Monday, January 27, 2025
HomeMalwareHackers Abusing Window 10 Remote Desktop ActiveX control to Install New Version...

Hackers Abusing Window 10 Remote Desktop ActiveX control to Install New Version of Trickbot Malware

Published on

SIEM as a Service

Follow Us on Google News

Researchers observed a new wave of infamous Trickbot Malware campaign via a dozen of malicious documents and infect the Windows users by abusing Remote Desktop ActiveX Control.

TrickBot is one of the top modular banking malware that primarily targets financial information of users’ and also it acts as a dropper for other malware.

Remote Desktop ActiveX Control recently introduced by Microsoft for Windows 10 that helps vendors to constantly update OS to protect the system.

But this feature is abusing in this attack was utilized to automatically execute the malicious Macro that contains the OSTAP javascript downloader

Researchers believe that other groups also misusing the same, and earlier controls although with a slightly different technique.

Malware Infection Process

Attackers using email is deliverable medium and distributing a spam email campaign with an attachment of malicious document following the naming convention “i<7-9 random digits>.doc“.

Also, they are using a social engineering technique to convenience victims to enable the content which leads to executing the malicious macro, Meanwhile, the image also hid an ActiveX control slightly below in the following image.

Remote Desktop ActiveX

Also the malicious OSTAP JavaScript downloader was hidden in the document with white color letters which was marked as red color in the above image.

According to morphisec research “Attackers also using an interesting method“<name>_OnDisconnected” to trigger function that is first executed. This method didn’t execute immediately as it takes time for it to try and resolve DNS to an empty string and then return an error”

Threat actors this attack also using the MsRdpClient10NotSafeForScripting class which is used for remote control which helps them to abuse to properly execute their own code.

Later  OSTAP is created in the form of a BAT file and once it executed, the word document form is closed. 

“There are hundreds of more objects that have been introduced in the latest Windows 10 and even dozens of more methods in the described object that sophisticated attackers can abuse. so updating your operating system is necessary for better security” Researchers said.

Also Read:

Urgent !! Windows User Urged to Patch A Critical Crypto Vulnerability on Windows 10, Clients & Servers Discovered By NSA

Microsoft Enables Tamper Protection by Default for all Windows 10 Users to Defend Against Attacks

Microsoft going for Passwordless login for Windows 10 – Bye! Bye! for Passwords

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data

Researchers from IIT Kharagpur and Intel Corporation have identified a significant security vulnerability in...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Weaponised XWorm RAT Builder Attacking Script Kiddies To Hack 18,000 Devices

A recent cybersecurity attack involving a Trojanized version of the XWorm Remote Access Trojan...

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA...

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...