{"id":7893,"date":"2017-06-08T12:11:03","date_gmt":"2017-06-08T20:11:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/06\/08\/news-1675\/"},"modified":"2017-06-08T12:11:03","modified_gmt":"2017-06-08T20:11:03","slug":"news-1675","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/06\/08\/news-1675\/","title":{"rendered":"New social engineering scheme triggers on mouse movement"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 08 Jun 2017 18:49:21 +0000<\/strong><\/p>\n<p>One of threat actors&#8217; favorite malware delivery schemes is social engineering as it remains highly effective against a variety of targets. Malicious spam, in particular, is\u00a0one of the biggest threats enterprises are facing today in the form of\u00a0daily deliveries of fake invoices, contract, and other receipts.<\/p>\n<p>Those attachments can be scripts, PDFs, or Microsoft Office documents, the latter often containing macros designed to retrieve a malicious payload as soon as users activate them. Today we take a look at a sightly different delivery mechanism that does not rely on macros or exploits, but rather a built-in functionality in PowerPoint to run external programs.<\/p>\n<p>This attack abuses the hyperlink feature to\u00a0launch a\u00a0Powershell command\u00a0as soon as the user moves their mouse cursor over that link. The typical attack scenario is described in the diagram below.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/infection_flow.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-18280\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/infection_flow.png\" alt=\"\" width=\"1091\" height=\"811\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/infection_flow.png 1091w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/infection_flow-300x223.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/infection_flow-600x446.png 600w\" sizes=\"auto, (max-width: 1091px) 100vw, 1091px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Malwarebytes <\/a>users were already protected against this threat thanks to our Application Behavior Protection:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-18275\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/PPT_Malwarebytes.gif\" alt=\"\" width=\"600\" height=\"450\" \/><\/p>\n<p>Time will tell whether this new infection vector gains popularity among the criminal element. The fact that it does not need a macro is novel and triggers on mouse activity is a clever move. There is no doubt threat actors will keep on coming up with various twists to abuse the human element.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/06\/new-social-engineering-scheme-triggers-on-mouse-movement\/\">New social engineering scheme triggers on mouse movement<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/06\/new-social-engineering-scheme-triggers-on-mouse-movement\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 08 Jun 2017 18:49:21 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/06\/new-social-engineering-scheme-triggers-on-mouse-movement\/' title='New social engineering scheme triggers on mouse movement'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/shutterstock_377764417.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>No macro, no exploit. This attack uses mouse movement to launch malicious code in booby-trapped documents.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/social-engineering-threat-analysis\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/powerpoint\/\" rel=\"tag\">PowerPoint<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/powershell\/\" rel=\"tag\">powershell<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/06\/new-social-engineering-scheme-triggers-on-mouse-movement\/' title='New social engineering scheme triggers on mouse movement'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/06\/new-social-engineering-scheme-triggers-on-mouse-movement\/\">New social engineering scheme triggers on mouse movement<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12591,11191,10510,10494],"class_list":["post-7893","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-powerpoint","tag-powershell","tag-social-engineering","tag-threat-analysis"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7893"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7893\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}