Incidents

Never say never

There was a time when image files, such as JPEGs, were considered harmless. Some industry pioneers stated outright that only executable (EXE, COM) files could carry viruses. And then came macro viruses, spreading from .DOC files, another “impossible” propagation vector. And later, some said that you couldn’t really get a virus from just reading an email – you had to click on an attachment. Of course, this has been proved false, thanks to an (almost) unending stream of Outlook vulnerabilities.

The misconception that JPEGS can’t carry viruses was disproved by a major vulnerability discovered last year in a graphics format parsing library used in many products. Several Trojans exist which attempt to make use of this vulnerability to infect computers. We’ve added a generic detection for malicious JPEG files of this type: Exploit.Win32.MS04-028.gen.

This weekend we intercepted an interesting attempt at spreading a Trojan using the above mentioned JPEG exploit. Somebody mass mailed a large number of messages containing a downloader for Backdoor.Win32.Haxdoor.dw. The downloader,a malcrafted JPEG exploit 4098 bytes in size (md5: 09617ea4db6de83455ed4079facdbc36) doesn’t work.

As often happens with virus writers, he/she probably didn’t bother to test the exploit before sending it out, and as a result, the exploit which has been widely distributed doesn’t work. So this time at least, the JPEG file wasn’t infectious. However, fixing the mistake would be relatively easy and we wouldn’t be surprised to see a second wave, this time with a working exploit.

Never say never

Your email address will not be published. Required fields are marked *

 

Reports

The leap of a Cycldek-related threat actor

The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Subscribe to our weekly e-mails

The hottest research right in your inbox