Close

10th February 2019

Programmers Using Google Cloud Computing Platform To Deliver Targeted Malware Attacks through Weaponized PDF

Risk on-screen characters utilizing Google registering stage (GCP) to convey the malware through vindictive PDF documents. The assault focusing on governments and monetary firms around the world.

As indicated by Netskope Threat Research Labs distinguished the focused on dependent on its 42 clients examples and likely the assaults to be propelled by the notorious hacking bunch Cobalt Strike.

A year ago Cybercriminals mishandling genuine Google Cloud Storage administrations to have the pernicious payload and conveyed to trade off the association organizes through bypassing the security controls.

In this crusade aggressors utilized customary email Crafted in an approach to seem like a genuine one and conveys the malevolent PDF archive as a connection via the post office.

The PDF’s observed to be made with Adobe Acrobat and they contain HTTPS URL’s in a packed structure and all the imitations utilized in conveying the payload.

“The focused on assault is more persuading than the customary assaults and these assaults did by mishandling the GCP URL redirection in PDF fakes and diverting to the malignant URL facilitating the vindictive payload.”

Assailants mishandled the GoogleApp Engine URL and sidetracks the unfortunate casualty to download the malware facilitated locales, which makes the injured individual’s to be beleived that they are downloading from the confided in source.

URL Redirection – Google Cloud Computing

According to Netskope illustration on the decoy URL is accessed by the user, it logs out form appengine.google.com and generates a 302 status code of redirection.

once this action is triggered it redirects the user to google.com/logout?continue=, by using those redirection logic threat actors make the victim’s to reach the destination landing page and downloads Doc102018[.]doc to the victim machine.

Eventhough it is an unvalidated redirect GCP App Engine application successfully validated all the redirection and delivers the payload to victim’s machine.

Threat actors abused the Unvalidated Redirects and Forwards vulnerability with GCP App Engine and redirects victims to download the to a malicious appended URL hosting the malicious payload, reads netskope report.

The word document Doc102018.doc downloaded form https://transef[.]bizcontains macros that download the second stage of the payloads from https://transef[.]biz/fr.txt.

Downloaded txt document “fr[.]txt” exploits uses native windows application Microsoft Connection Manager Profile Installer to download and execute the payload, researchers call it a Squiblydoo technique.

“Based on our threat intelligence research, more than 20 other banking, government and financial institutions were targeted with the same attack via phishing emails sent by the attackers posing as legitimate customers of those institutions says netskope.”

Leave a Reply