{"id":20340,"date":"2022-10-12T05:20:55","date_gmt":"2022-10-12T13:20:55","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/10\/12\/news-14073\/"},"modified":"2022-10-12T05:20:55","modified_gmt":"2022-10-12T13:20:55","slug":"news-14073","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/10\/12\/news-14073\/","title":{"rendered":"Are threat actors turning to archives and disk images as macro usage dwindles?"},"content":{"rendered":"<p><strong>Credit to Author: Matt Wixey| Date: Wed, 12 Oct 2022 11:00:28 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Malicious macros in Office documents have long been a favorite tactic of threat actors. So <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/ba-p\/3071805\">Microsoft\u2019s announcement in February 2022<\/a> that macros in documents originating from the internet would be blocked by default came as welcome news (despite a <a href=\"https:\/\/nakedsecurity.sophos.com\/2022\/07\/23\/office-macro-security-on-again-off-again-feature-now-back-on-again\/\">brief rollback in July<\/a>). <a href=\"https:\/\/twitter.com\/SophosXOps\/status\/1557695209580171264\">XLM4 macros were also disabled by default<\/a> in Microsoft 365 as of February 2022.<\/p>\n<p>But threat actors have always evolved in response to security developments, and this looks like it will be no exception. Following the <a href=\"https:\/\/docs.microsoft.com\/en-us\/DeployOffice\/security\/internet-macros-blocked\">rollout of Microsoft\u2019s new policy<\/a>, we\u2019ve seen attacks using archive and disk image files \u2013 including the usual suspects (ZIP and RAR), but also more obscure formats like ARJ, ACE, LZH, VHD, and XZ \u2013 accompanying a decrease in detections of popular Office formats.<\/p>\n<p>Archives can make it harder for detection products to inspect and flag malicious content \u2013 even more so with less-popular formats, as they tend to be less well-understood. They can also allow threat actors to bypass the \u2018Mark of the Web&#8217; (MOTW), the tag Microsoft inserts into files originating from the internet. While the MOTW is usually present in the archive file itself, it isn\u2019t always propagated to an archive\u2019s contents once extracted.<\/p>\n<p>But there are some positives. Threat actors sometimes adopt more convoluted attack chains when using archives, which provides more opportunities to detect and block malicious activity. They\u2019re likely less familiar to many users, which may make them pause before opening them (although this cuts both ways, as users may be less aware of the associated risks).<\/p>\n<p>Our Sophos X-Ops researchers have also been working hard to expand our coverage to protect against lesser-known archive types. And some archive software vendors have begun to offer MOTW support, so that extracted contents will also contain the tag.<\/p>\n<h2>Mark-of-the-web<\/h2>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/internet-explorer\/ie-developer\/compatibility\/ms537628(v=vs.85)?redirectedfrom=MSDN\">MOTW was originally an Internet Explorer feature<\/a> that forced saved webpages to run in the same security zone of the site they were saved from (it could also be added manually to HTML documents meant to be viewed locally, such as product manuals and help guides).<\/p>\n<p>MOTW was designed to protect users by ensuring that local webpages didn\u2019t have access to the entire filesystem by running in the \u2018Local Machine zone,\u2019 which has fewer security restrictions. Instead, those webpages were forced to run in the zone of the location the page was saved from.<br \/> In practice, this meant an HTML comment was added to a saved webpage, like this:<\/p>\n<pre>&lt;!-- saved from url=(0028)https:\/\/www.news.sophos.com\/ --&gt;<\/pre>\n<p>Internet Explorer would parse the page for this comment and determine which security policy to apply to the contents, based on the user\u2019s zone settings.<br \/> Microsoft later expanded MOTW to apply to files originating from the internet, including browser downloads and email attachments, and integrated MOTW handling throughout Windows. Instead of an HTML comment, an Alternate Data Stream (ADS) called Zone.Identifier is added to files, and an element of this stream, called ZoneId, contains a value indicating which zone the file came from.<\/p>\n<p>Possible ZoneId values include:<\/p>\n<ul>\n<li>0: Local machine<\/li>\n<li>1: Intranet<\/li>\n<li>2: Trusted sites<\/li>\n<li>3: Internet<\/li>\n<li>4: Untrusted sites<\/li>\n<\/ul>\n<p>Interestingly, some users have reported that the URL is preserved in the ADS in Windows 10. It\u2019s also worth bearing in mind that different applications handle MOTW in different ways (if at all), and the feature is not infallible; security researchers have identified methods to bypass it, and in some applications, files may or may not be tagged with a MOTW, depending on the user\u2019s behavior \u2013 for instance, right-clicking and selecting \u2018Save As,\u2019 versus drag-and-drop.<\/p>\n<p>Let\u2019s look at an example. I\u2019ll download a test file (a Word document containing a simple macro) from an external website, and we\u2019ll take a look at its properties and ADS.<br \/> We see the following notification in the file\u2019s properties:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/1_properties.