Tuesday, April 30, 2024

Beware !! Hackers Deliver FlawedAmmyy RAT via Weaponized Microsoft Word and PDF Documents

Cybercriminals spreading powerful FlawedAmmyy RAT via Weaponized Microsoft Word and PDF Attachments to spy victims device and steal the sensitive information Remotely.

Hackers always lookout for legitimate programs or application to evade detection and to execute code with minimal user interaction.

Matt Nelson from SpecterOps recently published research on how attackers could abuse “.SettingContent-ms” file formats to run arbitrary commands on the latest version of windows.

Bad Actors Adopted  – FlawedAmmyy RAT

The SettingContent-ms file introduced in Windows 10, it is an XML document used to create shortcuts to various Windows 10 setting pages. Proofpoint researchers observed TA505 hacking group using this new technique to spread FlawedAmmyy RAT.

Threat actors embed the SettingContent-ms file inside the Microsoft Word and PDF documents. “The interesting aspect of this file is the <DeepLink> element in the schema. This element takes any binary with parameters and executes it.”

So if the users open a PDF file attachment with an embedded SettingContent-ms file, then windows would automatically run SettingContent-ms file and the PowerShell command contained within the “DeepLink” which leads to download and execute the FlawedAmmyy RAT.

The FlawedAmmy RAT functions
Remote Desktop control
File system manager
Proxy support
Audio Chat

Researchers observed the campaign first on June 18 and later on July 16 a large campaign with hundreds of thousands of messages attempting to deliver PDF attachments with an embedded SettingContent-ms file.

“TA505 acting as an early adopter, adapting the abuse of SettingContent-ms files to a PDF-based attack delivered at significant scale. We will continue to monitor ways in which threat actors use this approach in the weeks to come.” Proofpoint researchers said.

To best way to defend this attack is to block.SettingContent-ms, with the Microsoft recent update on the list of dangerous files to block within Office 365 documents, “.SettingContent-ms” file has been added.

Also Read:

Beware of FlawedAmmyy-RAT that Steals Credentials and Record Audio Chat

Beware!! Google Map Vulnerability Allows an Attacker to Redirect Victims into Malicious Websites

Powerful APT Malware “Slingshot” Performs Highly Sophisticated Cyber Attack to Compromise Router

Website

Latest articles

Google Blocks 2.28M Malicious Apps Entering The Play Store

A safe and trusted Google Play experience is our top priority.We leverage our...

LightSpy Malware Actively Targeting MacOS Devices

BlackBerry reported a new iOS LightSpy malware, but Huntress researchers found it to be...

New Android Malware Mimic As Social Media Apps Steals Sensitive Data

A new RAT malware has been discovered to be targeting Android devices. This malware...

Safari Vulnerability Exposes EU iOS Users to Malicious Marketplaces

A serious concern has arisen for iPhone users in the European Union as a...

Kaiser Permanente Cyber Attack Exposes 13.4 Million Users Data

Kaiser Permanente, one of the largest healthcare providers in the United States, was the...

Darkgate Malware Leveraging Autohotkey Following Teams

Researchers have uncovered a novel infection chain associated with the DarkGate malware.This Remote Access...

Meet the New Exclusive AI Malware Analyst: Gemini 1.5 Pro

Gemini 1.5 Pro is the latest version of the Gemini AI malware analysis platform,...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles