New Would-Be Ransomware Attack Only Focuses on Stealing Data via the Java-Based STRAAT Malware



Ransomware Attack Steals Data from Java MalwareNew details from Microsoft Security Intelligence discuss an attack that displays ransomware-like behavior, but simply seeks to install the credential theft-focused remote access trojan.

Last week, Microsoft spotted a new attack using the year-old Java RAT, STRAAT, in the wild. Starting as a phishing attack sent under the premise of containing a list of outbound payments made by your company, this attack uses a PDF that connects to an attacker-controlled domain to download and install the STRAAT malware.

ransomware

Source: Microsoft

The multi-faceted malware can be used to collect passwords from browsers and applications including Firefox, Internet Explorer, Chrome, Foxmail, Outlook, and Thunderbird. It also captures keystrokes and can run remote commands and launch PowerShell scripts on the infected endpoint.

Microsoft Security Intelligence noted on Twitter that the current version of the malware is “notably more obfuscated and modular than previous versions, but the backdoor functions mostly remain the same” implying the author is working to improve the efficacy of the malware.

Users need to be aware to simply not engage with unsolicited emails that have little or nothing to do with their job. And even if, in this case, the recipient is in the Accounts Payable department, they should pay close attention to the sender’s email address to make certain your company does business with theirs before opening.

This kind of vigilant behavior is achieved by organizations that employ continual Security Awareness Training, keeping used updated on the latest scams, themes, and social engineering tactics used in phishing attacks.


Free Ransomware Simulator Tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransomware-simulator

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews