Sunday, December 3, 2023

Hackers Abusing Window 10 Remote Desktop ActiveX control to Install New Version of Trickbot Malware

Researchers observed a new wave of infamous Trickbot Malware campaign via a dozen of malicious documents and infect the Windows users by abusing Remote Desktop ActiveX Control.

TrickBot is one of the top modular banking malware that primarily targets financial information of users’ and also it acts as a dropper for other malware.

Remote Desktop ActiveX Control recently introduced by Microsoft for Windows 10 that helps vendors to constantly update OS to protect the system.

But this feature is abusing in this attack was utilized to automatically execute the malicious Macro that contains the OSTAP javascript downloader

Researchers believe that other groups also misusing the same, and earlier controls although with a slightly different technique.

Malware Infection Process

Attackers using email is deliverable medium and distributing a spam email campaign with an attachment of malicious document following the naming convention “i<7-9 random digits>.doc“.

Also, they are using a social engineering technique to convenience victims to enable the content which leads to executing the malicious macro, Meanwhile, the image also hid an ActiveX control slightly below in the following image.

Remote Desktop ActiveX

Also the malicious OSTAP JavaScript downloader was hidden in the document with white color letters which was marked as red color in the above image.

According to morphisec research “Attackers also using an interesting method“<name>_OnDisconnected” to trigger function that is first executed. This method didn’t execute immediately as it takes time for it to try and resolve DNS to an empty string and then return an error”

Threat actors this attack also using the MsRdpClient10NotSafeForScripting class which is used for remote control which helps them to abuse to properly execute their own code.

Later  OSTAP is created in the form of a BAT file and once it executed, the word document form is closed. 

“There are hundreds of more objects that have been introduced in the latest Windows 10 and even dozens of more methods in the described object that sophisticated attackers can abuse. so updating your operating system is necessary for better security” Researchers said.

Also Read:

Urgent !! Windows User Urged to Patch A Critical Crypto Vulnerability on Windows 10, Clients & Servers Discovered By NSA

Microsoft Enables Tamper Protection by Default for all Windows 10 Users to Defend Against Attacks

Microsoft going for Passwordless login for Windows 10 – Bye! Bye! for Passwords


Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles