That PowerShell 'fix' for your root cert 'problem' is a malware loader in disguise

Crafty criminals are targeting thousands of orgs around the world in social-engineering attacks that use phony error messages to trick users into running malicious PowerShell scripts.

This latest Windows malware distribution campaign uses fake Google Chrome, Microsoft Word, and OneDrive error messages that look kinda like real warnings. After visiting a legit but compromised website, victims see some kind of pop-up text box in their browser telling them something went wrong - it's an old but highly effective trick. One worth knowing, we reckon, so that you can help stop colleagues and others falling for it.

Marks are then instructed to click on a "fix" button, and then paste the displayed code into a PowerShell terminal or Windows Run dialog box. This allows PowerShell to run another remote script that downloads and runs the malware on the victim's PC.

Proofpoint malware hunters have spotted at least two criminal gangs using this technique to infect people's machines. At least one of the gangs is very likely using it to spread ransomware, we're told.

"Although the attack chain requires significant user interaction to be successful, the social engineering is clever enough to present someone with what looks like a real problem and solution simultaneously, which may prompt a user to take action without considering the risk," said Tommy Madjar, Dusty Miller, and Selena Larson in a report out this week.

Proofpoint says it spotted a crew dubbed TA571 using this particular PowerShell-powered technique as early as March 1, and the gang behind the ClearFake malware campaign using it since early April. Both were still active in early June, and a third campaign, dubbed ClearFix, has also been testing it out since at least May.

In these attacks, users visit a compromised website that loads a malicious script "hosted on the blockchain via Binance's Smart Chain contracts," the report states - this is apparently called EtherHiding - which then loads a fake warning box in the browser prompting the victim to install a "root certificate" to fix some fictions problem.

The message includes instructions to copy a PowerShell script and then run it manually on the machine. This script flushes the DNS cache, removes the clipboard's contents, displays a decoy message to the user, and then downloads and runs a remote PowerShell script.

This remote script performs a series of Windows Management Instrumentation checks and then drops in Lumma Stealer malware, which downloads three payloads:

In some cases the Amadey malware downloads others, including a Go-based malware that the threat hunters say they believe to be the JaskaGo software nasty, which can be configured for both Windows and macOS machines.

"This means that in total, five distinct malware families could be executed just by running the one initial PowerShell script," they wrote.

Click-no-fix

The ClearFix campaign used a similar strategy. For this one, the attackers used a compromised website with an injection that leads to an iframe overlay. This one displays as a Google Chrome error message that also tells users to open "Windows PowerShell (Admin)" and then paste the sneaky code, eventually leading to the Vidar Stealer being downloaded and executed.

The third campaign, which Proofpoint attributed to TA571, a crew known for the mass spamming of its targets, sent out more than 100,000 phishing emails to thousands of organizations across the globe.

In this one, criminals send emails containing a malicious HTML attachment disguised as a Microsoft Word page. It also shows an error message cautioning that the "Word Online extension is not installed," and then gives them two options: "How to fix" and "Auto-fix."

Clicking "How to fix" copies a Base64-encoded PowerShell command to the computer's clipboard with a message instructing the user to open PowerShell and right-click the console.

Meanwhile, the "Auto-fix button" uses the search-ms protocol to show a WebDAV-hosted "fix.msi" or "fix.vbs" file.

The MSI file, when executed, installs Matanbuchus, another malware loader, while the VBS file downloads and run the DarkGate attack code.

"Proofpoint assesses with high confidence that TA571 infections can lead to ransomware," the researchers said, noting that this crew is continually modifying its email lures and attack chains.

The security shop also includes examples of indicators of compromise, and advises organizations train employees to spot and report suspicious activity - especially for this type of social engineering attack. ®

Search
About Us
Website HardCracked provides softwares, patches, cracks and keygens. If you have software or keygens to share, feel free to submit it to us here. Also you may contact us if you have software that needs to be removed from our website. Thanks for use our service!
IT News
May 20
May 20
Actors' union complains about Epic Games cloning Darth Vader

I'm altering the deal. Pray I don't alter it any further

May 20
Microsoft revives DOS-era Edit in a modern shell

Build Fast, compact, useful? Who are you, and what did you do with Windows?

May 20
Wanted: A handy metric for gauging if GPUs are being used optimally

Even well-optimized models only likely to use 35 to 45% of compute the silicon can deliver

May 20
Torvalds' typing taste test touches tactile tragedy

Opinion There's something wrong with keyboard design, but we can't put our finger on it

May 20
Techies propose the Agent Name Service: It's like DNS but for AI agents

Because nobody wants a random and unverified bot tickling their APIs