#Qakbot once again had some surprises 🎁 for us this week. See below for a brief overview of what we found. 🧵 1/6
First and foremost, #Qakbot seems to have departed from their usual use of LNK files to trigger execution. Instead they now present .vbs or .js files at the root folder of the disk image 💿. 🧵 2/6
This alone would not be significant, since we have observed 🔍 .js and .vbs files in Qakbots infection chain before. Now however these files also contain a signature that apparently bypasses Windows MotW / SmartScreen warnings. 🧵 3/6
It most likely comes as a response to Microsoft's recent patch that propagates MotW to mounted ISO/IMG virtual disks
The malformed Authenticode signatures that #Qakbot is now using have first been seen as part of the #Magniber ransomware. Here is a good writeup that explains how these signatures seem to confuse SmartScreen: blog.0patch.com/2022/10/free-m… 🧵 5/6
Hopefully, Microsoft will fix this issue soon. Until then, security teams should pay special attention ⚠️ to .js and .vbs files run via wscript.exe from a virtual disk drive! 🧵 6/6
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Raspberry Robin is a malware that has been around for some time now and spreads via infected USB drives.
Here is what we have seen over the last 10 months. 🧵 1/12 #RaspberryRobin#malware
Since December, 2021, we've seen several cases mostly in Hungary🇭🇺 and Germany🇩🇪 but also a few in Russia🇷🇺 and India🇮🇳.
The user always clicked the malicious link, so no automatic infection when the USB drive was plugged in. 🧵 3/12