tibet.emlan appealing letter to the United Nations.doc.DOCTROJ_ARTIEF.CWTROJ_SWISYN.HV
UN Human Rights Council publishes written statement on discrimination in Tibet.emlG1210456.doc.DOCTROJ_ARTIEF.CTTROJ_SWISYN.HV
Students For A Free Tibet !.emlAction Plan for March 10th.doc.DOCTROJ_ARTIEF.JDBKDR_DUOJEEN.A
The infection chain shown by the two samples above is noticeably similar to a previous attack that used NBA star Jeremy Lin as a social engineering hook. If you check out some of our blog postings on targeted attacks from way back in 2008 such as the ones we wrote about here and here, you will find similarities from past targeted attack campaigns of the same nature. Each scenario involves a malicious .DOC file that exploits a Microsoft Wordvulnerability to drop infostealing malware.
If you see any of these messages in your inbox, please delete them immediately. If you’ve already opened or downloaded the attached files, please coordinate with Trend Micro support team. As a rule, always be cautious with opening your email, especially with opening and downloading attachments. Even mail coming from supposedly trusted sources must be taken with a grain of salt as cybercriminals are crafty with spoofing email addresses to make it appear legitimate.
We will continue to monitor this campaign and update this blog post with our analysis.

Žádné komentáře:

Okomentovat