"Common sense" is an oft-prescribed remedy for email-based malware threats: Don't click on unknown links, don't enable macros in documents from unknown senders, don't even read emails from unknown senders. Threat actors, though, are testing the allgemeinbildung of German-speakers with personalized lures and social engineering to deliver ransomware and banking Trojans even in regions that have already experienced large-scale distribution of malware like Dridex.
Recently, Proofpoint researchers have observed numerous email campaigns targeting German-speaking regions, particularly Germany and Switzerland. Laden with banking Trojans and ransomware, these campaigns often require much more sophisticated protection than common sense.
By some estimates, global losses and costs associated with cybercrime annually reach into the trillions of dollars. Ransomware alone is expected to count for a billion dollars of this total in 2016 while banking Trojans, responsible for billions in losses over the last several years, continue to show new information and credential stealing capabilities. Losses go far beyond the direct costs of paying a ransom or dealing with fraudulent transactions, however. Earlier this year, for example, several hospitals in Germany were forced to reschedule operations and shut down a variety of connected equipment when they were hit with ransomware infections.
While the malware circulating in German-speaking regions in Europe is diverse, much of the impact on individuals and organizations can be traced to two major families: banking Trojans and ransomware.
Threat actors have historically had to choose between distributing malware at scale and personalizing attacks such as we see in spear phishing. Recently, though, we have observed larger scale personalized attacks that increase the effectiveness of email lures while still targeting larger groups of users. In German-speaking regions, banking Trojans like Dridex and Ursnif are accompanying these personalized campaigns.
However, it is worth noting that actors can easily swap out payloads, so the presence of one threat does not preclude the appearance of another in rapid fashion. Although not detailed here, Nymaim, for example, is another banking Trojan that we have observed being distributed in German-speaking regions. Similarly, whether or not the campaigns are personalized, banking Trojans have been responsible for considerable losses and, as described later, can still prove effective with more typical spamming approaches.
The Dridex banking Trojan continues to appear across regions, though at much lower volumes than we observed in 2015 and the first half of 2016. Instead, it is primarily being used in smaller targeted attacks and, in the case of the September campaign described below, contains injects for Swiss banking institutions. The lure, shown in Figure 1, is personalized in its greeting and references a "Bill to Control."
Figure 1: Personalized Dridex lure
Figure 2: Malicious Microsoft Word document with macros that, when enabled, install Dridex botnet 144
This instance of Dridex is targeting primarily Swiss financial sites with the following injects:
It is important to remember that the inclusion of a bank or service in the list of webinjects used by a banking Trojan does not indicate that the bank itself has been compromised. Instead it means that the customers of that bank are being actively targeted for fraudulent transfers and other theft by that malware.
The Dridex banking Trojan used in this campaign also targets the following applications:
crealogix,multiversa,abacus,ebics,agro-office,cashcomm,softcrew,coconet,macrogram,mammut,omikron,multicash,quatersoft,alphasys,wineur,epsitec,myaccessweb,bellin,financesuite,moneta,softcash,trinity,financesuite,abrantix,starmoney,sfirm,migrosbank,migros bank,online banking,star money,multibit,bitgo,bither,blockchain,copay,msigna,armory,electrum,coinbase,magnr,keepkey,coinsbank,coolwallet,bitoex,xapo,changetip,coinapult,blocktrail,breadwallet,luxstack,airbitz,schildbach,ledger nano,mycelium,trezor,coinomi,bitcore,avaloq,\*multiversa\*
This application targeting allows the Dridex operators to quickly and effectively profile a system for interesting software that could be targeted for financial gain. Other components provide keylogging functions for specific processes. These capabilities allow attackers to drop additional malware on an infected machine when they identify a client of interest.
Messages with a personalized email, which may include the company name in the body, subject, and/or attachment name, lead to the download of malware if the user enables macros in documents like the one pictured below. The "Personalized" actor distributing these macros has introduced an interesting new sandbox check, where the macro checks if there are at least 50 processes running on the victim system. Otherwise, the malicious payload is not executed. Moreover, the payload won't be fetched unless the victim's IP address is from Switzerland. These checks and others are detailed here.
Figure 3: Lure document with malicious macros enabled to download Ursnif
Figure 4: Simplified traffic flow through Retefe proxy
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL: "https://i3e5y4ml7ru76n5e[.]onion[.]to/7Zsdv5Eb.js?ip=<IP address>"
This request will return content based on the value of the "ip" query argument (the victim’s external IP address), making it possible for an attacker to differentiate the configuration depending on the targeted country or IP address range.
