{"id":23638,"date":"2024-01-13T12:27:29","date_gmt":"2024-01-13T20:27:29","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17368\/"},"modified":"2024-01-13T12:27:29","modified_gmt":"2024-01-13T20:27:29","slug":"news-17368","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17368\/","title":{"rendered":"\u201cInhospitality\u201d malspam campaign targets hotel industry"},"content":{"rendered":"<p><strong>Credit to Author: Andrew Brandt| Date: Tue, 19 Dec 2023 11:00:33 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Sophos X-Ops is warning the hospitality industry that a campaign targeting hotels worldwide with password-stealing malware is using emailed complaints about service problems or requests for information as a social engineering lure to gain the trust of the campaign\u2019s targets, before sending them links to malicious payloads.<\/p>\n<p>The attackers are using <a href=\"https:\/\/news.sophos.com\/en-us\/2023\/04\/13\/tax-firms-targeted-by-precision-malware-attacks\/\">a methodology similar to the one Sophos X-Ops uncovered<\/a> in the months leading up to the US federal tax filing deadline in April 2023: They initially contact the target over email that contains nothing but text, but with subject matter a service-oriented business (like a hotel) would want to respond to quickly. Only <em>after<\/em> the target responds to the threat actor\u2019s initial email does the threat actor send a followup message linking to what they claim is details about their request or complaint.<\/p>\n<p>The social engineering angle spans a wide variety of subject matter, but can be categorized into two generalized buckets: complaints about serious issues the sender claims to have experienced in a recent stay, or requests for information to help with a potential future booking.<\/p>\n<p>Sophos X-Ops has already briefed representatives of the Retail and Hospitality Information Sharing and Analysis Center (RH-ISAC) about this attack targeting their industry during the busy end-of-year holiday travel season.<\/p>\n<h3><em>I am writing to inquire<\/em><\/h3>\n<p>The content of the \u2018complaint\u2019-style messages range from allegations of violent attacks or bigoted behavior by members of the hotel staff, to assertions that the \u201cguest\u201d had items stolen or lost from their room. The \u2018requests for information\u2019-type messages included emails asking for accommodations for someone with severe allergies, messages about how the hotel could support a business meeting, or inquiries about accessibility within the hotel for a disabled or elderly guest.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image1-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-953028\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image1-2.png\" alt=\"\" width=\"640\" height=\"261\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image1-2.png 1274w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image1-2.png?resize=300,122 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image1-2.png?resize=768,313 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image1-2.png?resize=1024,418 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>In every case, once a representative from the hotel responded to the initial inquiry asking for more information, the threat actor replied with a message that \u2013 the attacker claims \u2013 links to documentation or evidence supporting their claims or requests. The \u201cdocumentation\u201d is not actual documentation, but the malware payload, wrapped in a password-protected archive file.<\/p>\n<p>The links point to public cloud storage services, such as Google Drive, and the body of the message contains a password (usually numeric) that the recipient is prompted to use to open the Zip or Rar archive at the other end of the download link.<\/p>\n<h3>Common characteristics of email messages in the campaign<\/h3>\n<p>The messages attackers send to hotel staff share some traits that make them more suspicious and merit additional caution by recipients.<\/p>\n<p>Like many successful malspam campaigns, the messages are engineered to play on emotions and on the target\u2019s desire to render assistance \u2013 a self-selecting trait for successful people working in the hospitality industry.<\/p>\n<p>In one example, the threat actor tells a hotel staffer that they left a camera behind in a room that contains photos of a recently deceased relative, and asks the hotel for help locating the camera.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image2-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-953030\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image2-2.png\" alt=\"\" width=\"640\" height=\"137\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image2-2.png 1250w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image2-2.png?resize=300,64 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image2-2.png?resize=768,164 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image2-2.png?resize=1024,219 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>When the hotel staff replied, asking for the room number and name the reservation was under, the threat actor replies, feigning exasperation.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image3-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-953031\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image3-2.png\" alt=\"\" width=\"640\" height=\"361\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image3-2.png 707w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image3-2.png?resize=300,169 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>\u201cI have already told you about my family\u2019s grief, I have lost a very precious thing with my mother\u2019s last memories on it, if I send you a picture of the camera could you please help me\u201d along with a link to a file hosted on Google Drive, and the text \u201cPassword: 123456\u201d below the link.