A new DNS hijacking campaign called GhostDNS is observed in Brazil, that redirects e-banking customers to phishing webpages.
PUBLISH DATE: 22-10-2018
A DNS hijacking campaign arising from Brazil with the name GhostDNS was found to be affecting over 100,000 compromised home routers. The campaign aimed to redirect Brazilian e-banking customers to specially crafted phishing web pages.
Security researchers at Cybereason found out that trusted and signed binaries of companies like HP, NVIDIA, RealTek and VMware were also being misused. The attackers hid malicious code in them which was to be loaded by hijacking a DLL. They also went as far as directly injecting it into trusted programs.
To operate quietly, attackers are abusing trusted and signed binaries, and are hijacking DLLs, to utilize trusted programs as their “malware launchers”. The PowerShell scripts used for execution in this campaign are identical to those previously associated with Brazilian and Chilean campaigns. Some Portuguese references found in the scripts provide evidence that the attackers have Portuguese links.
A reference in an RTF file to two entries by the name of “Equation.3” indicates that attackers are exploiting a Microsoft Office Memory Corruption Vulnerability in their attacks (CVE-2017-11882).
The vulnerability is one of remote code execution which when exploited lets the attacker run arbitrary code in the context of the current user. This means that an attacker could take control of the affected system and install programs; view, change, or delete data; or create new accounts with full user rights if the current user is logged in with administrative privileges.
A list of threat indicators is available to make sure systems are fully protected against these threat indicators.
Following is a list of threat indicators associated with the campaign.
Organizations may consider to block these threat indicators as per their security rules. However, to avoid impacts on your organization, the IP/Domain blocking requires diligence. Moreover, the attackers seem to be exploiting an old Microsoft Office Memory Corruption Vulnerability (CVE 2017-11882) in order to execute code. Therefore, all users should ensure that this vulnerability is addressed and patched.
Since the phishing techniques are also evolving at an exponential rate, employee training and awareness programs about social engineering and phishing scams should be considered.
If you think you’re the victim of a cyber-attack, immediately send an e-mail to firstname.lastname@example.org