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87212\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/1_properties.png\" alt=\"Screenshot showing document properties of a downloaded Word file, with the MOTW notification circled in red\" width=\"472\" height=\"584\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/1_properties.png 472w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/1_properties.png?resize=242,300 242w\" sizes=\"auto, (max-width: 472px) 100vw, 472px\" \/><\/a><em>Figure 1: Properties of our sample document<\/em><\/p>\n<p>We can inspect the ADS with the following PowerShell command:<\/p>\n<pre>Get-Content .remote_file.doc -Stream Zone.Identifier<\/pre>\n<p>Which gives us the following output:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/2_ps-ads.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87213\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/2_ps-ads.png\" alt=\"Screenshot of a PowerShell console showing the output of the Get-Content command\" width=\"640\" height=\"83\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/2_ps-ads.png 736w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/2_ps-ads.png?resize=300,39 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><em>Figure 2: Inspecting the ADS of the sample document<\/em><\/p>\n<p>So we have a <strong>ZoneId<\/strong> of 3 (internet zone), and two values of interest, <strong>ReferrerUrl<\/strong> and <strong>HostUrl<\/strong>, which tell us where the file was downloaded from. These may be worth noting for incident responders!<\/p>\n<p>As of version 2203, the default behavior of five Office applications (Access, Excel, PowerPoint, Visio, and Word) is to block macros in files originating from the internet, meaning that users see the following notification when opening this file:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/3_macros_blocked.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87214\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/3_macros_blocked.png\" alt=\"A Microsoft security risk warning which states macros have been blocked\" width=\"640\" height=\"25\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/3_macros_blocked.png 774w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/3_macros_blocked.png?resize=300,12 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/3_macros_blocked.png?resize=768,30 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><em>Figure 3: A notification that macros have been blocked (credit: <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/ba-p\/3071805\">Microsoft<\/a>)<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/4_decision_tree.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87215\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/4_decision_tree.png\" alt=\"A decision tree for blocking or enabling macros\" width=\"640\" height=\"202\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/4_decision_tree.png 1560w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/4_decision_tree.png?resize=300,95 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/4_decision_tree.png?resize=768,242 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/4_decision_tree.png?resize=1024,323 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/4_decision_tree.png?resize=1536,484 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><em>Figure 4: Microsoft&#8217;s decision tree for blocking macros (credit: <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/ba-p\/3071805\">Microsoft<\/a>)<\/em><\/p>\n<p>Of course, organizations can configure their policies differently, but making this the default behavior is likely to frustrate many threat actors who rely on Office macros as an initial infection vector.<\/p>\n<p>This could be one explanation for the increase in archive formats we\u2019ve seen recently. Here\u2019s why it\u2019s a problem: Say you download an \u2018XZ\u2019 archive, created using 7-Zip, from the internet. The properties and ADS contain the MOTW:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/5_xz_motw.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87216\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/5_xz_motw.png\" alt=\"A screenshot of an XZ archive's properties, with the MOTW notice circled in red\" width=\"431\" height=\"519\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/5_xz_motw.png 431w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/5_xz_motw.png?resize=249,300 249w\" sizes=\"auto, (max-width: 431px) 100vw, 431px\" \/><\/a><em>Figure 5: Properties of our sample XZ archive<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/6_xz_ads.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87217\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/6_xz_ads.png\" alt=\"A screenshot of the PowerShell output when examining the ADS of the XZ archive\" width=\"640\" height=\"90\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/6_xz_ads.png 800w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/6_xz_ads.png?resize=300,42 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/6_xz_ads.png?resize=768,108 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><em>Figure 6: Examining the ADS of the XZ archive<\/em><\/p>\n<p>So far so good. But if you then extract the archive and examine the document inside, the MOTW is not propagated:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/7_no_propagation.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87218\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/7_no_propagation.png\" alt=\"A screenshot of an extracted Word document's properties, showing no MOTW propagation\" width=\"462\" height=\"553\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/7_no_propagation.png 462w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/7_no_propagation.png?resize=251,300 251w\" sizes=\"auto, (max-width: 462px) 100vw, 462px\" \/><\/a><em>Figure 7: MOTW not propagated to the extracted document<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/8_ads_xz.