National CSIRT-CY | National Computer Security Incident Response Team of Cyprus

Η Εθνική Ομάδα Αντιμετώπισης Ηλεκτρονικών Επιθέσεων προβλέπει την αύξηση της ηλεκτρονικής ασφαλείας ενισχύοντας την προστασία του κυβερνοχώρου των Εθνικών Κρίσιμων Πληροφοριακών Υποδομών, των τραπεζών και των παροχών επικοινωνίας της Κυπριακής Δημοκρατίας.

9-year-old Windows flaw abused to drop ZLoader malware

07 Ιανουαρίου 2022

The vulnerability was identified and fixed in 2013 but in 2014 Microsoft revised the fix allowing Malsmoke hackers in 2022 to spread ZLoader malware.

Israel-based cybersecurity firm Check Point Research has been assessing a sophisticated infection chain since Nov 2021. Researchers have now published their report, stating that a new ZLoader malware campaign is underway and has already stolen data and credentials of more than 2000 victims across 111 countries as of 2 Jan 2022.

In the new campaign, attackers exploit remote monitoring tools and a 9-year-old flaw in Microsoft’s digital signature verification (CVE-2013-3900) to steal user passwords and sensitive personal data.

What is ZLoader?

ZLoader, is a banking Trojan. It utilizes web injection to steal passwords, browser cookies, and sensitive user data and is suspected of delivering Ryuk and Conti ransomware variants.

In previous incidents involving ZLoader, the trojan was delivered through traditional phishing email campaigns as well as by abusing online advertising platforms.

About the Campaign

Users in the USA, Canada, Australia, India, and Indonesia are primarily impacted by this campaign. According to Check Point researchers, malware is hidden under several layers of obfuscation and other detection bypass methods to prevent discovery.

zloader malware

The attack commences after the attacker gains initial access through installing a legit enterprise remote monitoring software known as Atera, pretending to be a Java installation. The attacker gains full access to the targeted system.

The attacker then uploads/downloads arbitrary files and executes malicious scripts. Then it exploits Microsoft’s digital signature verification mechanism to inject ZLoader payload. However, the distribution mode of this installer is yet known.

“The techniques incorporated in the infection chain include the use of legitimate remote management software (RMM) to gain initial access to the target machine. The malware then exploits Microsoft’s digital signature verification method to inject its payload into a signed system DLL to further evade the system’s defenses,” Golan Cohen from Check Point wrote in a blog post.

Microsoft Signature Validation Vulnerability Exploited

Check Point researchers state that the cybercrime group Malsmoke is responsible for the newly identified ZLoader campaign. The attackers exploited an old WinVerifyTrust signature validation vulnerability, which lets remote attackers execute arbitrary code through specially designed portable executables by modifying the malicious code snippet without affecting the signature’s validity.

Microsoft fixed the bug in 2013 but revised it in July 2014, after which it stopped enforcing stricter verification mechanisms as a default functionality on compatible new versions of MS Windows.

“In other words, this fix is disabled by default, which is what enables the malware author to modify the signed file,” Cohen added.

Users must exercise caution, never try to install programs from unknown or unofficial sources, and avoid clicking on links or attachments in suspicious emails.

The information contained in this website is for general information purposes only. The information is gathered from Hackread.com, while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk. Through this website, you are able to link to other websites which are not under the control of CSIRT-CY. We have no control over the nature, content and availability of those sites. The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them. Every effort is made to keep the website up and running smoothly. However, CSIRT-CY takes no responsibility for, and will not be liable for, the website being temporarily unavailable due to technical issues beyond our control.

Cyber threats require heightened defences

Working towards a trusted and cyber secure Europe

Protect your cyber hygiene

Cyber Europe 2022 [exercise]