As email gateways become better at spotting malicious messages, operators of the sinister BazarBackdoor malware are resorting to changing up their tactics.
According to reports from BleepingComputer, the TrickBot group, which created the malware, no longer tries to infect new endpoints directly via email, but rather through website contact forms.
Citing a report from cybersecurity experts Abnormal Security, the publication says the new campaign probably kicked off in December 2021, targeting corporate endpoints with Cobalt Strike or ransomware.
We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.
>> Click here to start the survey in a new window (opens in new tab) <<
Deploying the BazarBackdoor DLL
The method is simple: instead of directly sending an email, the threat actor will use corporate contact forms to kick off communication, most often posing as a business requesting a product supply quote.
Once the target responds to the message, the attacker will send a malicious ISO file, claiming it’s relevant to the communication. The ISO file won’t be attached directly, though, but instead will first be uploaded to third-party file-sharing services (opens in new tab), such as TransferNow or WeTransfer.
The ISO archive carries two files, the researchers suggest: one .lnk file and one .log file. By grouping these files together, and having the victim extract them manually after download, the threat actors hope to evade any email protection services (opens in new tab) that the target might have set up.
> Windows 10 apps abused by BazarLoader 'call me back' attack (opens in new tab)
> TrickBot malware has been taken over by this notorious criminal gang (opens in new tab)
> Conti ransomware source code leaked by Ukrainian researcher (opens in new tab)
Once the target runs the .lnk file, it will open a terminal window and load the .log file - the BazarBackdoor DLL.
BazarBackdoor is built to provide its operators with remote access to an internal device, and as such, is usually used as a stepping stone towards the deployment of more destructive malware or ransomware.
Given that BazarBackdoor is the first stage in a multi-stage attack, the researchers expect the malware to deploy the stage-two payload. However, many of the C2 IPs are offline, preventing researchers from discovering the campaign’s endgame.
- You might want to check out our list of the best firewalls (opens in new tab) right now
Via BleepingComputer (opens in new tab)