IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

MirrorBlast phishing campaign targets financial companies

The attack has been linked to a long-standing Russian cyber crime group

A Russian cyber crime group has been targeting the financial sector with malware delivered by a familiar infection mechanism: Microsoft Office macros. 

Security company Morphisec identified the attack, dubbed MirrorBlast, which uses Microsoft Office macros to infect machines, a technique cyber criminals have used consistently over the years. 

The researchers analyzing the attack said it has been underway since September. It targets institutions in regions such as Canada, US, Hong Kong, and Europe. The researchers also saw similar activity in April. 

Morphisec tied the attack to TA505, a Russian cyber crime group that has been operating since 2014. The group often changes the malware it uses, according to the company.

The cyber crime gang uses phishing emails to mount the first phase of its attack. The initial email contains an Excel document that uses a macro. The macro, which can only run on 32-bit systems due to ActiveX compatibility issues, contains lightweight code designed to avoid detection. 

When run, the macro verifies an administrative account is running and then uses a Javascript command to start an installer program. This drops one of two malicious scripts. 

Related Resource

Prevent fraud and phishing attacks with DMARC

How to use domain-based message authentication, reporting, and conformance for email security

Prevent fraud and phishing attacks with DMARC - whitepaper from MimecastFree download

These send the machine's information to a command and control (C2) server, including the computer name, user name, and a list of running processes. The C2 server then responds with a code telling the software how to proceed. 

The attack also uses a Google feedproxy URL with a fraudulent message urging the user to access a SharePoint or Onedrive file. This helps the attackers evade detection, Morphisec said. 

Certain aspects of the attack have led researchers to attribute it to TA505. This includes the infection chain and installer script. It also uses similar domain names to other TA505 attacks and an MD5 hash that matches one used in another of the group's attacks.

Featured Resources

The state of Salesforce: Future of business

Three articles that look forward into the changing state of Salesforce and the future of business

Free Download

The mighty struggle to migrate SAP to the cloud may be over

A simplified and unified approach to delivering Enterprise Transformation in the cloud

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

The Total Economic Impact™ Of IBM FlashSystem

Cost savings and business benefits enabled by FlashSystem

Free Download

Recommended

Over 200,000 DrayTek routers vulnerable to total device takeover
Security

Over 200,000 DrayTek routers vulnerable to total device takeover

3 Aug 2022
Data on 69 million Neopets users stolen and listed for sale on hacker forum
Security

Data on 69 million Neopets users stolen and listed for sale on hacker forum

21 Jul 2022
HackerOne employee fired for using position to steal bug bounties
Security

HackerOne employee fired for using position to steal bug bounties

4 Jul 2022
LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022
Samsung proposes 11 Texas semiconductor plants worth $191 billion
Hardware

Samsung proposes 11 Texas semiconductor plants worth $191 billion

21 Jul 2022
Should you take your password manager off the internet?
Sponsored

Should you take your password manager off the internet?

28 Jul 2022