{"id":6344,"date":"2017-01-23T15:50:29","date_gmt":"2017-01-23T23:50:29","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-182\/"},"modified":"2017-01-23T15:50:29","modified_gmt":"2017-01-23T23:50:29","slug":"news-182","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-182\/","title":{"rendered":"Been shopping lately? Fake credit card email can spook you into downloading Cerber ransomware"},"content":{"rendered":"<p>As the shopping sprees become increasingly frenetic during holiday season, it\u2019s hard not to worry about how much credit card debt we\u2019re piling. Some of us rely on email notifications from our banks to track the damage to our finances. So what happens when we suddenly get notified about charges for things we never bought?<\/p>\n<p>Microsoft security researchers have received samples of personalized emails that appear to be MasterCard \u00a0notifications. Although not without flaws, these emails can be very effective malware vectors\u2014they can trigger an urgent need to act and open the attached payload.<\/p>\n<p>The payload is a macro downloader embedded in a Word document. Starting with Office 2010, documents from untrusted sources are displayed in Protected View and macros are disabled by default. To overcome this security measure, the malware authors crafted the contents of the attached Word document so that unsuspecting users are convinced about enabling macros to see supposedly important content.<\/p>\n<p>As seen in the screenshot below, the Word document provides step-by-step instructions telling users to leave Protected View and enable macros. One should note that legitimate notifications from MasterCard and other credit card companies do not ask recipients to enable macros.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"317\" class=\"alignnone wp-image-9935 size-full\" alt=\"Instructions in the attached document about enabling macros; these instructions are not from Microsoft\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/Cerber-2-word_doc_instructions.png\" \/><\/p>\n<p><em>Figure <\/em><em>1<\/em><em>. Instructions in the attached document about enabling macros; these instructions are not from Microsoft<\/em><\/p>\n<p>Once the macro is allowed\u00a0to run, it downloads and launches Cerber, a known <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/mmpc\/shared\/ransomware.aspx\">ransomware<\/a>. Cerber victims, recipients who don\u2019t have <a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/windows-defender\">robust antimalware<\/a>, are bound to learn a potentially pricey lesson in computing safety.<\/p>\n<h2>Engineering an urgent response<\/h2>\n<p>Although some aspects of the socially engineered emails are weak, they do have some strong points:<\/p>\n<ul>\n<li><em>Urgency<\/em>\u2014by stating that the recipient is being billed, the attack emails can trick unsuspecting users into opening the malicious attachment without consideration for their safety.<\/li>\n<li><em>Convincing workaround instructions<\/em>\u2014when the attached Word document is opened, it displays well-formatted and well-written instructions on how to enable macros, tricking recipients into facilitating payload detonation. The instructions are made to appear like help content from Microsoft and even have feedback buttons that appear functional.<\/li>\n<\/ul>\n<p>Below is a recreation of one of the sample messages received by Microsoft security researchers. It has been modified to protect the original recipient.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"502\" height=\"296\" class=\"alignnone wp-image-9856 size-full\" alt=\"Recreated attack email\u00a0(original recipient information has been anonymized)\u00a0\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/Cerber-1-email.png\" \/><\/p>\n<p><em>Figure <\/em><em>2<\/em><em>. <\/em><em>Recreated attack email<\/em>\u00a0<em> (original recipient information has been anonymized)<\/em><em>\u00a0<\/em><\/p>\n<h2>Social engineering flaws<\/h2>\n<p>There are some social engineering flaws in the attack emails. In our sample, the sender address does not spoof MasterCard or a bank, making it much less convincing. Also, the apparent use of automated code to copy the recipient local-name to the salutation section of the message and the file name of the attached document is a giveaway. We do concede, however, that this simple attempt at personalization can work and is in fact employed in attacks associated with the highly prevalent <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky\">Ransom:Win32\/Locky<\/a>.<\/p>\n<p>The email itself is crude and shows almost no attempt to feign legitimacy. It contains some typographical errors, such as the missing number between the dollar sign and the comma in our sample. Also, users who are careful enough will likely notice that the sender address does not match the signatory.