A whopping 186.4 million Americans shopped in stores and online between Black Friday and Cyber Monday this year, according to the National Retail Federation. On average, these shoppers spent $361.90 per person over the five-day Thanksgiving weekend.
The sheer amount of money changing hands during this timeframe is a hugely attractive target for scammers and other cybercriminals. Consumers are often stressed during this period and make purchases that deviate from their normal routine. If a phishing email that seems legitimate enough arrives in such a consumer’s inbox, it’s more likely that the target will take action they shouldn’t.
In essence, the scammers behind these phishing emails are taking advantage of the holiday shopping chaos to the net as many victims as possible. Black Friday and Cyber Monday may have resulted in a nearly $1 trillion payday for legitimate businesses, but it’s highly likely that cybercriminals also took home some personal data and other information they could sell for a profit.
We noticed this strategy most recently with the Trickbot trojan banker. Between December 3 and December 5, a new Trickbot campaign targeted eCommerce shoppers with a phishing email that included a message about an order being shipped, as in the chain below:
Figure 1 Phishing email pretends to be order details
Each of these phishing emails contains a Microsoft Word document as an attachment. The attacker tries to lure the victim to click ‘Enable Editing’ by a commonly used technique.
At first glance, it looks like the document that opens is empty, but the word count at the bottom of the screen suggests otherwise.
Figure 2 Attached word document allegedly empty
The high word count comes about because the attacker ‘hides’ a plaintext JavaScript code known as an Ostap downloader in the document body by setting the text color to white. This allows the test to be there, but not be human-readable.
Figure 3 Plaintext JavaScript code
When the victim enables the included macros, a fake error message will pop up. Meanwhile, in the background, it will save the plaintext JavaScript to ‘Users.jse’ under %appdata%\Microsoft\Massfol. Then the JavaScript is executed via a ‘Wscript.Shell’ Object.
Trend Micro recently did a detailed analysis on the JavaScript dropper.
There are many high-volume campaigns distributing this infection chain since the beginning of December. For example, a few days ago (December 13 to 15), we found a similar campaign to the one from earlier this month delivering Trickbot. The infection chain is very similar between them all, with slight modifications, this time the phishing email is allegedly received from “HelloFax Services.”
Figure 4 New Phishing email
It looks like the attacker used a modified version of the Ostap (Jscript) downloader because:
The holiday season involves a lot of money changing hands. The threat actors behind the latest Trickbot campaigns understand this fact, and they have taken advantage of the stress of the holidays to make money. With so many consumers making purchases, the phishing emails used in this campaign have a strong possibility of success.
Morphisec customers are protected from the Trickbot trojan banker through the power of our moving target defense platform. With a strong prevention methodology, Morphisec’s solution enables businesses large and small to be protected from any exploits.
IOC:
Docs:
Email:
Trickbot:
Trickbot C2: