Top | |
Newsletter 05/20/2023 |
Back to Contents |
Just When You Thought It Was Safe To Go Back To Your Inbox
Follina, That Big Bad BEC attacker, is Back |
Follina,
Follina, where you been so long? On November 5, 2022, the Dispatches reported on Yours Truly's involvement in mitigating the negative outcomes of a Business Email Campaign (BEC). Further research led me to be convinced that the first attack, on which I had reported, was only the precursor of a second attack that clearly had all the hallmarks of the Follina Vulnerability that has, as one of its targets, users of Office 365. The Follina attack began as a concerted and specially focused spam email campaign. Well, Sports Fans, the unfortunate news, as first reported in BleepingComputer, May 12, 2023, is that the Follina Exploit has returned with a new modus operandi. Although its payload seems even more dangerous than before, its initial means of attack is still a "phishing campaign." Attached to these suspicious emails may be Word docx files or Excel xlsx files. The BleepingComputer reporting draws on earlier research done by Elastic Security Labs, in an depth analysis published, April 07, 2023. What Elastic Security had observed was this new attack was first launched via a "malicious word document named Card & Booking Details.docx. This document has been designed with the intent to deceive the victim and includes two falsified scanned documents, namely a credit card and a passport." The report continues with an in-depth analysis of how the attacker wreaks its destruction. After its initial infection, the malware deletes its initial attack vector. Then the attacker inflicts its real pain on its victims by "first killing the process Winword.exe and then deleting all .DOCX files located in the default Downloads and Desktop folders of every user." The report concludes this section by stating a keen observation of the obvious: "This initial step shows the malware's destructive nature and how it can potentially harm the user's data." Ah, duh! Ultimately, the real intent of this attack, so the report maintains, is the infection of two known and dangerous worms. During our research we discovered that the threat actor has been deploying different payloads. Namely, we observed 2 families: XWORM and AGENTTESLA. XWORM is known for its evasion properties. AGENTTESLA is a known "trojan and credential stealer." A trojan will connect its victims to other Command and Control (C2) servers operated by known and unknown cybercrooks in known and unknown nations and/or regions somewhere on this beautiful blue orb that we call Planet Earth. Credential stealer seems self-explanatory. For my clients and readers, what is most
valuable here, is information on how to avoid nightmares such as Follina.
This requires a certain degree of understanding of all the ways the
attacker will come at you. To put this in military terms, knowing what are
the TACTICS of a Follina Vulnerability cyberattack is
the first line of defense. Elastic Labs defines these tactics
thusly: "Tactics represent the “why” of a technique or
sub-technique. They represent the adversary’s tactical goals: the reason
for performing an action." Here, Elastic Labs, links to
MITRE ATT&CK website. Five different offensive tactics this new attacker employs are listed and succinctly explained .
Initial Access
Execution
Persistence
Command and Control
Defense Evasion Small Businesses, who do not have full time cybersecurity staff monitoring and filtering emails, must therefore rely on one of the most sensitive data filters there is: Their Own Human Brain. Like how Artificial Intelligence must be trained to notice the patterns that emerge from electronic human communication, so must people need to train themselves to recognize the patterns of electronic human communication that can give an indication that an attack is oncoming. The most effective action business owners, and all users, can take is to first only open their Outlook email in text only mode. This way any content in an email can be easily evaluated before interacting with any one email message. Once trained to recognize bad links or deceptive filenames, and therefore verify that the email is, "Not One of Those" — to quote the Glimmer Twins — the individual message, now verified as most likely safe, can then be safely read in HTML and turned back into its pretty and colorful state. If you think you do not the time to do this, ask yourself how much time do you have to waste in cleaning up from an attack? Once a user practices first opening email in text only, I estimate that is maybe 30 extra seconds per email. A Dispatch posted November 6, 2023, that was partly inspired by the first Follina attack, offers a tutorial on how to manage Outlook email in text. The graphics have been slightly improved. As I type this, all of the cyberattackers in action bet that you are too ignorant or too lazy or too stressed out to take the needed defensive measures that can keep the cretins at bay. And so far they are rolling that bet and continue to play with the House's money.
There's an old saying in Tennessee
|
¯\_(ツ)_/¯ |
Back to Top | ← previous post | next post → |