Hackers Abusing Window 10 Remote Desktop ActiveX control to Install New Version of Trickbot Malware

Researchers observed a new wave of infamous Trickbot Malware campaign via a dozen of malicious documents and infect the Windows users by abusing Remote Desktop ActiveX Control.

TrickBot is one of the top modular banking malware that primarily targets financial information of users’ and also it acts as a dropper for other malware.

Remote Desktop ActiveX Control recently introduced by Microsoft for Windows 10 that helps vendors to constantly update OS to protect the system.

But this feature is abusing in this attack was utilized to automatically execute the malicious Macro that contains the OSTAP javascript downloader

Researchers believe that other groups also misusing the same, and earlier controls although with a slightly different technique.

Malware Infection Process

Attackers using email is deliverable medium and distributing a spam email campaign with an attachment of malicious document following the naming convention “i<7-9 random digits>.doc“.

Also, they are using a social engineering technique to convenience victims to enable the content which leads to executing the malicious macro, Meanwhile, the image also hid an ActiveX control slightly below in the following image.

Also the malicious OSTAP JavaScript downloader was hidden in the document with white color letters which was marked as red color in the above image.

According to morphisec research “Attackers also using an interesting method“<name>_OnDisconnected” to trigger function that is first executed. This method didn’t execute immediately as it takes time for it to try and resolve DNS to an empty string and then return an error”

Threat actors this attack also using the MsRdpClient10NotSafeForScripting class which is used for remote control which helps them to abuse to properly execute their own code.

Later  OSTAP is created in the form of a BAT file and once it executed, the word document form is closed. 

“There are hundreds of more objects that have been introduced in the latest Windows 10 and even dozens of more methods in the described object that sophisticated attackers can abuse. so updating your operating system is necessary for better security” Researchers said.

Also Read:

Urgent !! Windows User Urged to Patch A Critical Crypto Vulnerability on Windows 10, Clients & Servers Discovered By NSA

Microsoft Enables Tamper Protection by Default for all Windows 10 Users to Defend Against Attacks

Microsoft going for Passwordless login for Windows 10 – Bye! Bye! for Passwords

BALAJI N

Recent Posts

Dell, HP, & Lenovo System Found Using Outdated OpenSSL Cryptographic Library

The cybersecurity researchers at Binarly recently discovered that outdated versions of the OpenSSL cryptographic library…

1 day ago

Chrome Zero-Day Bug Actively Exploited in the Wild – Google Emergency Update!

The eighth zero-day vulnerability used in attacks this year has been fixed by Google in…

2 days ago

Operation HAECHI III – INTERPOL Arrested 1000 Cyber Criminals & Seized $130 Million

Recently, there have been almost 1000 arrests made as a result of a police operation…

4 days ago

Hackers Rewritten The RansomExx Ransomware in Rust Language To Evade Detection

There has recently been a discovery made by IBM Security X-Force Threat Researchers regarding a…

5 days ago

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing and Report the vulnerabilities which are…

6 days ago

Chrome Extension Deploy Windows Malware to Steal Cryptocurrency and Clipboard Contents

In order to steal cryptocurrency and clipboard contents, ViperSoftX was detected by the security analysts…

7 days ago