Introduction

A sophisticated phishing campaign has been identified [1] [2], targeting Microsoft Windows users through weaponized Excel documents. This campaign exploits the CVE-2017-0199 vulnerability [1] [2] [6] [9] [10], a Remote Code Execution (RCE) flaw in unpatched versions of Microsoft Office, with a CVSS score of 7.8 [1]. The attack is initiated via deceptive phishing emails that resemble purchase orders, enticing recipients to open malicious Excel attachments [2].

Description

A sophisticated phishing campaign has been identified that targets Microsoft Windows users through weaponized Excel documents, exploiting the CVE-2017-0199 vulnerability [1] [2] [6] [7] [9] [10], a Remote Code Execution (RCE) flaw affecting unpatched versions of Microsoft Office, which has a CVSS score of 7.8 [1]. The attack is initiated via a deceptive phishing email resembling a purchase order, enticing recipients to open a malicious Excel attachment [2]. Upon opening the document [1] [5] [7], the vulnerability is triggered [4], leading to the download and execution of an HTML Application (HTA) file named “cookienetbookinetcahce.hta,” executed by the mshta.exe utility. This process complicates detection efforts as it facilitates the subsequent download and execution of a malicious executable (EXE) file.

The exploitation process begins when the Excel program accesses a shortened URL that redirects to a specific IP address [3], such as 192.3.220[11], enabling the download of the HTA file [3]. This file employs multiple layers of obfuscation [1] [2], utilizing scripting languages such as JavaScript, VBScript [1] [2] [6] [8], and PowerShell [1] [2] [3] [6] [8], along with encoding methods to evade detection [3]. The HTA file subsequently downloads and executes an additional obfuscated PowerShell script that incorporates anti-analysis and anti-debugging techniques [1], allowing the malware to bypass security measures and deliver the Remcos Remote Access Trojan (RAT) payload directly into the system’s memory [1], utilizing a fileless approach that is challenging to trace [1].

The Remcos RAT [1] [2] [3] [4] [6] [8] [9] [10], a new variant of commercial malware, is known for its advanced capabilities [1], enabling attackers to remotely control infected systems [1], harvest sensitive information [1] [3] [7] [8], and manipulate system settings [1]. Equipped with anti-analysis and anti-debugging features [2], the Remcos RAT employs process hollowing techniques to stealthily inject itself into a new process, allowing it to operate without leaving permanent files on the infected system [2], thereby evading traditional antivirus detection [2]. Once activated [2] [3], the Remcos RAT collects basic information from the victim’s device and establishes communication with its command and control (C&C) server to register the device and await further instructions.

The RAT is capable of extensive data theft and espionage, including capturing keystrokes, logins [4] [7], and financial details [7]. It provides attackers with capabilities such as remote command execution, file harvesting [2] [3], process and service management [3], Windows Registry alterations [2], clipboard content capture [2], keylogging [4] [8], taking screenshots [8], and even the ability to activate the infected system’s camera and microphone, facilitating comprehensive surveillance and control [2]. Its persistence across reboots and ability to remain undetected within system processes pose significant risks to Windows users [7].

The campaign employs sophisticated anti-analysis techniques to ensure the successful deployment and operation of the Remcos RAT on compromised systems [4], allowing attackers to maintain long-term control over infected devices [9]. This development underscores the evolving tactics employed by threat actors to circumvent conventional security measures [2]. To defend against such attacks [6], it is crucial for organizations to maintain robust endpoint security, implement a patch management strategy for Microsoft Office [6], restrict administrative access [7], and utilize advanced email security measures to detect malicious attachments [6]. Additionally, employing updated antivirus software [9], phishing filters [7] [9], and providing regular cybersecurity training to employees can help them identify phishing attempts and suspicious attachments [6], reinforcing the organization’s overall security posture against these sophisticated threats. Multi-layered defenses [7], including antivirus solutions [7], email filtering [7], and continuous monitoring [7], are essential in combating this persistent threat.

Conclusion

The identified phishing campaign highlights the evolving tactics of cyber threat actors, emphasizing the need for robust cybersecurity measures. Organizations must prioritize endpoint security, patch management [6] [7], and administrative access restrictions to mitigate such threats. Advanced email security [6], updated antivirus software [9], and regular employee training are crucial in identifying and preventing phishing attempts. A multi-layered defense strategy, including continuous monitoring [7], is essential to combat these sophisticated threats and protect sensitive information from unauthorized access.

References

[1] https://news.cloudsek.com/2024/11/new-phishing-campaign-fileless-remcos-rat/
[2] https://cybermaterial.com/fileless-remcos-rat-spread-via-excel-exploit/
[3] https://securityaffairs.com/170791/security/a-new-fileless-variant-of-remcos-rat-phishing.html
[4] https://www.fortinet.com/blog/threat-research/new-campaign-uses-remcos-rat-to-exploit-victims
[5] https://blog.netmanageit.com/new-campaign-uses-remcos-rat-to-exploit-victims/
[6] https://www.darkreading.com/application-security/revamped-remcos-rat-microsoft-windows-users
[7] https://cybersecsentinel.com/remcos-rat-malware-campaign-poses-persistent-threat-to-windows-users/
[8] https://cybersecuritynews.com/hackers-windows-users-weaponized-excel/
[9] https://thenimblenerd.com/article/beware-the-remcos-rat-new-malware-variant-hijacks-windows-devices/
[10] https://www.infosecurity-magazine.com/news/remcos-rat-variant-targets-windows/