CyberSecurity updates
2024-12-26 06:12:18 Pacfic

SmokeLoader Malware Campaign Targets Taiwan - 21d
Read more: securityonline.info

A new SmokeLoader malware campaign is targeting Taiwanese companies across various sectors, including manufacturing, healthcare, and IT. Unlike previous campaigns where SmokeLoader acted as a downloader for other malware, this campaign directly executes the attack by downloading and executing malicious plugins from its command-and-control (C2) server. This significantly enhances its capabilities and evasiveness. The attackers employed social engineering, using personalized emails with generic content to trick recipients into opening malicious attachments. These attachments exploited vulnerabilities in Microsoft Office (CVE-2017-0199 and CVE-2017-11882) to install AndeLoader, which then deployed SmokeLoader.

The SmokeLoader malware's modular design allows it to download and execute various plugins directly from its C2 server. These plugins steal sensitive data such as login credentials, cookies, and email content from various applications including browsers, email clients, and FTP clients. The malware also utilizes keylogging and clipboard monitoring to further compromise victims. The campaign's success hinges on exploiting known vulnerabilities in Microsoft Office and leveraging social engineering tactics to bypass security measures. The use of nearly identical phishing emails sent to multiple recipients with only the recipient's name personalized highlights the attackers' efficiency and scale.