Note that this campaign is not personalized, opting instead for a more common shotgun approach.
Bank redirections for victims in Austria include:
Bank redirections for victims in Switzerland:
Other “bankers,” “loaders,” and “stealers”
In addition to banking Trojans, loader Trojans (or simply "loaders") have evolved to include information-stealing capabilities. One such loader that we have observed in Germany and Switzerland is Pony, distributed via Rich Text Format (RTF) document lures with malicious macros.
Command and control domains included myfurer[.]org.
Again, these are yet more examples of the range of malware that threat actors are using in German-speaking regions to steal banking information and other credentials from users.
While banking Trojans appeared to be the malware of choice for many actors in 2015, ransomware has emerged as a dominant threat in 2016, both via email and exploit kits. Recently, Germany has been a target for one of the highest profile ransomware variants, as well as an unusual variant primarily limited to Central and Eastern Europe.
Although not as well-known as its more famous ransomware cousins such as Locky, Cerber, CryptXXX, and CryptoWall, the Petya ransomware family has recently emerged with a focus on targets in Central and Eastern Europe. In German-speaking regions, Petya ransomware was observed spreading via fake resumes, as shown in Figure 6.
Figure 6: "Application portfolio" from [fake name] with picture
Petya ransomware does not encrypt files individually like many other ransomware variants currently in the wild. Instead, it uses a custom boot loader and very small kernel to encrypt the master file table on the disk. Petya's dropper actually overwrites the master boot record with the custom kernel. Infected systems then reboot and users are presented with the screens in Figures 7 and 8.
Figure 7: Screen shown during encryption
Figure 8: Petya ransom message after encryption
Figure 9: Petya payment portal
Driven primarily by the threat actors previously associated with Dridex, high-volume email campaigns distributing Locky ransomware have dominated the threat landscape since they first began in February 2016. In the third quarter of 2016, messages distributing Locky accounted for over 95% of global malicious email volume monitored by Proofpoint. German-speaking regions have not been exempt from these campaigns, as seen on on September 21, when we observed a campaign with both English and German lures leading to Locky Affiliate ID 3.
Messages in this email campaign purported to be from"
- "email@example.com" with subject "Ihre Bestellung ist auf dem Weg zu Ihnen! OrderID 654321" and attachment "invoice_12345.zip" (both with random digits)
- "John.doe123@[random domain]" (random name, 1-3 digits) with subject "E-TICKET 54321" (random digits) and matching attachment "54321.zip"
- "John.doe123@[random domain]" (random name, 1-3 digits) with subject "Emailing: _12345_123456" (random digits) and matching attachment " _12345_123456.zip"
- "John.doe123@[random domain]" (random name, 1-3 digits) with subject "Receipt of payment" and attachment "(#1234567890) Receipt.zip" (random digits)
Figure 10: Newest version of Locky (.odin encrypted file extension) displaying a ransom screen in German language for a German victim
Figure 11: Newest version of Locky (.odin encrypted file extension) displaying a ransom screen in German language for a German victim
As much of Europe struggles with ongoing financial pressures, the relative prosperity of German-speaking regions may explain recent upticks in malware volume and variety, particularly in Germany and Switzerland. We have observed email campaigns with German messages and lure documents distributing multiple families of ransomware and banking Trojans in these regions, including variants like Petya that are uncommon elsewhere, as well as personalized campaigns for banking Trojans such as Ursnif and Dridex. We will continue to monitor this activity to determine if the increased interest in German-speaking regions is merely normal attacker variation or a sign of a broader trend.
Regardless of their geographic location, organizations and individuals can take several steps to prevent infection and financial losses:
- Be vigilant when reading email messages that contain links or attachments. Most of the campaigns described here relied on social engineering to trick users into infecting themselves with malware, even though their systems would have likely presented security warnings when they opened malicious files.
- Never enable macros in documents that arrive via email or download and run executables linked from an email message unless you are absolutely certain the message is authentic.
- Configure online banking accounts with maximum security settings. For example, enabling two-factor authentication and notifications or confirmation for any money transfers can often prevent losses even if a system is infected.
- Maintain regular, frequent backups that can be restored instead of paying a ransom to unlock encrypted data.
- Organizations should also invest in appropriate security technologies to protect their employees from falling prey to these attacks. Businesses are particularly at risk because their bank accounts typically contain much larger amounts of money and are therefore a higher-priority target for attackers. They also have more to lose in a ransomware attack. Larger employee pools also increase the odds of a successful infection.