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87219\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/8_ads_xz.png\" alt=\"Screenshot of PowerShell output, showing no MOTW in the extracted document\" width=\"640\" height=\"89\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/8_ads_xz.png 797w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/8_ads_xz.png?resize=300,42 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/8_ads_xz.png?resize=768,107 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><em>Figure 8: Examining the ADS of the extracted document<\/em><\/p>\n<p>If an attacker persuades a victim to extract this file (perhaps by using some additional context in a malicious spam email, like \u201cI\u2019ve put this file in a password-protected archive for security reasons\u201d), and the victim opens the document and enables macros (assuming that\u2019s within an organization\u2019s policy rules), the malicious macro will still run.<\/p>\n<p>Most popular archiver products \u2013 including WinRAR, WinZip, and the built-in \u2018extract all\u2019 Windows function &#8211; all support MOTW propagation, although depending on the product, this may be only for certain file extensions or ZoneIds (usually 3 and\/or 4), and attackers may also be able to <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1579895038523609088\">bypass MOTW propagation<\/a>. As of version 22.00, 7-Zip also contains, for the first time, support for MOTW propagation &#8211; although it\u2019s not enabled by default. To configure it, you\u2019ll need to go to <strong>Tools &gt; Options &gt; 7-Zip<\/strong> and select either <strong>Yes<\/strong> or <strong>Office files only<\/strong> under <strong>Propagate Zone.Id<\/strong> stream.<\/p>\n<p>However, some archiver products and methods of extraction don\u2019t propagate MOTW. In the screenshot below, for example, I\u2019ve downloaded the same test file (this time archived as a ZIP file using WinZip). If I extract the contents with the <strong>Expand-Archive<\/strong> cmdlet in PowerShell, the MOTW is not propagated to the Word document. But if I unzip using Windows Explorer, and then check the ADS of the extracted document in my terminal, there\u2019s an MOTW tag:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/9_ps_extraction.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87220\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/9_ps_extraction.png\" alt=\"A screenshot of PowerShell output when extracting an archive using the Expand-Archive cmdlet, and checking the MOTW when extracting via Explorer\" width=\"640\" height=\"183\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/9_ps_extraction.png 677w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/9_ps_extraction.png?resize=300,86 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><em>Figure 9: Examining the ADS of the document after extracting with PowerShell, versus extracting with Explorer<\/em><\/p>\n<p>Of course, it\u2019s unlikely that most users would use a PowerShell cmdlet to extract an archive \u2013 so in this particular scenario, the attacker\u2019s job is more difficult, as most users would probably unzip the archive using Explorer or a popular archiver.<\/p>\n<p>Developer Nobutaka Mantani maintains a list of archiver products, along with whether or not they support MOTW propagation, on a <a href=\"https:\/\/github.com\/nmantani\/archiver-MOTW-support-comparison\">GitHub repository<\/a> (last updated August 27th, 2022).<\/p>\n<h2>Archive formats<\/h2>\n<p>In malicious spam emails, threat actors often attach a password-protected archive, and include the password in the body of the email, as in this example:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/10_malspam_zip.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87221\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/10_malspam_zip.png\" alt=\"A screenshot of a malicious spam email with a ZIP attachment\" width=\"350\" height=\"686\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/10_malspam_zip.png 350w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/10_malspam_zip.png?resize=153,300 153w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><\/a><em>Figure 10: An example of a ZIP archive used as a part of a malicious spam attack<\/em><\/p>\n<p>Some attackers may send the password in a follow-up email, or reference the password obliquely (e.g., \u201cthe password is the current month and year, in the format MMYYYY\u201d) to prevent email scanners and sandboxes from unpacking the archive. The archive itself then contains a malicious payload \u2013 which might be an Office document, an EXE disguised as a PDF, an ISO file, or something else.<\/p>\n<p>In other cases, the email may contain an ISO file or another disk image file as an attachment, as in this case:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/11_malspam_iso.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87222\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/11_malspam_iso.png\" alt=\"A screenshot of a malicious spam email with an ISO attachment\" width=\"640\" height=\"354\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/11_malspam_iso.png 1714w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/11_malspam_iso.png?resize=300,166 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/11_malspam_iso.png?resize=768,424 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/11_malspam_iso.png?resize=1024,566 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/11_malspam_iso.png?resize=1536,849 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><em>Figure 11: An ISO attachment in a malicious spam email<\/em><\/p>\n<p>Whether threat actors use common archive formats like ZIP and RAR, disk image formats like ISO and VHD, or more obscure archive types like ACE, the intentions are the same: smuggling malicious code past gateway scanners and security systems, and executing it.