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"306\" class=\"alignnone wp-image-9886\" alt=\"Social engineering flaws in the attack email\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/Cerber-3-annotated_email_SE.png\" \/><\/p>\n<p><em>Figure <\/em><em>3<\/em><em>. Social engineering flaws in the attack email<\/em><\/p>\n<h2>Scanner evasion and anonymization<\/h2>\n<p>On the technical side, the use of a password-protected Word document allows the embedded macro code to avoid detection by many email scanners. Without password-protection, the macro code is easily detected by antimalware engines\u00a0. (Microsoft detects the macro code in our samples as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:O97M\/Donoff.CU\">TrojanDownloader:O97M\/Donoff.CU<\/a>\u00a0.) To an extent, password-protection also makes the attachment appear legitimate\u2014many bank documents are typically transmitted as password-protected files.<\/p>\n<p>When our researchers detonated the payload by opening the attached document and enabling macros, the embedded macro code began downloading a variant of a known ransomware from the following URL:<\/p>\n<p><em>hxxps:\/\/2cbhkcjhn5suq6t6.onion.to\/explore.exe<\/em><\/p>\n<p>This URL is a hidden Tor web location made available to all web browsers by Tor2web. Hidden Tor web locations allow publishers to stay anonymous and protected from political persecution. However, this anonymity can also be abused by criminals.<\/p>\n<p>Once the download completes, the macro runs PowerShell commands to launch the downloaded ransomware.<\/p>\n<h2>Classic case of ransomware<\/h2>\n<p>The ransomware component is a variant of <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Cerber\">Ransom:Win32\/Cerber<\/a>. Like most ransomware, Cerber encrypts files to render them inaccessible. Unfortunate users who detonate the macro end up with a lot of encrypted files as shown below. Note that the extension name of the encrypted files is not static\u2014Cerber uses a pseudorandom extension.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"603\" height=\"299\" class=\"alignnone wp-image-9945 size-full\" alt=\"Inaccessible user files encrypted by Cerber\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/Cerber-4-inaccessible_files.png\" \/><\/p>\n<p><em>Figure <\/em><em>4<\/em><em>. Inaccessible user files encrypted by Cerber <\/em><\/p>\n<p>Cerber behavior has not changed much compared to earlier versions. After encrypting the files, Cerber attempts to collect ransom by opening a window that displays its ransom note.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"438\" class=\"alignnone wp-image-9885\" alt=\"Cerber ransom note\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/Cerber-5-ransom.png\" \/><\/p>\n<p><em>Figure <\/em><em>5<\/em><em>. Cerber ransom note<\/em><\/p>\n<p>As an additional reminder to its victims, Cerber modifies the desktop wallpaper:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"318\" class=\"alignnone wp-image-9876\" alt=\"Cerber wallpaper\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/Cerber-6-wallpaper-1024x543.png\" \/><\/p>\n<p><em>Figure <\/em><em>6<\/em><em>. Cerber wallpaper serves a painful reminder to victims<\/em><\/p>\n<p>In the ransom note, users are reassured that their files are intact and are told to purchase the Cerber Decryptor from a list of URLs. Victims who do not purchase the decryption tool are left unable to access the contents of their files.<\/p>\n<p>Victims who do go to the URLs find the same features that the scammers have had on their website since the early versions of Cerber:<\/p>\n<ul>\n<li>Support for multiple languages, including several European languages, Chinese, and Japanese<\/li>\n<li>An image CAPTCHA mechanism to prevent robots from using the site<\/li>\n<li>Special rates for those who purchase the decryption tool in the next few days<\/li>\n<\/ul>\n<p>Below are screenshots of the ransomware website.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"382\" class=\"alignnone wp-image-9895\" alt=\"Language options on the ransomware website\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/Cerber-7-languages-1024x652.png\" \/><\/p>\n<p><em>Figure <\/em><em>7<\/em><em>. Language options on the ransomware website<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"473\" class=\"alignnone wp-image-9955\" alt=\"Anti-robot CAPTCHA on the ransomware website\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/Cerber-8-captcha1-1024x807.png\" \/><\/p>\n<p><em>Figure <\/em><em>8<\/em><em>. Anti-robot CAPTCHA on the ransomware website<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"362\" class=\"alignnone wp-image-10005\" alt=\"Special rate countdown on the ransomware website\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/Cerber-9-sale_countdown1-1024x617.png\" \/><\/p>\n<p><em>Figure <\/em><em>9<\/em><em>. Special rate countdown on the ransomware website<\/em><\/p>\n<h2>Be safe and save<\/h2>\n<p>An effective way to avoid this ransomware attack is to be extremely wary of unsolicited emails and emails coming from unknown sources. Check the sender name and consider contacting the company or institution represented by the unsolicited email to verify the email\u2019s authenticity.