{"id":11101,"date":"2018-01-12T14:10:06","date_gmt":"2018-01-12T22:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/12\/news-4872\/"},"modified":"2018-01-12T14:10:06","modified_gmt":"2018-01-12T22:10:06","slug":"news-4872","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/01\/12\/news-4872\/","title":{"rendered":"Fake Spectre and Meltdown patch pushes Smoke Loader malware"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 12 Jan 2018 20:50:29 +0000<\/strong><\/p>\n<p>The <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/exploits\/2018\/01\/meltdown-and-spectre-fallout-patching-problems-persist\/\" target=\"_blank\" rel=\"noopener\">Meltdown and Spectre bugs<\/a> have generated a lot of media attention, and users have been urged to update their machines with fixes made available by various vendors.<\/p>\n<p>While some patches have <a href=\"http:\/\/www.zdnet.com\/article\/meltdown-spectre-firmware-glitch-intel-warns-of-risk-of-sudden-reboots\/\" target=\"_blank\" rel=\"noopener\">created more issues<\/a> than they fixed, we came across a particular one targeted at German users that actually is malware. In fact, German authorities <a href=\"https:\/\/www.bsi-fuer-buerger.de\/BSIFB\/DE\/Service\/Aktuell\/Informationen\/Artikel\/Vorsicht_gefaelschte_BSI_Webseite_11012018.html;jsessionid=43BCA277929EAC92F561F5EF3784C636.2_cid341\" target=\"_blank\" rel=\"noopener\">recently warned<\/a> about phishing emails trying to take advantage of those infamous bugs.<\/p>\n<p>We identified a recently registered\u00a0domain that is offering an information page with various links to external resources about Meltdown and Spectre and how it affects processors. While it appears to come from the German Federal Office for Information Security (BSI), this SSL-enabled phishing site is\u00a0not affiliated with any legitimate or official government entity.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/fake_German_site.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21114 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/fake_German_site.png\" alt=\"\" width=\"1061\" height=\"777\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/fake_German_site.png 1061w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/fake_German_site-300x220.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/fake_German_site-600x439.png 600w\" sizes=\"auto, (max-width: 1061px) 100vw, 1061px\" \/><\/a><\/p>\n<p>Moreover, those same fraudulent domains have links to a ZIP archive (<em>Intel-AMD-SecurityPatch-11-01bsi.zip<\/em>) containing the so-called patch (Intel-AMD-SecurityPatch-10-1-v1.exe), which really is a piece of malware.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/SmokeLoader.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21116 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/SmokeLoader.png\" alt=\"\" width=\"772\" height=\"583\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/SmokeLoader.png 772w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/SmokeLoader-300x227.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/SmokeLoader-600x453.png 600w\" sizes=\"auto, (max-width: 772px) 100vw, 772px\" \/><\/a><\/p>\n<p>Upon running it, users will infect themselves with <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/08\/smoke-loader-downloader-with-a-smokescreen-still-alive\/\" target=\"_blank\" rel=\"noopener\">Smoke Loader<\/a>, a piece of malware that can retrieve additional payloads. Post-infection traffic shows the malicious file attempting to connect to various domains and sending encrypted information:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/postinfection.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21117 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/postinfection.png\" alt=\"\" width=\"547\" height=\"514\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/postinfection.png 547w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/postinfection-300x282.png 300w\" sizes=\"auto, (max-width: 547px) 100vw, 547px\" \/><\/a><\/p>\n<p>The <a href=\"https:\/\/en.wikipedia.org\/wiki\/Subject_Alternative_Name\" target=\"_blank\" rel=\"noopener\">Subject Alternative Name<\/a> field within the abused SSL certificate shows other properties associated with the .bid domain, including one that is a German template for a <a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/fakeFlash.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-3\" title=\"\">fake Adobe Flash Player update<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/SSL.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21120 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/SSL.png\" alt=\"\" width=\"701\" height=\"637\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/SSL.png 701w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/SSL-300x273.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/SSL-600x545.png 600w\" sizes=\"auto, (max-width: 701px) 100vw, 701px\" \/><\/a><\/p>\n<p>We immediately contacted Comodo and CloudFlare to report on this abuse and within minutes the site did not resolve anymore thanks to CloudFlare&#8217;s quick response. Malwarebytes users were already protected at zero-hour against this malware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-21126 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/MBAM.png\" alt=\"\" width=\"661\" height=\"227\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/MBAM.png 871w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/MBAM-300x103.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/MBAM-600x206.png 600w\" sizes=\"auto, (max-width: 661px) 100vw, 661px\" \/><\/p>\n<p>Online criminals are notorious for taking advantage of publicized events and rapidly exploiting them, typically via phishing campaigns. This particular one is interesting because people were told to apply a patch, which is exactly what the crooks are offering under disguise.<\/p>\n<p>It&#8217;s always important to be cautious, especially when urged to perform an action (i.e. calling Microsoft on a toll-free number, or updating a piece of software) because there&#8217;s a chance that such requests are fake and intended to either scam you or infect your computer. There are very few legitimate cases when vendors will directly contact you to apply updates. If that is the case, it&#8217;s always good to verify this information via other online resources or friends first.<\/p>\n<p>Also, remember that sites using HTTPS aren&#8217;t necessarily trustworthy. The presence of a certificate simply implies that the data that transits between your computer and the site is secure, but that has nothing to do with the intentions or content offered, which could be a total scam.<\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Fraudulent site:<\/p>\n<pre>sicherheit-informationstechnik[.]bid<\/pre>\n<p>Fake patch (Smoke Loader):<\/p>\n<pre>sicherheit-informationstechnik.bid\/Download\/Sicherheitsupdate\/Intel-AMD-SecurityPatch-11-01bsi.zip  CD17CE11DF9DE507AF025EF46398CFDCB99D3904B2B5718BFF2DC0B01AEAE38C<\/pre>\n<p>Smoke Loader callbacks:<\/p>\n<pre>coolwater-ltd-supportid[.]ru  localprivat-support[.]ru  service-consultingavarage[.]ru<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/01\/fake-spectre-and-meltdown-patch-pushes-smoke-loader\/\">Fake Spectre and Meltdown patch pushes Smoke Loader malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/01\/fake-spectre-and-meltdown-patch-pushes-smoke-loader\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 12 Jan 2018 20:50:29 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/01\/fake-spectre-and-meltdown-patch-pushes-smoke-loader\/' title='Fake Spectre and Meltdown patch pushes Smoke Loader malware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_563241346.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>German users are being targeted with a rogue patch for the recently announced Meltdown and Spectre flaws.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/german\/\" rel=\"tag\">german<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/meltdown\/\" rel=\"tag\">Meltdown<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/smoke-loader\/\" rel=\"tag\">smoke loader<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/smoke-loader-malware\/\" rel=\"tag\">Smoke Loader Malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/smokeloader\/\" rel=\"tag\">smokeloader<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spectre\/\" rel=\"tag\">Spectre<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/01\/fake-spectre-and-meltdown-patch-pushes-smoke-loader\/' title='Fake Spectre and Meltdown patch pushes Smoke Loader malware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/01\/fake-spectre-and-meltdown-patch-pushes-smoke-loader\/\">Fake Spectre and Meltdown patch pushes Smoke Loader malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,1490,3764,14989,3924,16768,17157,17158,10510,17082],"class_list":["post-11101","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-german","tag-malware","tag-meltdown","tag-phishing","tag-smoke-loader","tag-smoke-loader-malware","tag-smokeloader","tag-social-engineering","tag-spectre"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11101"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11101\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}