1 min read

Microsoft Help Files Are Being Used To Distribute This Spyware

Diana Lopera is a researcher for Trustwave Cybersecurity and has stumbled across something that’s one part interesting and one part disturbing.

Apparently, a group of hackers are trying a new approach to distribute their malicious code which is leveraging Microsoft’s HTML help files.

Yes, you read that correctly.  It’s an innovative technique that’s not only proving to be surprisingly effective, it is also proving to be notoriously difficult to detect. Even worse is that it’s not even a terribly sophisticated attack.

Here’s an overview of how it works:

Naturally, it begins with an email.  The email contains a generic subject line and an attachment, often entitled “Reques.doc” or similar.

This file is not a doc, but an .iso file.  A disk image.  The image contains a pair of files.  One of them is a Microsoft Compiled HTML Help file (CHM) and the other is an executable.

By exploiting the capabilities of the help file, the executable can install its malicious payload. In this case it is a malware strain called Vidar.

Vidar then establishes a link to its command-and-control server via Mastodon, which is a multi-platform open-source social networking system.  Once that connection has been established, Vidar goes to work harvesting user data from the infected system and exfiltrating it to the command-and-control server.

In at least one confirmed instance, Vidar was also spotted downloading and executing additional malware payloads.

Don’t Ignore This Serious Threat

Sophisticated or not, this new campaign has proved to be highly effective. Given that Vidar can serve as how other malware payloads wind up on an infected machine, this should be regarded as a serious threat.  Those “other payloads” could be anything from ransomware which will lock all the files on your network, to malicious code that has been optimized to steal banking information and everything in between.

Be sure your employees, friends, and family are aware and on their guard.  This is a nasty piece of code.

Used with permission from Article Aggregator

Managed IT vs. In-House IT: A Portland Business Owner's Guide

Managed IT vs. In-House IT: A Portland Business Owner's Guide

Key Takeaways Most SMBs outgrow in-house IT faster than they expect. Managed IT shifts your approach from reactive fixes to proactive stability. The...

Read the full blog
Signs Your Portland Business Needs Managed IT

Signs Your Portland Business Needs Managed IT

Key Takeaways Frequent tech issues aren’t just annoying, they're early signs you need managed IT services. Managed IT services shift your business...

Read the full blog
When the Gavel Falls: Emergency Tech That Keeps Law Firms Standing

When the Gavel Falls: Emergency Tech That Keeps Law Firms Standing

If you've read our post Chaos to Control: Crafting Escalation Paths That Never Miss a Beat, you already know that when chaos strikes, having a clear...

Read the full blog

1 min read

Tricky Ransomware Encrypts Small Data But Overwrites Large Data

The MalwareHunterTeam recently discovered a new ransomware operation that is particularly nasty. Called Onyx, outwardly, the operation does what most...

Read the full blog
Advantages of Partnering with Local IT Professional for Your Law Firm

1 min read

Advantages of Partnering with Local IT Professional for Your Law Firm

From case management software to secure client communication systems, law firms rely heavily on IT infrastructure to operate efficiently and...

Read the full blog

1 min read

Update Your All In One SEO Plugin For Security Patch

Do you own and operate a WordPress website? Do you also use the “All in One” SEO plugin?

Read the full blog