Tuesday, April 29, 2025
HomeMalwareFinancially Motivated Hackers Group "Cobalt" Now Attack Banks by Launching Weaponized Word...

Financially Motivated Hackers Group “Cobalt” Now Attack Banks by Launching Weaponized Word Document

Published on

SIEM as a Service

Follow Us on Google News

Security researchers uncovered a new attack targeting the financial institution such as banks in Kazakhstan, and the attack believed to be initiated by one of the Financially motivated cyber-crime gang “Cobalt”.

Cobalt group actively targeting victims in various countries since at least 2016, they particularly focus on the bank’s network to compromise the internal components such as ATM and card processing system.

Also, researchers believe that this gang was ultimately responsible for  SWIFT banking system attack that causes million dollar damage.

- Advertisement - Google News

In order to compromise the company or bank sectors, they are sending malicious emails that look like a legitimate one from other trusted partners.

Threat actors from this group building a tailored document to masquerade as a legitimate one with a valid certificate and planed well before executing the attack to evade the detection.

Even though Europol arrested the Cobalt group leader in 2018, the group remains active until today and still targeting the victims around the globe.

In this current attack, researchers found enough evidence that related to the Cobalt group, including a large number of similar Cobalt Strike loaders in this campaign that they used for some previous attacks.

Infection process

Threat actors hosting a weaponized document on the promotion website of Kassa Nova Bank (https://kassanova[.]kz/files/docs/T47188445.doc) and the website claimed financial products and services to the public and small enterprises in Kazakhstan.

Once it’s launched into the targeted system and opened by a victim, the content of document tricks the user to enable the malicious Macro and the Document_Open macro function is automatically triggered once the user presses the “Enable Macros” button.

If it’s enabled, a multistage Infection chain that eventually downloads and executes a Cobalt Strike beacon to proceed with the further infection process.

Cobalt attack infection chain

Threat actors heavily obfuscate the codes used for the malware and it drops the executable payload “file.exe”  which is signed by Sectigo.

Later the executable communicate with its C&C server to download and decrypt a Cobalt Strike beacon. 

According to Checkpoint Research ” Surprisingly, this communication resembles legitimate requests made when viewing the Office 365 Outlook calendar. Looking up the unique request header led us to a GitHub project called “Malleable C2 Profiles”, which offers a variety of “profiles” that mimic the communication patterns of legitimate services, known malware families or even APT groups. “

Cobalt group is known to be mainly attacked in Eastern Europe and Central Asia, and as it turns out, this is the second time that Kassa Nova bank was involved in a Cobalt Group related attack: During December 2018, a malicious attachment was sent from the e-mail address belonging to one of the bank’s employees, Checkpoint said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

JokerOTP Platform Linked to 28,000+ Phishing Attacks Dismantled

Law enforcement agencies from the UK and the Netherlands have dismantled the notorious JokerOTP...

Windows Server 2025 Gets Hotpatching Support Beginning July 1, 2025

Microsoft announced that hotpatching support for Windows Server 2025 will become generally available as...

Critical Linux Kernel Flaw (CVE-2025-21756) Allows Privilege Escalation

A newly disclosed vulnerability in the Linux kernel, tracked as CVE-2025-21756 and dubbed “Attack of the...

Massive Attack: 4,800+ IPs Used to Target Git Configuration Files

A recent surge in cyber reconnaissance has put thousands of organizations at risk after...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an...

Hannibal Stealer: Cracked Variant of Sharp and TX Malware Targets Browsers, Wallets, and FTP Clients

A new cyber threat, dubbed Hannibal Stealer, has surfaced as a rebranded and cracked...