Introduction
A sophisticated cyber campaign has been identified, targeting Taiwanese entities in critical sectors such as manufacturing [2], healthcare [1] [2] [3] [4] [5], and information technology [2] [4] [5]. This campaign utilizes an advanced variant of SmokeLoader, a modular malware known for its versatility and advanced evasion techniques [1] [3].
Description
A sophisticated cyber campaign utilizing an advanced variant of SmokeLoader has been observed targeting Taiwanese entities in critical sectors such as manufacturing, healthcare [1] [2] [3] [4] [5], and information technology [2] [4] [5]. SmokeLoader is a modular malware recognized for its versatility [1] [3], advanced evasion techniques [1] [3] [4] [5], and ability to execute a wide range of attacks [4], functioning not only as a downloader for other malicious software but also capable of delivering payloads directly.
Active since September [2], the campaign employs phishing emails crafted with native Chinese nuances [2], often disguised as legitimate price quotes to enhance their effectiveness [2]. These emails are designed to deceive recipients into downloading malicious Office documents, which trigger a VBS file that loads AndeLoader [2], ultimately delivering the SmokeLoader payload [2]. The campaign exploits outdated security vulnerabilities from 2017 [2], specifically CVE-2017-0199 and CVE-2017-11882 [1] [2] [3], enabling the initial stages of the malware to be executed.
SmokeLoader’s modular design is crucial to the attack [1] [3], deploying nine distinct plugins tailored for specialized tasks such as credential theft [1] [3], cookie clearing [1], and code injection into processes [1]. These plugins target widely used applications [1], including popular web browsers like Chrome [1], Firefox [1] [3] [5], and Edge [1] [3], as well as email clients and FTP software [1], to extract sensitive data [1] [3]. For instance, one plugin retrieves credentials and autofill data from web browsers [1], while another focuses on gathering email information from clients like Outlook and Thunderbird [1]. The potential for data breaches and corporate espionage is significant [2], as threat actors can access internal company information and potentially propagate the attack through compromised employee accounts [2].
To mitigate risks [3], it is recommended to keep antivirus signatures up to date [3], engage in phishing awareness training [3], and implement content disarm and reconstruction (CDR) services to neutralize malicious macros in documents [3]. Ongoing monitoring of these campaigns is crucial for implementing effective protective measures against such threats [5], underscoring the need for analysts to exercise caution [3], even with well-known malware [3].
Conclusion
The implications of this cyber campaign are significant, with potential data breaches and corporate espionage posing serious threats to targeted sectors. To mitigate these risks [3], organizations should prioritize updating antivirus signatures, conducting phishing awareness training [3], and employing content disarm and reconstruction services [3]. Continuous monitoring and analysis of such campaigns are essential to developing effective protective strategies, highlighting the importance of vigilance even against familiar malware threats.
References
[1] https://osintcorp.net/smokeloader-malware-campaign-targets-companies-in-taiwan/
[2] https://zerosecurity.org/sophisticated-smokeloader-malware-campaign-targets-taiwanese/17371/
[3] https://www.infosecurity-magazine.com/news/smokeloader-malware-taiwan/
[4] https://gixtools.net/2024/12/smokeloader-malware-resurfaces-targeting-manufacturing-and-it-in-taiwan/
[5] https://www.fortinet.com/blog/threat-research/sophisticated-attack-targets-taiwan-with-smokeloader




