{"id":16375,"date":"2019-09-23T12:17:24","date_gmt":"2019-09-23T20:17:24","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/09\/23\/news-10116\/"},"modified":"2019-09-23T12:17:24","modified_gmt":"2019-09-23T20:17:24","slug":"news-10116","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/09\/23\/news-10116\/","title":{"rendered":"Emotet malspam campaign uses Snowden&#8217;s new book as lure"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Mon, 23 Sep 2019 18:40:44 +0000<\/strong><\/p>\n<p>Exactly one week ago, <a rel=\"noreferrer noopener\" aria-label=\"Emotet malicious spam campaigns (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/\" target=\"_blank\">Emotet, one of the most dangerous threats to organizations in the last year, resumed its malicious spam campaigns<\/a> after several months of inactivity. Based on our telemetry, we can see that the botnet started becoming chatty with its command and control servers (C2), about a week or so before the spam came through.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/90_day.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40545\" data-permalink=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-malspam-campaign-uses-snowdens-new-book-as-lure\/attachment\/90_day\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/90_day.png\" data-orig-size=\"1526,272\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"90_day\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/90_day-300x53.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/90_day-600x107.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/90_day.png\" alt=\"\" class=\"wp-image-40545\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/90_day.png 1526w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/90_day-300x53.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/90_day-600x107.png 600w\" sizes=\"(max-width: 1526px) 100vw, 1526px\" \/><\/a><figcaption>Figure 1: Communications with Emotet C2s over 90 days<\/figcaption><\/figure>\n<\/div>\n<p>To kick off its spam campaign last week, Emotet resumed spear phishing tactics it adopted in late spring 2019, hijacking old email threads with personalized subject lines and appearing as old invoices.<\/p>\n<p>This week, Emotet is trying a different tactic, incorporating the news about NSA whistleblower Edward Snowden&#8217;s new book <em><a rel=\"noreferrer noopener\" aria-label=\"Permanent Record (opens in a new tab)\" href=\"https:\/\/www.newyorker.com\/magazine\/2019\/09\/23\/edward-snowden-and-the-rise-of-whistle-blower-culture\" target=\"_blank\">Permanent Record<\/a><\/em> as a lure. The memoir, which is already on Amazon&#8217;s bestseller list, has been the subject of intense debates. In addition, the US government is also <a rel=\"noreferrer noopener\" aria-label=\"suing Snowden (opens in a new tab)\" href=\"https:\/\/www.justice.gov\/usao-edva\/press-release\/file\/1203231\/download\" target=\"_blank\">suing Snowden<\/a> for violating non-disclosure agreements and publishing without prior approval.<\/p>\n<p>Criminals are known to capitalize on newsworthy events for scams and other <a rel=\"noreferrer noopener\" aria-label=\"social engineering (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/01\/hacking-your-head-how-cybercriminals-use-social-engineering\/\" target=\"_blank\">social engineering<\/a> purposes. In this particular case, Emotet authors are supposedly offering Snowden&#8217;s memoir as a Word attachment. We collected emails from our spam honeypot in English, Italian, Spanish, German and <a href=\"https:\/\/twitter.com\/MBThreatIntel\/status\/1176217162794459136?s=20\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"French (opens in a new tab)\">French<\/a> claiming to contain a copy of Snowden&#8217;s book in Word form.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/emails.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40546\" data-permalink=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-malspam-campaign-uses-snowdens-new-book-as-lure\/attachment\/emails-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/emails.png\" data-orig-size=\"1035,885\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"emails\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/emails-300x257.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/emails-600x513.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/emails-600x513.png\" alt=\"Snowden's\" class=\"wp-image-40546\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/emails-600x513.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/emails-300x257.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/emails.png 1035w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/figure>\n<\/div>\n<p>Upon opening the document, a fake message that &#8220;Word hasn&#8217;t been activated&#8221; is displayed to victims who are prompted to enable the content with a yellow security warning. Once they do, nothing appears to happen. However, what users don&#8217;t see is the malicious macro code that will execute once they click on the button.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-1.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40547\" data-permalink=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-malspam-campaign-uses-snowdens-new-book-as-lure\/attachment\/document-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-1.png\" data-orig-size=\"1097,863\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"document\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-1-300x236.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-1-600x472.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-1.png\" alt=\"\" class=\"wp-image-40547\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-1.png 1097w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-1-300x236.