• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Tech News»James Webb images used to spread malware
Tech News

James Webb images used to spread malware

September 2, 2022No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
James Webb images used to spread malware
Share
Facebook Twitter LinkedIn Pinterest Email

Cyber criminals are exploiting some of the astounding new images captured by Nasa’s James Webb Space Telescope to indiscriminately spread malware to their targets, according to intelligence shared by the threat research team at cloud security analytics specialist Securonix.

In a new report, Securonix analysts D Iuzvyk, T Peck and O Kolesnikov said they had found a unique sample of a persistent Golang-based campaign, which they are tracking as Go#Webfuscator.

As previously explored by Computer Weekly, Golang- or Go-based malwares are increasingly popular among cyber criminals, in particular because their binaries are harder to analyse and reverse engineer when compared to C++ or C#, and because the language is more flexible in terms of cross-platform support, which means they can target more systems at once without needing to be fiddled with. Advanced persistent threat (APT) groups such as Mustang Panda are fans of it for these reasons.

Go#Webfuscator itself is spread via phishing emails containing a Microsoft Office attachment which contains, tucked away in its metadata, an external reference that pulls a malicious template file containing a Visual Basic script to initiate the first stage of code execution, if the victim is unfortunate enough to enable macros.

After deobfuscating the Visual Basic code, the Securonix team found it executed a command to download a .jpg image file and used the certutil.exe command line program to decode it into a binary and then execute it.

The .jpg in question is the now-famous Webb’s First Deep Field image, taken by the James Webb Space Telescope, which shows the SMACS 0723 cluster of galaxies in extraordinary detail, including some of the faintest and most distant objects ever observed in the infrared spectrum.

See also  FormBook knocks Emotet off top of malware chart

In this case, however, it contains malicious Base64 code disguised as an included certificate that, as of Securonix’s disclosure, was not detected by any antivirus software. When decrypted, this in turn is saved into a built Windows executable file, the Golang binary – that is to say, the malware itself.

Go#Webfuscator is a remote access trojan, or RAT, that calls back to its command and control (C2) infrastructure and serves to establish an encrypted channel for control of the victim’s system, or to deliver secondary payloads to exfiltrate sensitive data, which could include passwords, account details and financial information, making its victims vulnerable to fraud or identity theft further down the line.

“Overall, TTPs [tactics, techniques and procedures] observed with Go#Webfuscator during the entire attack chain are quite interesting. Using a legitimate image to build a Golang binary with certutil is not very common in our experience or typical and something we are tracking closely,” the team wrote in their disclosure.

“Consumers must be wary of any unsolicited emails that use the James Webb Space Telescope as their topic and should avoid any Microsoft Office attachments that contain a .jpg image, as this is being used to automatically deliver the malicious payload”
Ray Walsh, ProPrivacy

“It’s clear that the original author of the binary designed the payload with both some trivial counter-forensics and anti-EDR [endpoint detection and response] detection methodologies in mind.”

Ray Walsh, a digital privacy expert at ProPrivacy, said: “Consumers must be wary of any unsolicited emails that use the James Webb Space Telescope as their topic and should avoid any Microsoft Office attachments that contain a .jpg image, as this is being used to automatically deliver the malicious payload.

“Consumers are reminded that these kinds of attacks rely on Office being set to automatically execute macros. We recommend that all Office users change their macro settings to notify them before a macro is executed, as this will help to prevent malware from self-installing.”

For security professionals, further details of the campaign, including indicators of compromise (IoCs), Mitre ATT&CK techniques and Yara rules, are available from Securonix.

 

Source link

images James malware spread Webb
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Getty Images Plunges Into the Generative AI Pool

September 26, 2023

How ChatGPT—and Bots Like It—Can Spread Malware

April 22, 2023

What is a Service Robot? The vision of an intelligent service application is possible.

November 7, 2022

New Erbium Malware (Infostealer) Spreads Via Fake Game Cheats

October 1, 2022
Add A Comment

Comments are closed.

Editors Picks

Building Thought Leadership? Nine Tips For Finding Speaking Engagements

November 22, 2022

Ring Stick Up Cam Pro review

November 1, 2023

Bullet hell FPS Scathe gets new gameplay walkthrough

August 19, 2022

Oak9 adds security for infrastructure-as-code and the cloud 

July 1, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.