<\/p>\n<p>It&#8217;s worth noting that these aren\u2019t new approaches \u2013 for example, researchers have observed ACE files in attack campaigns <a href=\"https:\/\/blog.frankleonhardt.com\/2015\/malware-sent-in-ace-format\/\">since at least 2015<\/a>, and ARJ files <a href=\"https:\/\/www.welivesecurity.com\/2014\/09\/15\/beware-overdue-invoice-malware-attack-wrapped-arj-file\/\">since at least 2014<\/a>. And threat actors have been using ZIP and ISO files for a while now, so it\u2019s no surprise that there have been some notable attacks using these formats. Here\u2019s a brief overview of some archive and disk image file types, along with instances of attacks in which they\u2019ve been used:<\/p>\n<p><em>Figure 12: Table showing details of a selection of archive and image formats, and which threat actors have used them<\/em><\/p>\n<p>Of course, the above table isn\u2019t exhaustive. There are a multitude of formats to choose from, although threat actors may limit themselves to those supported by popular archivers like WinZip, 7-Zip, and WinRAR. There\u2019s also a wide variety of alternatives to ISO. Researchers reported that <a href=\"https:\/\/github.com\/executemalware\/Malware-IOCs\/blob\/main\/2022-08-18 Bumblebee Loader IOCs\">a recent Bumblebee campaign, for example, used a VHD (virtual hard disk) file<\/a>.<\/p>\n<p>Our Managed Detection and Response (MDR) team responded to several cases in August 2022 involving a behavioral detection for the Bumblebee Loader, where the initial access was via a VHD file with the naming schema <strong>[customerName].vhd<\/strong>. When we investigated further, we found that the overall infection chain was pretty complex: <strong>Phishing email &gt; WeTransfer URL for a file download &gt; .vhd file &gt; LNK shortcut file &gt; PowerShell file &gt; Malicious DLL.<\/strong><\/p>\n<h2>A shift in the threat landscape?<\/h2>\n<p>When we dug into our telemetry from the last few months, we spotted some interesting trends.<\/p>\n<p>First, detections of popular Office formats, which often contain malicious macros, seem to be trending downwards (in a <a href=\"https:\/\/twitter.com\/SophosXOps\/status\/1557695209580171264\">Twitter thread back in August<\/a>, we noted that Excel 4.0 macros were also declining, after Microsoft disabled them by default in 365):<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/13_office.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87223\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/13_office.png\" alt=\"A line graph showing detections for common macro-enabled filetypes\" width=\"640\" height=\"407\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/13_office.png 1380w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/13_office.png?resize=300,191 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/13_office.png?resize=768,488 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/13_office.png?resize=1024,651 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><em>Figure 13: Detections for DOC, DOCM, XLS, or XLSM files between April and September 2022<\/em><\/p>\n<p>So, are threat actors using archive formats to pick up the slack? Hard to say. We did notice that more obscure archive formats (ACE, ARJ, XZ, GZ, and LZH) rose pretty sharply up until mid-June, but that trend seems to be less clear in the last few months (although detections have been on the rise again in the last few weeks after a brief drop, which coincides with the traditional summer holiday season).<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/14_obscure.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87224\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/14_obscure.png\" alt=\"A line graph showing detections for obscure archive types\" width=\"640\" height=\"407\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/14_obscure.png 1379w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/14_obscure.png?resize=300,191 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/14_obscure.png?resize=768,488 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/14_obscure.png?resize=1024,650 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><em>Figure 14: Detections for ACE, ARJ, XZ, GZ, or LZH files between April and September 2022<\/em><\/p>\n<p>With more common formats (ZIP, 7Z, CAB, TAR, and RAR), we haven\u2019t seen much movement in the last few months, although there was a significant spike in early September.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/15_common.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87225\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/15_common.png\" alt=\"A line graph showing detections for common archive filetypes\" width=\"640\" height=\"407\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/15_common.png 1380w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/15_common.png?resize=300,191 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/15_common.png?resize=768,488 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/15_common.png?resize=1024,651 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><em>Figure 15: Detections for ZIP, 7Z, CAB, TAR, or RAR files between April and September 2022<\/em><\/p>\n<p>However, disk image formats (ISO, VHD, and UDF) are trending upwards, peaking in July. These may be particularly attractive to threat actors, as they can be used to <a href=\"https:\/\/attack.mitre.org\/techniques\/T1553\/005\/\">bypass MOTW<\/a>.