Phishing Attack With Malicious Word Doc Changes Proxy Settings



Microsoft recently came across a threat that uses social engineering but delivers a different payload than the usual Office document with macros. Its primary purpose is to change a user’s browser Proxy Server setting which could result in the theft of authentication credentials or other sensitive information. 

Phishing Email Malicious Word Doc

We've seen OLE embedded objects in malicious Word docs, but we haven't seen this particular new functionality from those objects (using an embedded script to maliciously configure proxy settings). All of the OLE embedded objects that we've encountered kick off scripts that pull down, then execute malicious files -- pretty much as documented in one of Microsoft's earlier blog posts.

Why Would They Do This?
 
At this point we are trying to figure out what would make the bad guy change proxy server settings, since the action required of the user to enable the malicious object is the same as that required to enable a more conventionally embedded macro, and the latter has proven a wildly successful ransomware infection vector for the bad guys.

It could be that OLE embedded objects are simply easier for standard AV engines to flag and block. Plus, a simple Registry setting will thwart the attack (see the last section in the blog post I linked to above).

The other interesting thing about this latest twist on OLE embedded objects is the end game. Why use proxy settings to redirect users' browsers to or through sites controlled by the bad guys?
 
The Microsoft blog suggests two initial reasons: advertising (either to display ads on the victim's PC, much like adware does, or to perform click fraud); phishing (which doesn't make much sense -- why configure proxy settings to perform more phishing when you already had the opportunity to execute malicious code on the victim's PC?).
The blog also suggests that the malicious redirects could be used to steal web credentials or other sensitive information. Again, we do not see why the bad guys would use such a roundabout approach to obtaining that kind of sensitive data when they already had the opportunity to drop a backdoor Trojan or RAT on the victim's PC.
 
Changing Proxy Settings Is Much More Difficult To Detect

The only advantage we can see to the proxy settings approach is that it's a more passive approach (as opposed to running malicious code on the target PC) and much more difficult to detect than a malicious executable on disk or in memory.
 
One final thought: during the last two years we have been observing an increasing number of shady software companies operating out of Russia. They used the same tricks as more traditional adware companies (which are now largely located in and around Tel Aviv) to get their crapware on victims' PCs. 

But the software they dropped was different than the crapware typically pushed by Israeli adware companies. Almost every single one of the Russian companies was dropping proxy programs of some sort on the victims' PC. And they were using those proxies to inject ads into users' browsers or to perform click fraud. Lots and lots of click fraud.

We are wondering whether this latest trick (using phishing emails to push Word docs with embedded OLE objects to flip proxy settings) isn't just a new approach to click fraud operations that used to employ adware-style distribution methods.
 

Free Phish Alert Button

Do your users know what to do when they receive a suspicious email?

Should they call the help desk, or forward it? Should they forward to IT including all headers? Delete and not report it, forfeiting a possible early warning? KnowBe4’s Phish Alert button gives your users a safe way to forward email threats to the security team for analysis and deletes the email from the user's inbox to prevent future exposure. KnowBe4's free Phish Alert for Outlook is an add-in you can download and deploy at no cost.

Get your Phish Alert Button
 
PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:
 

Topics: Phishing



Subscribe To Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews