{"id":7458,"date":"2017-04-26T12:10:02","date_gmt":"2017-04-26T20:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/26\/news-1249\/"},"modified":"2017-04-26T12:10:02","modified_gmt":"2017-04-26T20:10:02","slug":"news-1249","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/04\/26\/news-1249\/","title":{"rendered":"A story of fonts by the EITest HoeflerText campaign"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 26 Apr 2017 19:45:58 +0000<\/strong><\/p>\n<p>One of the most common malware campaigns from compromised websites is known as <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2014\/10\/exposing-the-flash-eitest-malware-campaign\/\" target=\"_blank\">EITest<\/a> and has traditionally been redirecting victims towards <a href=\"http:\/\/www.malware-traffic-analysis.net\/2017\/04\/20\/index.html\" target=\"_blank\">exploit kits<\/a>. But it also has an alternate payload for browsers other than Internet Explorer, specifically for Google\u00a0Chrome, where it tricks users into downloading a fake font file.<\/p>\n<p>The technique <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/EITest-Nabbing-Chrome-Users-Chrome-Font-Social-Engineering-Scheme\" target=\"_blank\">first exposed\u00a0by Proofpoint<\/a>,\u00a0is simple and yet so clever because it truly creates an illusion that there is a problem with the site being viewed. In addition, the prompt to download\u00a0the &#8216;Chrome Font Pack&#8217; looks sleek and professional:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/HoeflerText1.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17707\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/HoeflerText1.png\" alt=\"\" width=\"2036\" height=\"1118\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/HoeflerText1.png 2036w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/HoeflerText1-300x165.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/HoeflerText1-600x329.png 600w\" sizes=\"auto, (max-width: 2036px) 100vw, 2036px\" \/><\/a><\/p>\n<p>The downloaded file is not a font of course, but malware. The perpetrators have used the standard\u00a0name &#8220;Chrome font.exe&#8221; and a few other variations, but they have been playing with character encoding as well. This alters the file name enough (perhaps to break simple signature detection?) but still looks almost identical to the naked eye.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/HoeflerText2.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17708\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/HoeflerText2.png\" alt=\"\" width=\"2038\" height=\"1118\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/HoeflerText2.png 2038w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/HoeflerText2-300x165.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/HoeflerText2-600x329.png 600w\" sizes=\"auto, (max-width: 2038px) 100vw, 2038px\" \/><\/a><\/p>\n<p>This is how the file looks, side by side with the classic UTF encoding:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17711\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/dir.png\" alt=\"\" width=\"587\" height=\"346\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/dir.png 1170w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/dir-300x177.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/dir-600x354.png 600w\" sizes=\"auto, (max-width: 587px) 100vw, 587px\" \/><\/p>\n<p>When Windows doesn&#8217;t recognize the character set, it will display\u00a0&#8216;?&#8217; instead. Here&#8217;s a quick view of this\u00a0encoding (courtesy of <a href=\"https:\/\/chrome.google.com\/webstore\/detail\/unicode-analyzer\/pipjflhdnjcdflbkmoldkkpphmhcfaio?hl=en-GB\" target=\"_blank\">Unicode Analyzer<\/a>).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17710\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/fontanimation.gif\" alt=\"\" width=\"600\" height=\"354\" \/><\/p>\n<p>Users that proceed and install the so-called font are immediately infected with the Spora ransomware:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/spora_payment.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17713\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/spora_payment.png\" alt=\"\" width=\"1930\" height=\"1380\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/spora_payment.png 1930w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/spora_payment-300x215.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/spora_payment-600x429.png 600w\" sizes=\"auto, (max-width: 1930px) 100vw, 1930px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/premium\/\" target=\"_blank\">Malwarebytes <\/a>already protects you against Spora thanks to its behaviour-based ransomware detection engine.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/a-story-of-fonts-by-the-eitest-hoeflertext-campaign\/\">A story of fonts by the EITest HoeflerText campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/a-story-of-fonts-by-the-eitest-hoeflertext-campaign\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 26 Apr 2017 19:45:58 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/a-story-of-fonts-by-the-eitest-hoeflertext-campaign\/' title='A story of fonts by the EITest HoeflerText campaign'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/shutterstock_383832313-1.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The HoeflerText campaign is known for a fake font download that delivers the Spora ransomware. But did you know it also uses special characters in the dropper&#8217;s file name?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/chrome\/\" rel=\"tag\">chrome<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eitest\/\" rel=\"tag\">eitest<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/font\/\" rel=\"tag\">font<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hoeflertext\/\" rel=\"tag\">hoeflertext<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spora-ransomware\/\" rel=\"tag\">Spora Ransomware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/a-story-of-fonts-by-the-eitest-hoeflertext-campaign\/' title='A story of fonts by the EITest HoeflerText campaign'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/a-story-of-fonts-by-the-eitest-hoeflertext-campaign\/\">A story of fonts by the EITest HoeflerText campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10699,4503,11158,12104,11973,3764,3765,10510,11600],"class_list":["post-7458","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-chrome","tag-cybercrime","tag-eitest","tag-font","tag-hoeflertext","tag-malware","tag-ransomware","tag-social-engineering","tag-spora-ransomware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7458"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7458\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7458"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}