HomeCyber BalkansGuLoader Attacks Law Firms with Weaponized PDF Files

GuLoader Attacks Law Firms with Weaponized PDF Files

Published on

spot_img

A recent report from cybersecurity researchers at Morphisec Labs has shed light on the ongoing GuLoader campaign targeting law firms in the US. The researchers have been monitoring the campaign since April and have identified the law firms along with healthcare and investment firms as the primary targets.

GuLoader, also known as ‘Cloudeye’, has been active for over three years and continues to evolve, presenting challenges for security analysts trying to analyze it. It is notorious for distributing various malware families, including NetWire, Lokibot, Xloader, and Remcos.

The campaign involves the use of trusted platforms such as Google Drive, OneDrive, and GCloud to download the payload. In this specific instance, the operators of GuLoader utilized ‘github.io’ as the download source to deliver the Remcos RAT, a remote access trojan.

The infection chain begins with an encrypted PDF attachment sent via email, along with a PIN for decryption. The victim is enticed to click on an embedded icon within the PDF, initiating the process. Once clicked, the user is redirected to a final URL through Google’s adclick service, DoubleClick, which is commonly used in online ads for tracking and gathering statistics on user clicks.

At the redirected URL, the user is prompted to enter the PIN provided earlier. After entering the PIN, a GuLoader VBScript is downloaded for further execution. The VBScript contains obfuscation, random comments, and redundant lines to hinder analysis. The resulting code decodes and executes a PowerShell script.

Using the 32-bit version of PowerShell, the script decodes and runs a second-stage PowerShell script. This script contains XOR-encoded strings responsible for downloading the GuLoader shellcode. The shellcode is split into two parts: a decrypting shellcode and an encrypted shellcode. The shellcode’s main role is to inject the final payload into the ‘ieinstal.exe’ process by downloading and decrypting it.

Additionally, the shellcode opens a malicious PDF file, triggering and running the Remcos RAT in the background. Interestingly, the PDF file displays a “404 Page not found” error, adding another layer of deception to the campaign.

What sets this campaign apart is that GuLoader typically fetches payloads from cloud hosting platforms, but in this case, it used a regular URL. This demonstrates the adaptability and sophistication of the malware loader.

It is crucial for organizations, especially law firms, to be aware of this ongoing campaign and take necessary measures to protect their systems and sensitive data. Implementing robust cybersecurity solutions and educating employees about email security best practices can help mitigate the risk of falling victim to GuLoader and other similar threats.

Overall, the GuLoader campaign targeting law firms in the US highlights the persistent and evolving nature of cyber threats. It serves as a reminder for organizations to remain vigilant and proactive in their cybersecurity efforts to safeguard against increasingly sophisticated attacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...