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-1-600x472.png 600w\" sizes=\"(max-width: 1097px) 100vw, 1097px\" \/><\/a><figcaption>Figure 3: Fake document containing macro code<\/figcaption><\/figure>\n<p>The macro triggers a PowerShell command that will retrieve the Emotet malware binary from a compromised WordPress site. After infection, the machine will attempt to reach out to one of Emotet&#8217;s many C2s:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/traffic.png\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40548\" data-permalink=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-malspam-campaign-uses-snowdens-new-book-as-lure\/attachment\/traffic-28\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/traffic.png\" data-orig-size=\"781,320\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/traffic-300x123.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/traffic-600x246.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/traffic.png\" alt=\"\" class=\"wp-image-40548\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/traffic.png 781w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/traffic-300x123.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/traffic-600x246.png 600w\" sizes=\"(max-width: 781px) 100vw, 781px\" \/><\/a><figcaption>Figure 4: Network traffic upon infection<\/figcaption><\/figure>\n<\/div>\n<p>As each new week rolls in, the threat actors behind Emotet are always punctual with delivering their spam messages, thanks to their large botnet. And once they&#8217;ve spammed and infiltrated an endpoint, their work is far from over. <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/emotet-revisited-this-pervasive-persistent-threat-is-still-a-danger-to-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"As we've said before (opens in a new tab)\">As we&#8217;ve said before<\/a>, Emotet is a double or even triple threat if it is not quarantined right away.<\/p>\n<p>Follow up payloads, such as <a rel=\"noreferrer noopener\" aria-label=\"TrickBot (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/09\/trickbot-adds-new-trick-to-its-arsenal-tampering-with-trusted-texts\/\" target=\"_blank\">TrickBot<\/a> and <a rel=\"noreferrer noopener\" aria-label=\"Ryuk ransomware (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/malware\/2019\/01\/ryuk-ransomware-attacks-businesses-over-the-holidays\/\" target=\"_blank\">Ryuk ransomware<\/a> are those that can truly cripple any business that is not prepared.<\/p>\n<p><a rel=\"noreferrer noopener\" aria-label=\"Malwarebytes users (opens in a new tab)\" href=\"http:\/\/www.malwarebytes.com\/business\" target=\"_blank\">Malwarebytes business users<\/a> and Premium home users are already protected against this threat.<\/p>\n<h3>Indicators of Compromise (IOCs)<\/h3>\n<p><strong>Malicious Word document<\/strong><\/p>\n<p>5ab7a5cf290ebf52647771f893a2fa322a9b1891e5a5e54811c500dd290c8477<\/p>\n<p><strong>Emotet payload<\/strong><\/p>\n<p>757b35d20f05b98f2c51fc7a9b6a57ccbbd428576563d3aff7e0c6b70d544975<\/p>\n<p><strong>Network traffic<\/strong><\/p>\n<pre class=\"wp-block-code\"><code>Emotet: www.cia.com[.]py\/wp-content\/uploads\/2019\/09\/XNFerERN\/   Emotet C2: 62.75.171.248:7080\/chunk\/window\/ringin\/   Emotet C2: 133.130.73[.]156 Emotet C2: 178.32.255[.]133<\/code><\/pre>\n<p><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-malspam-campaign-uses-snowdens-new-book-as-lure\/\">Emotet malspam campaign uses Snowden&#8217;s new book as lure<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-malspam-campaign-uses-snowdens-new-book-as-lure\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Mon, 23 Sep 2019 18:40:44 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-malspam-campaign-uses-snowdens-new-book-as-lure\/' title='Emotet malspam campaign uses Snowden's new book as lure'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/shutterstock_206726899-1.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Emotet starts a new week of malicious spam by promising a copy of Edward Snowden&#8217;s new book.  <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/botnets\/\" rel=\"category tag\">Botnets<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnet\/\" rel=\"tag\">botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnets\/\" rel=\"tag\">botnets<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/edward-snowden\/\" rel=\"tag\">Edward Snowden<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/emotet\/\" rel=\"tag\">emotet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/macros\/\" rel=\"tag\">macros<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malspam\/\" rel=\"tag\">malspam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/permanent-record\/\" rel=\"tag\">permanent record<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/snowden\/\" rel=\"tag\">snowden<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spam\/\" rel=\"tag\">spam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/whistleblowers\/\" rel=\"tag\">whistleblowers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/word-exploits\/\" rel=\"tag\">Word exploits<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-malspam-campaign-uses-snowdens-new-book-as-lure\/' title='Emotet malspam campaign uses Snowden's new book as lure'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-malspam-campaign-uses-snowdens-new-book-as-lure\/\">Emotet malspam campaign uses Snowden&#8217;s new book as lure<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10410,11195,11562,15715,10796,11928,22991,11457,10518,11635,15755],"class_list":["post-16375","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-botnet","tag-botnets","tag-edward-snowden","tag-emotet","tag-macros","tag-malspam","tag-permanent-record","tag-snowden","tag-spam","tag-whistleblowers","tag-word-exploits"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16375"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16375\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16375"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}