IcedID Archives – Gridinsoft Blog Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Mon, 24 Jul 2023 12:42:38 +0000 en-US hourly 1 https://wordpress.org/?v=87682 200474804 Gozi and IcedID Trojans Spread via Malvertising https://gridinsoft.com/blogs/gozi-iceid-malvertising/ https://gridinsoft.com/blogs/gozi-iceid-malvertising/#respond Mon, 24 Jul 2023 12:18:32 +0000 https://gridinsoft.com/blogs/?p=16221 Malvertising on Google Search is an unpleasant occurrence where malicious ads appear in search engine results. These ads are meant to help users find relevant information. But unfortunately, some cybercriminals use paid advertisements to entice users to visit harmful websites and deceive them into downloading malicious software. How does malvertising work? Malvertising is an attack… Continue reading Gozi and IcedID Trojans Spread via Malvertising

The post Gozi and IcedID Trojans Spread via Malvertising appeared first on Gridinsoft Blog.

]]>
Malvertising on Google Search is an unpleasant occurrence where malicious ads appear in search engine results. These ads are meant to help users find relevant information. But unfortunately, some cybercriminals use paid advertisements to entice users to visit harmful websites and deceive them into downloading malicious software.

How does malvertising work?

Malvertising is an attack where malicious code is inserted into legitimate online advertising networks. This code usually leads users to harmful websites.

How does malvertising work?

Some malicious actors create fake websites that mimic legitimate software sites, using tactics like typosquatting (using misspelled versions of well-known brand and company names as their URL) or combosquatting (combining popular names with random words for their URL). This makes the fake sites appear legitimate to unsuspecting users, as their domain names reference the original software or vendor. The fake web pages are designed to look identical to the real ones, and the threat actors pay to promote the site through search engines to boost its visibility.
Fake WinRar ad on Google

Fake WinRar ad on Google search result
Fake WinRar ad on Google search result

Google has a vast user base, processing over 8 billion daily queries. This makes their search results one of the largest advertising networks available. Unfortunately, a single malicious ad can potentially be viewed by millions of people, causing thousands to click on it. The situation worsens exponentially when at least ten topics contain negative Google ads.

BatLoader as malware loader

BatLoader is a type of malware that enables cybercriminals to download more advanced and harmful malware onto a targeted system. The batch script can download two specific types of malware: IcedID, and Gozi/Ursnif, a backdoor.

It’s worth noting that the BatLoader campaign is still using malvertising, unlike IcedID. What’s particularly interesting is that there has been a shift in the type of users being targeted. While malicious ads previously targeted those searching for IT tools in late 2022 and early 2023, more recent campaigns now use AI-related lures to target users searching for devices such as Midjourney and ChatGPT.

IcedID Malware

IcedID (a.k.a BokBot) is a type of malware that was first discovered in 2017 and classified as both a banking Trojan and a remote access Trojan (RAT). Experts say IcedID is as powerful as other advanced banking Trojans like Zeus, Gozi, and Dridex. To infect a system, IcedID relies on other malware like Emotet to get initial access. Once it’s in, IcedID can steal financial information and even drop malware like ransomware. It’s also capable of moving through a network with ease.

IcedID Malware
Encrypted zip archives

The group called Shatak often sends phishing emails to spread malware called IcedID. They attach Microsoft Office documents with macros, .iso files, or encrypted .zip archives. Once the malware infects a system, it searches for the best way to spread and gain control. It does this by looking for a way to install itself without being detected and then waits for the system to reboot before activating its main module. By doing this, IcedID can blend in with legitimate processes, making it harder to detect.

Gozi backdoor/banking trojan

URSNIF, the malware known as Gozi that attempts to steal online banking credentials from victims’ Windows PCs, is evolving to support extortionware. This banking trojan has been around since the mid-2000s and is one of the oldest. It has multiple variants and has been known by names such as URSNIF, Gozi, and ISFB. These are the most effective methods for protecting yourself from attack: encountering other malware families, and its source code has been leaked twice since 2016. According to malware analysts, it is now considered a “set of related siblings” rather than a single malware family.

Malware Mitigation and Prevention

Detecting and mitigating malvertising attacks can be challenging, and both end users and publishers must take action to combat this threat. Implementing a comprehensive cybersecurity program at the enterprise level is the best way to protect against malvertising. Organizations can reduce their risk of falling victim to these attacks by taking appropriate precautions.