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image4-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-953032\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image4-1.png\" alt=\"\" width=\"640\" height=\"156\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image4-1.png 1280w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image4-1.png?resize=300,73 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image4-1.png?resize=768,187 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image4-1.png?resize=1024,250 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>In another example, the threat actor emails a hotel and asks them to reply because they \u201chave been unable to contact you through the website or by phone.\u201d When the booking agent from the hotel asks them to provide more details about their plans, the threat actor replies, claiming they have booked rooms through the website but need to make arrangements for the accommodation of a family member with a disability. Their second email links to a zip file hosted on Google Drive they claim contains \u201cmedical records and doctor\u2019s recommendations\u201d and, again, a password of 123456 needed to open the file.<\/p>\n<p>In that message, the threat actor adds the following \u201cMy husband mentioned that this Google Drive link may only be compatible with Windows computers. The document holds vital details, including our booking number and proof of payment. It\u2019s essential to familiarize yourself with these details.\u201d<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image5-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-953033\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image5-1.png\" alt=\"\" width=\"640\" height=\"590\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image5-1.png 673w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image5-1.png?resize=300,276 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>In what might be the most egregious example, the threat actor asked for contact with a manager to address a problem they had at the hotel. Once the manager replies, the threat actor writes \u201cI did not expect there are such terrible hotels,\u201d describing a horrifying (fictitious) experience that included mouldy walls, \u201cbedbugs in almost all the furniture\u201d that \u201csignificantly worsened the comfort of my stay,\u201d and an employee who used a racist epithet. The email links to a RAR archive file hosted on the Mega.nz cloud hosting provider, also with a password of 123456, that the sender alleges contains a video of the confrontation between the guest and staff member.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image6-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-953034\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image6-1.png\" alt=\"\" width=\"640\" height=\"448\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image6-1.png 678w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image6-1.png?resize=300,210 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>The emails all contrive an excuse to share documentation with the hotel workers via cloud storage, from Google Drive, Mega.nz, Dropbox, or from an address in the content hosting space of the chat platform Discord. The malicious payloads linked from these messages were compressed in either the Zip or Rar compression format, and used one of the following list of passwords.<\/p>\n<ul>\n<li>1111<\/li>\n<li>123456<\/li>\n<li>2023<\/li>\n<li>info2023<\/li>\n<li>hotel<\/li>\n<li>501949<\/li>\n<\/ul>\n<p>We saw many more examples of creative writing by the threat actor. Emails complained about guests contracting a variety of diseases; concerns over allergic reactions to cleaning products; allegations of being poisoned in the hotel; stains on mattresses, walls, or in bathrooms; insects on furniture in the rooms; purses, rings, expensive watches or cameras being left behind or stolen from rooms; a need for accommodations or assistance for guests with limited mobility or access to technology; and rude, violent, or bigoted behavior by staff directed at the guest.<\/p>\n<h3>Payloads designed to evade sandboxing<\/h3>\n<p>The malware payloads themselves were created with the intent to make it more difficult to scan or detect the malicious content.<\/p>\n<p>The archives are all password-protected, which prevents the cloud service hosting them from casually scanning the contents and detecting whether the payload is malicious.<\/p>\n<p>When unpacked from their archive containers, the malware itself has characteristics that also help it elude immediate detection.<\/p>\n<p>Many of the unzipped or de-archived\u00a0 payload files are vastly larger than a typical executable. Several of the samples we uncovered weigh in at well above 600MB in size. Files of this size might be missed by static endpoint protection scanners designed to process much smaller files.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image7-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-953036\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image7-1.png\" alt=\"\" width=\"323\" height=\"339\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image7-1.png 406w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image7-1.png?resize=286,300 286w\" sizes=\"auto, (max-width: 323px) 100vw, 323px\" \/><\/a>The vast majority of the internal content of those files was just bytes containing zeroes, used as space-filler.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/inhospitality_0bytes_hexview_1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-953038\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/inhospitality_0bytes_hexview_1.png\" alt=\"\" width=\"640\" height=\"378\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/inhospitality_0bytes_hexview_1.png 1313w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/inhospitality_0bytes_hexview_1.png?resize=300,177 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/inhospitality_0bytes_hexview_1.png?resize=768,453 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/inhospitality_0bytes_hexview_1.png?resize=1024,604 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Nearly all of the samples have been signed with a code-validation certificate. Many of the certificates are brand new \u2013 obtained during the course of the campaign\u2019s operational period \u2013 and queries of some of those certificates indicate the signature remains valid for many of the samples, while others appear to be faked or counterfeit, and do not pass validation.