Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver BlackSuit ransomware across Windows-based systems.
The attack, documented by DFIR experts, highlights how threat actors are leveraging popular software to deceive unsuspecting victims into installing malware capable of crippling entire networks.
The malicious activity began with a website mimicking Zoom’s legitimate domain, enticing users to download a file named “Zoom_v_2.00.4.exe.”
This website, cleverly crafted to resemble the legitimate Zoom interface, fooled users into believing they were downloading the popular teleconferencing software.
Behind the scenes, however, the installer functioned as a delivery mechanism for a multi-stage malware attack chain.
The fake installer was built using Inno Setup—a legitimate installer creation tool. Its payload included “d3f@ckloader,” a sophisticated downloader designed in Pascal scripting language.
Upon execution, the malicious code leveraged multiple stages to bypass security, install additional payloads, and execute nefarious activities.
Stage 1: Initial Access and Defense Evasion
After downloading the fake installer, victims unknowingly executed a series of batch scripts that:
Stage 2: Malware Deployment
The fake installer simultaneously deployed two executables:
For nine days, the SectopRAT trojan remained dormant, enabling the threat actor to avoid detection while gathering intelligence.
On the ninth day, it activated additional payloads, including Brute Ratel, and later deployed the widely recognized Cobalt Strike post-exploitation toolkit.
Lateral Movement and Data Theft
Using tools like QDoor malware and RDP (Remote Desktop Protocol), the attacker achieved lateral movement across the compromised environment.
Sophisticated proxies enabled secure tunneling of commands and data between infected systems, ensuring continued control over the network.
Once access to sensitive file servers and domain controllers was achieved, the attacker used WinRAR to compress files and exfiltrated them to a SaaS application called Bublup.
In the final stage, the attacker executed BlackSuit ransomware—an advanced strain capable of encrypting files and rendering systems inoperable.
Using the PsExec utility, the ransomware was deployed across multiple remote systems. Once executed, BlackSuit:
The entire operation, from initial access to ransomware deployment, took approximately nine days.
How to Protect Yourself
This campaign underscores the critical importance of vigilance when downloading software, especially from unofficial sources. Here are actionable steps for defense:
The discovery of this campaign serves as a sobering reminder that threat actors are becoming increasingly innovative in their attack strategies.
By exploiting the global popularity of software like Zoom, they have created a trap capable of paralyzing organizations and extorting significant financial gains.
Security teams must be proactive and responsive to protect systems against such evolving threats. Awareness, vigilance, and robust cybersecurity measures remain the best defense against becoming the next victim of ransomware attacks like BlackSuit.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates
!
OpenVPN, a widely-used open-source virtual private network (VPN) software, has recently patched a security vulnerability…
A critical vulnerability has been discovered in Apache Traffic Server (ATS), an open-source caching proxy…
Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces its…
Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券), a…
In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series of…
Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive ransomware,…