<\/p>\n<p>Ransomware may also come from other sources, including pirated software and along with legitimate applications that have been repackaged inside a <a href=\"https:\/\/www.microsoft.com\/security\/portal\/mmpc\/Shared\/Glossary.aspx#software_bundler\">software bundler<\/a>. Obtain software from trustworthy sources, such as the Windows Store, or directly from the software vendor\u2019s website.<\/p>\n<p>Microsoft recommends\u00a0running robust antimalware, like Windows Defender, to help stop ransomware and other malicious code from causing irreversible or costly damage. Windows Defender uses behavioral heuristics\u2014it actively checks for suspicious behavior and references advanced algorithms in the cloud. By using behavioral heuristics, Windows Defender can detect ransomware even before specific signatures become available.<\/p>\n<p>The screenshot below shows Windows Defender detecting Cerber ransomware using only behavioral heuristics.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"422\" class=\"alignnone wp-image-9925\" alt=\"Windows Defender behavior-based proactive detection of Cerber ransomware\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/Cerber-10-BMDetection.png\" \/><\/p>\n<p><em>Figure <\/em><em>10<\/em><em>. Windows Defender behavior-based proactive detection of Cerber ransomware<\/em><\/p>\n<p>Here are some more tips:<\/p>\n<h3><strong>For end users<\/strong><\/h3>\n<ul>\n<li>Use an up-to-date, real-time antimalware product, such as <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17464\/windows-defender-help-protect-computer?ocid=-2147269815\">Windows Defender<\/a> for Windows 10.<\/li>\n<li>Think before you click. Do not open emails from senders you don\u2019t recognize.\u00a0 Upload any suspicious files here: <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/submission\/submit.aspx\">https:\/\/www.microsoft.com\/en-us\/security\/portal\/submission\/submit.aspx<\/a>. This campaign spoofs MasterCard, and can easily be modified to spoof banks and other credit card providers. The attachment is a Word document, which is a commonly distributed file. However, be mindful of documents that instruct you to enable macros\u2014it\u2019s very possible that they contain malicious macros.<\/li>\n<\/ul>\n<h3><strong>For IT administrators<\/strong><\/h3>\n<ul>\n<li>Use Office 365 Advanced Threat Protection. It has a machine learning capability to help your network administrators <a href=\"https:\/\/blogs.office.com\/2016\/01\/14\/leading-the-way-in-the-fight-against-dangerous-email-threats\/\">block dangerous email threats<\/a>. See the <a href=\"https:\/\/www.youtube.com\/watch?v=GEE5y9sE_t4\">Overview of Advanced Threat Protection in Exchange<\/a>: new tools to stop unknown attacks, for details.<\/li>\n<li>Use <a href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/windows-atp\">Windows Defender Advanced Threat Protection<\/a> to help detect, investigate, and respond to advanced and targeted attacks on your enterprise networks.<\/li>\n<li>Use the <a href=\"http:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/5211.how-to-configure-applocker-group-policy-to-prevent-software-from-running.aspx\">AppLocker group policy<\/a>\u00a0to prevent dubious software from running.<\/li>\n<li>Use <a href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/keep-secure\/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies\">Device Guard<\/a> to maintain a custom catalog of known good applications and to stop kernel-level malware with virtualization-based security.<\/li>\n<\/ul>\n<p><span><i>Patrick Estavillo<\/i><\/span><br \/> <span><i>MMPC<\/i><\/span><\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/12\/13\/been-shopping-lately-fake-credit-card-email-can-spook-you-into-downloading-cerber-ransomware\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the shopping sprees become increasingly frenetic during holiday season, it\u2019s hard not to worry about how much credit card debt we\u2019re piling. Some of us rely on email notifications from our banks to track the damage to our finances. So what happens when we suddenly get notified about charges for things we never bought?&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10760,10847,10905,11018,10896,10806,3764,10803,10831,3765,10510,10518,10762],"class_list":["post-6344","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-applocker-group-policy","tag-cerber","tag-device-guard","tag-macro-malware","tag-macro-based-malware","tag-malware","tag-malware-research","tag-mmpc","tag-ransomware","tag-social-engineering","tag-spam","tag-windows-defender"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6344"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6344\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6344"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}