Saturday, November 16, 2024
HomeMalwareSmokeLoader Malware Abusing MS Office Document and Compromise Windows 8 ,10 Users...

SmokeLoader Malware Abusing MS Office Document and Compromise Windows 8 ,10 Users PC

Published on

A dangerous malicious campaign SmokeLoader Malware abusing MS office document that spreading via spam Email and targetting windows 8 and above users.

Email medium is mainly used by attackers nowadays which carried out a variety of malware campaign and spreading across the world to infect a large number of users.

SmokeLoader Malware has acted and taken advantage of the infamous bug Meltdown and Spectre which affects almost all the modern processors and pushes Smoke Loader malware as a patch.

- Advertisement - SIEM as a Service

In this case, attackers using a different kind of  Email body content to gain more trust from the targeting users and compromise them to believe it as a legitimate one.

Also, attacker injecting shellcode into office document and compromise users to enable the macro which leads to install the malicious code on the victim’s machine.

Also Read: Hacking Group Spies on and Steal Data from Android Users Posing Actress Nude Photos

How does this Smokeloader Malware infect the users

Initially, attacker distributing Spam Email campaign that contains an information about job applications which is not actually a legitimate content.

SmokeLoader Malware

The Mail also contains an attached zip file which is protected by a password and the password is clearly mentioned within the body of the Mail.

In this case, attacker protects an attached file with a password to evade the email security software.

Once the user opens the attachment, it promotes to enter the password which is given in the body of the email.

After users enter the password, a malicious word document will be downloaded which contains a Malicious macro code and the document keep asking users to enable the Macro to infect the user.

SmokeLoader Malware

Once the user enabled the macro, suddenly a PowerShell” script will be executed in the background and it will launch a payload.

According to QuickHeal, If we look closely, the malicious file is hosted as a poop.jpg file on the attacker’s server, which is actually an executable SmokeLoader malware. This file is dropped with the name DKSPKD.exe at %Temp% location and launched to perform malicious activities.

This Malware will be taking advantage of Microsoft Window 8 and above the platform and during the Execution process SmokeLoader malware can also download other malware to infect the user.

How to protect:

— Always keep your OS and software updated
— Train staff never open attachments or click on a URL in unsolicited e-mails
— Use Anti Spam Gateways such as Comodo Antispam Gateway for defense against spam, phishing emails, and virus-infected attachments
— Turn on Your Firewall
— Limit the user Privilege
— Use caution when clicking on links to web pages

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware

A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...