Friday, May 16, 2025
HomeMalwareFinancially Motivated Hackers Group "Cobalt" Now Attack Banks by Launching Weaponized Word...

Financially Motivated Hackers Group “Cobalt” Now Attack Banks by Launching Weaponized Word Document

Published on

SIEM as a Service

Follow Us on Google News

Security researchers uncovered a new attack targeting the financial institution such as banks in Kazakhstan, and the attack believed to be initiated by one of the Financially motivated cyber-crime gang “Cobalt”.

Cobalt group actively targeting victims in various countries since at least 2016, they particularly focus on the bank’s network to compromise the internal components such as ATM and card processing system.

Also, researchers believe that this gang was ultimately responsible for  SWIFT banking system attack that causes million dollar damage.

- Advertisement - Google News

In order to compromise the company or bank sectors, they are sending malicious emails that look like a legitimate one from other trusted partners.

Threat actors from this group building a tailored document to masquerade as a legitimate one with a valid certificate and planed well before executing the attack to evade the detection.

Even though Europol arrested the Cobalt group leader in 2018, the group remains active until today and still targeting the victims around the globe.

In this current attack, researchers found enough evidence that related to the Cobalt group, including a large number of similar Cobalt Strike loaders in this campaign that they used for some previous attacks.

Infection process

Threat actors hosting a weaponized document on the promotion website of Kassa Nova Bank (https://kassanova[.]kz/files/docs/T47188445.doc) and the website claimed financial products and services to the public and small enterprises in Kazakhstan.

Once it’s launched into the targeted system and opened by a victim, the content of document tricks the user to enable the malicious Macro and the Document_Open macro function is automatically triggered once the user presses the “Enable Macros” button.

If it’s enabled, a multistage Infection chain that eventually downloads and executes a Cobalt Strike beacon to proceed with the further infection process.

Cobalt attack infection chain

Threat actors heavily obfuscate the codes used for the malware and it drops the executable payload “file.exe”  which is signed by Sectigo.

Later the executable communicate with its C&C server to download and decrypt a Cobalt Strike beacon. 

According to Checkpoint Research ” Surprisingly, this communication resembles legitimate requests made when viewing the Office 365 Outlook calendar. Looking up the unique request header led us to a GitHub project called “Malleable C2 Profiles”, which offers a variety of “profiles” that mimic the communication patterns of legitimate services, known malware families or even APT groups. “

Cobalt group is known to be mainly attacked in Eastern Europe and Central Asia, and as it turns out, this is the second time that Kassa Nova bank was involved in a Cobalt Group related attack: During December 2018, a malicious attachment was sent from the e-mail address belonging to one of the bank’s employees, Checkpoint said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign

A meticulously orchestrated phishing campaign targeting Kuwait's fisheries, telecommunications, and insurance sectors has been...

Ivanti Endpoint Manager Vulnerabilities Allow Unauthenticated Remote Code Execution

Critical vulnerability chain in Ivanti Endpoint Manager Mobile (EPMM) has exposed enterprise mobile device...

Jenkins Released Security Updates – Multiple Vulnerabilities Fixed That Allow Attackers to Exploit CI/CD Pipelines

Jenkins, the widely used automation server for CI/CD pipelines, has released a critical security...

Pwn2Own Day 1 – Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked

Security researchers successfully illustrated significant vulnerabilities across several platforms on the first day of...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign

A meticulously orchestrated phishing campaign targeting Kuwait's fisheries, telecommunications, and insurance sectors has been...

Hackers Target Industrial Automation Systems Using Over 11,600 Malware Variants

Hackers are stepping up their attacks on Industrial Control Systems (ICS) in the first...

Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks

The Socket Threat Research Team has uncovered a surge in supply chain attacks where...