Swiss users targeted with Windows, macOS banking Trojan

Swiss users are once again hit with emails delivering banking malware, for both Windows and macOS systems.

Trend Micro researchers believe the campaign to have been mounted by the threat actors behind Operation Emmental, who have been targeting users based in Switzerland for at least four years, as well as occasionally users based in several other “rich” countries like Sweden, the UK and Japan.

macOS banking Trojan targets

In these latest attacks, one of the bogus emails was made to look like a message from a police inspector in Zurich, allegedly claiming that he has been trying (unsuccessfully) to contact the recipient.

To make sure that the targets gets infected whether they use Windows or macOS, the phishing email comes with two files attached (supposedly carrying questions for the user):

  • A .zip file that looks like it’s carrying a Word file but is actually a variant of the OSX_DOK malware disguised as the App Store app, and
  • A .docx file meant to deliver the Werdlod (aka Retefe) banking Trojan to Windows systems.

A file shortcut embedded in the malicious .docx file downloads the Werdlod Trojan from a Dropbox account, while the .zip file requires more interaction from users in order to work – including the user entering their system password.

macOS banking Trojan installation

The fake app is signed with a valid developer certificate, likely belonging to a dummy account or that of a compromised user.

But ultimately both pieces of malware work practically the same: they install proxies on the target machine and fake Comodo certificates, hijack users’ traffic, and redirect them to spoofed banking login pages if they attempt to visit their legitimate online banking service.

“Both WERDLOD and OSX_DOK.C targeted financial institutions, with a particular focus on banks in Switzerland. Further analysis of both malware revealed that their main targets are very similar. While it’s possible that this is a coincidence, the rest of the evidence makes it unlikely for these two malware to target the same organizations by chance,” the researchers noted.

“Given the connection between WERDLOD and OSX_DOK.C, it is reasonable to assume that the latter is also a part of the Operational Emmental campaign.”

A previous attack involving OSX_DOK malware resulted in infected machines that were not easy for tech-unsavvy users to disinfect completely, so it seems likely that the latest victims will also have to call in a specialist to help them with the task.

from Help Net Security – News http://bit.ly/2u8EgbO
via IFTTT

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s