<a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/16_disk_images.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-87226\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/16_disk_images.png\" alt=\"A line graph showing detections for disk image filetypes\" width=\"640\" height=\"407\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/16_disk_images.png 1378w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/16_disk_images.png?resize=300,191 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/16_disk_images.png?resize=768,488 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/16_disk_images.png?resize=1024,651 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 16: Detections for ISO, VHD, or UDF files between April and September 2022<\/em><\/p>\n<p>Other security firms <a href=\"https:\/\/www.msspalert.com\/cybersecurity-research\/identity-cyberattacks-targeting-microsoft-365-dominate-cybersecurity-incidents-expel-research-finds\/\">have also noted<\/a> a decrease in the use of macros and an increase in other file formats <a href=\"https:\/\/www.proofpoint.com\/uk\/blog\/threat-insight\/how-threat-actors-are-adapting-post-macro-world\">such as ISO and RAR<\/a>.<\/p>\n<p>At present, there\u2019s no evidence to suggest that threat actors will stop using standalone Office files altogether and turn to other formats wholesale. Some organizations may still enable macros due to business needs, and threat actors may adopt more sophisticated pretexts, to try to convince users to remove the MOTW attribute from files. And <a href=\"https:\/\/docs.microsoft.com\/en-gb\/DeployOffice\/security\/internet-macros-blocked#versions-of-office-affected-by-this-change\">Microsoft\u2019s rollout is still ongoing<\/a>, so it may take a while before we see any kind of permanent, significant shift in the threat landscape.<\/p>\n<p>But if this is the start of a long-term change, one positive for defenders and responders is that threat actors often adopt relatively convoluted infection chains when using archives and disk images, as our MDR team noted when investigating several Bumblebee campaigns.<\/p>\n<p>Of course, attacks using traditional macros may also involve complex infection chains. In any case, they provide responders with additional opportunities to detect and block an attack in progress.<\/p>\n<h2>Detection and guidance<\/h2>\n<p>While it\u2019s probably too early to say if archive formats will be adopted by the majority of threat actors long-term, the trends we\u2019ve observed here are definitely worth keeping an eye on.<\/p>\n<p>The use of malicious archives and disk images has three key implications for defenders and responders:<\/p>\n<p><strong>1. Threat actors will often adopt more complex infection chains.<\/strong> This can complicate analysis and investigation, but it also means more opportunities to stop infections in their tracks<\/p>\n<p><strong>2. Configuration and development of scanners and automated security tools.<\/strong> It\u2019s important to be able to inspect the contents of archives and containers, particularly those sent via email or downloaded via the internet. When it comes to email filtering and inbound traffic, defenders should consider blocking most or all of the file types we discuss here by default, unless there\u2019s a specific business need to allow a particular one through.<\/p>\n<p><strong>3. Awareness and education.<\/strong> User awareness programs around email attachments and links are valuable, but should reflect changes in the threat landscape. While many users will be aware of the risks posed by macros in Office documents, they may be less familiar with archive and container formats. Defenders and responders also have a part to play here, in researching these formats and the ways threat actors use them.<br \/> We\u2019ll continue to monitor our telemetry and threat intelligence sources for signs that threat actors are moving to different malware delivery techniques, and the Sophos X-Ops team is continually looking at what formats attackers are using, to ensure that we can protect against both new and old malware.<\/p>\n<h2>Acknowledgments<\/h2>\n<p>Sophos X-Ops thanks Richard Cohen of SophosLabs and Colin Cowie of Sophos\u2019 Managed Detection and Response (MDR) team for their contributions to this report.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/10\/12\/are-threat-actors-turning-to-archives-and-disk-images-as-macro-usage-dwindles\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/10\/shutterstock_1707749884.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Wixey| Date: Wed, 12 Oct 2022 11:00:28 +0000<\/strong><\/p>\n<p>Following Microsoft\u2019s announcement that macros from the internet will be disabled by default, threat actors are using alternative file types for malware delivery. This shift brings both challenges and opportunities for organizations.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10622,27714,129,10796,11928,27030,16771],"class_list":["post-20340","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-archives","tag-bumblebee","tag-featured","tag-macros","tag-malspam","tag-sophos-x-ops","tag-threat-research"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20340"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20340\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20340"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}