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image8-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-953039\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image8-1.png\" alt=\"\" width=\"405\" height=\"483\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image8-1.png 405w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image8-1.png?resize=252,300 252w\" sizes=\"auto, (max-width: 405px) 100vw, 405px\" \/><\/a><\/p>\n<p>Some endpoint protection tools will automatically exclude executables with valid signatures from scanning; Some will only look for the presence of a certificate, not bothering to check whether it is valid.<\/p>\n<h3>Simple but effective password-stealer malware<\/h3>\n<p>Most of the samples appear to be variants of a malware family variously called Redline Stealer or Vidar Stealer. Despite their size, 99% of the volume of the malware executables (with either an <strong>.exe<\/strong> or <strong>.scr<\/strong> extension) that are greater than 600MB in size are just zeroes. The malware code is tacked on to the end of the very large files with jump commands that leap over the empty space.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image9-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-953040\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image9-1.png\" alt=\"\" width=\"283\" height=\"143\" \/><\/a><\/p>\n<p>When executed, the malware immediately connects to a URL on the Telegram encrypted messaging service. The URL points to a chat room, the title of which is a web address used for the bot\u2019s command-and-control. At the time we tested this malware, the C2 address was an IP address and a high-numbered, nonstandard TCP port.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image10-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-953041\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image10-1.png\" alt=\"\" width=\"481\" height=\"418\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image10-1.png 610w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image10-1.png?resize=300,261 300w\" sizes=\"auto, (max-width: 481px) 100vw, 481px\" \/><\/a>The bot then connects to the address it retrieves from the Telegram channel and downloads a payload capable of a variety of features from that address. It uses HTTP POST requests to the C2 server to submit telemetry about the infected machine, including details of account information saved in the browser and screenshots of the desktop. The server delivers information the bot can use to encrypt its communication in response.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image11-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-953042\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image11-1.png\" alt=\"\" width=\"406\" height=\"366\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image11-1.png 552w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image11-1.png?resize=300,271 300w\" sizes=\"auto, (max-width: 406px) 100vw, 406px\" \/><\/a>The malware does not establish persistence on the host machine. It runs once, does its work extracting then exfiltrating the data it wants to steal, then quits. In addition to passwords and cookie information, the bot profiles the machine it is running on, and sends everything about it to the bot controller. The samples we ran did not even delete themselves after running.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image12-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-953043\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image12-1.png\" alt=\"\" width=\"640\" height=\"335\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image12-1.png 1176w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image12-1.png?resize=300,157 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image12-1.png?resize=768,402 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/image12-1.png?resize=1024,536 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a>At the time of this writing, Sophos X-Ops has retrieved more than 50 unique samples from cloud storage where the files were hosted by the threat actors conducting this campaign. We have also reported the malicious links to the various cloud storage providers hosting the malware. Most of those samples displayed few-to-no detections in Virustotal.<\/p>\n<p>Sophos has <a href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/Troj-Agent-BKJE.csv\" target=\"_blank\" rel=\"noopener\">published indicators of compromise to our Github<\/a> repository.<\/p>\n<p>Sophos endpoint security products will detect the malware as <strong>Troj\/Agent-BKJE<\/strong>. Attempts to exfiltrate credentials are blocked using the behavioral detection <strong>Creds_2D<\/strong>.<\/p>\n<h3>Acknowledgments<\/h3>\n<p>Sophos X-Ops thanks Senior Threat Researchers Felix Weyne and Anand Ajjan for spotting the campaign in its early stages and raising the alarm, and staff at the <a href=\"https:\/\/rhisac.org\/\" target=\"_blank\" rel=\"noopener\">RH-ISAC<\/a> for their help disseminating warnings about this attack to their members and the hotel industry at large.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/12\/19\/inhospitality-malspam-campaign-targets-hotel-industry\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/12\/inhospitality_hero_bell-pirate.png\"\/><\/p>\n<p><strong>Credit to Author: Andrew Brandt| Date: Tue, 19 Dec 2023 11:00:33 +0000<\/strong><\/p>\n<p>Social engineering drives password-stealing malware attack against the front desk<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[129,8462,11928,3764,30669,10510,27030,10518,16771],"class_list":["post-23638","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-featured","tag-hotel","tag-malspam","tag-malware","tag-rh-isac","tag-social-engineering","tag-sophos-x-ops","tag-spam","tag-threat-research"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23638"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23638\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}