These are the most effective methods for protecting yourself from attack:

  • Antivirus software can protect certain types of threats, such as drive-by downloads or malicious code that malvertising may execute.
  • Ad blockers can provide adequate protection against malvertising since they block all ads and their potentially harmful components.
  • By updating your browser and plugins, you can prevent numerous malvertising attacks, especially the ones that occur before the user clicks on an advertisement.
  • It is recommended to prioritize critical systems and implement Zero Trust solutions whenever feasible.
  • Implementing multi-factor authentication for all essential services, particularly online banking and cryptocurrency accounts, is advisable.
  • It is recommended to conduct user awareness training to educate employees about phishing techniques. Additionally, it is advisable to establish standard operating procedures (SOPs) for dealing with suspicious emails and documents.

Knowing standard social engineering tactics like phishing and malspam techniques to detect malware attacks is essential. While network traffic analysis can help see known versions of malware after infection, developers frequently update their malware with new methods to evade detection. This makes reliably detecting malware infections difficult without advanced endpoint protection products.

The post Gozi and IcedID Trojans Spread via Malvertising appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/gozi-iceid-malvertising/feed/ 0 16221
PindOS JavaScript Dropper Distributes Bumblebee and IcedID Malware https://gridinsoft.com/blogs/pindos-javascript-dropper/ https://gridinsoft.com/blogs/pindos-javascript-dropper/#respond Wed, 28 Jun 2023 16:24:24 +0000 https://gridinsoft.com/blogs/?p=15594 Deep Instinct specialists spoke about a new JavaScript dropper called PindOS (such a “self-name” was found in the malware code and, based on slang signs, it can be assumed that it is of Russian origin). This malware is used to deliver additional payloads to infected systems, namely Bumblebee and IcedID. PindOS Dropper is Used to… Continue reading PindOS JavaScript Dropper Distributes Bumblebee and IcedID Malware

The post PindOS JavaScript Dropper Distributes Bumblebee and IcedID Malware appeared first on Gridinsoft Blog.

]]>
Deep Instinct specialists spoke about a new JavaScript dropper called PindOS (such a “self-name” was found in the malware code and, based on slang signs, it can be assumed that it is of Russian origin). This malware is used to deliver additional payloads to infected systems, namely Bumblebee and IcedID.

PindOS JavaScript Dropper code
Code of the dropper’s PE

PindOS Dropper is Used to Deliver Bumblebee and IceID

The researchers recall that Bumblebee and IcedID serve as downloaders, acting as a vector for other malware to enter compromised hosts (including ransomware). So, in a recent report by Proofpoint, it was reported that the developers of IcedID decided to abandon the functions of the banking Trojan that the malware previously had in order to fully focus only on malware delivery.

The campaigns used a variety of email attachments, such as Microsoft OneNote attachments, while URL attachments were quite rare, resulting in a forked variant of IcedID.Proofpoint researchers

In turn, Bumblebee replaced the BazarLoader, which was previously associated with the activity of the now defunct TrickBot and Conti hacker groups (for example, we reported about Conti gang shutdown, and about sanctions on TrickBot masters from UK and US governments.

Deep Instinct researchers write that they found comments in Russian in the PindOS source code, and believe that this indicates the likely development of partnerships between various criminal groups.

It is not yet clear if Bumblebee and IcedID carriers will use it. If the experiment proves successful for the operators of both of these malicious companions, PindOS could become a permanent tool in their arsenal and gain popularity among other attackers.analysts.

In general, experts describe PindOS as a “surprisingly simple” downloader designed to download malicious executable files from a remote server. The malware uses two URLs, one of which is a fallback one in case the first URL fails to get the DLL payload. As a result, DLLs are launched using rundll32.exe.

PindOS Dropper C2 call

PindOS Dropper C2 call
Examples of the command server calls performed by the PindOS dropper
The extracted payload is generated pseudo-randomly, on-demand, which leads to the creation of a new hash each time the payload is retrieved.the experts note.

The post PindOS JavaScript Dropper Distributes Bumblebee and IcedID Malware appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/pindos-javascript-dropper/feed/ 0 15594