2 min read

New Trickbot Campaign Uses Fake Emails from U.S. Department of Labor

Silviu STAHIE

May 05, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
New Trickbot Campaign Uses Fake Emails from U.S. Department of Labor

A new campaign is targeting people with messages that seem to come from the U.S. Department of Labor (DoL), trying to trick them into opening a DOC file, enabling macros, and eventually deploying the TrickBot malware.

Like many of today”s malicious campaigns, this new one tries to use COVID-19 as a cover to give it a sense of urgency. The use of an official government institution is a well-known tactic and, in this case, the bad actors impersonate the Department of Labor.

The email message talks about a provision called the Family and Medical Leave Act (FMLA), which allows sick employees to receive benefits when they miss work. Given the economic situation, the email aims to convince people that they need to read a document attached to the email.

An analysis from IBM X-Force of the email shows that it contains one malicious file, named “Family and Medical Leave of Act 22.04.doc.” It”s an actual DOC file but asks for the users to enable Macros when opened. When the file is closed, the attack runs scripts.

Macros are very useful in office suites, used to display dynamic content or for various automatization procedures, but they should remain off at all times. They can be used to execute scripts, allowing attackers to download malware.

And this is precisely the route taken in this case. After the user enables Macros, a file named terop.bat is downloaded and executed. But things get iffy from there, as the attackers use cURL to download a number of files from a compromised domain, only to fail. cURL is not available by default in Windows-powered machines, so the commands present in the .bat file fail.

The researchers presume the attackers are still testing deployment methods and procedures, and that”s why the download fails. But looking at the IP address and the type “Macros on close” method indicates that the malware to be eventually downloaded is Trickbot.

The Trickbot malware is adaptive and is used with different attack vectors. It initially started as a credential-harvesting threat, mostly focusing on e-banking, but it has a modular structure and allows the use of specialized plugins that lets bad actors change its purpose depending on the campaign.

Users are advised to never open emails from unknown contacts and to be wary of any messages from seemingly official organizations and institutions. Also, remember to keep Macros turned off at all times.

tags


Author



Right now

Top posts

Threat actors impersonate Canadian gas retailer to deliver malicious OneNote phishing campaign, Bitdefender Labs warns

Threat actors impersonate Canadian gas retailer to deliver malicious OneNote phishing campaign, Bitdefender Labs warns

January 26, 2023

2 min read
Spammers phish eager vacationers with travel-themed lures, Bitdefender Antispam Lab warns

Spammers phish eager vacationers with travel-themed lures, Bitdefender Antispam Lab warns

January 19, 2023

4 min read
Enhance your cyber resilience and privacy on Computer Security Day in four easy steps

Enhance your cyber resilience and privacy on Computer Security Day in four easy steps

November 29, 2022

2 min read
How to monitor your online privacy during your Thanksgiving trip

How to monitor your online privacy during your Thanksgiving trip

November 22, 2022

3 min read
Just your yearly dose of Black Friday spam: Cybercrooks get ahead of the game to steal shoppers’ info

Just your yearly dose of Black Friday spam: Cybercrooks get ahead of the game to steal shoppers’ info

November 16, 2022

6 min read
Bitdefender VPN in 2022: the new, the improved, and the soon-to-be

Bitdefender VPN in 2022: the new, the improved, and the soon-to-be

November 14, 2022

5 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Data of over 20 million TruthFinder and Instant Checkmate users leaked on hacking forum Data of over 20 million TruthFinder and Instant Checkmate users leaked on hacking forum
Alina BÎZGĂ

February 07, 2023

2 min read
Parents’ Credit Card Info Stolen in Australian High School Hack Parents’ Credit Card Info Stolen in Australian High School Hack
Alina BÎZGĂ

January 31, 2023

1 min read
Data breaches affected over 422 million people in 2022, Identity Theft Resource Center says Data breaches affected over 422 million people in 2022, Identity Theft Resource Center says
Alina BÎZGĂ

January 30, 2023

2 min read