Agent Tesla, Formbook Malware & Remcos RAT

12754735493?profile=RESIZE_400xCybersecurity researchers have detailed widespread phishing campaigns targeting small and medium-sized businesses (SMBs) in Poland during May 2024 that led to the deployment of several malware families like Agent Tesla, Formbook, and Remcos RAT.  Some of the other regions targeted by the campaigns include Italy and Romania.  Attackers used previously compromised email accounts and company servers, not only to spread malicious emails but also to host malware and collect stolen data.

See:  https://redskyalliance.org/xindustry/remcos-and-tax-day

These campaigns, spread across nine waves, are notable for the use of a malware loader called DBatLoader (aka ModiLoader and NatsoLoader) to deliver the final payloads.  Researchers stated this marks a departure from previous attacks observed in the second half of 2023 that leveraged a Cryptors-as-a-Service (CaaS) dubbed AceCryptor to propagate Remcos RAT (aka Rescoms).  During the second half of [2023], Rescoms became the most prevalent malware family packed by AceCryptor.   Over half of these attempts happened in Poland, followed by Serbia, Spain, Bulgaria, and Slovakia.[1]

The starting point of the attacks was phishing emails incorporating malware-laced RAR or ISO attachments that, upon opening, activated a multi-step process to download and launch the trojan.   In cases where an ISO file was attached, it would directly lead to the execution of DBatLoader.  The RAR archive, on the other hand, contained an obfuscated Windows batch script enclosing a Base64-encoded ModiLoader executable that's disguised as a PEM-encoded certificate revocation list.

A Delphi-based downloader, DBatLoader is primarily designed to download and launch the next stage malware from either Microsoft OneDrive or compromised servers belonging to legitimate companies.  Regardless of what malware is deployed, Agent Tesla, Formbook, and Remcos RAT come with capabilities to siphon sensitive information, allowing the threat actors to "prepare the ground for their next campaigns."

The development comes as Kaspersky revealed that SMBs are being increasingly targeted by cybercriminals owing to their lack of robust cybersecurity measures as well as limited resources and expertise.  "Trojan attacks remain the most common cyberthreat, which indicates that attackers continue to target SMBs and favor malware over unwanted software," the Russian security vendor reported in June 2024.

See:  https://www.bis.gov/press-release/commerce-department-prohibits-russian-kaspersky-software-us-customers

"Trojans are particularly dangerous because they mimic legitimate software, which makes them harder to detect and prevent.  Their versatility and ability to bypass traditional security measures make them a prevalent and effective tool for cyber attackers."

This article is shared at no charge for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  We provide indicators of compromise information via a notification service (RedXray) or an analysis service (CTAC).  For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or feedback@redskyalliance.com    

Weekly Cyber Intelligence Briefings:

Weekly Cyber Intelligence Briefings:

REDSHORTS - Weekly Cyber Intelligence Briefings

https://register.gotowebinar.com/register/5378972949933166424

[1] https://thehackernews.com/2024/07/cybercriminals-target-polish-businesses.html

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!