sb-au logo
Story image

Trustwave weighs in on last month's Xero phishing spoof

13 Sep 2017

Cybersecurity firm Trustwave has put a recent phishing campaign appearing to be from Kiwi company Xero under the spotlight.

In a blog last week, researchers from SpiderLabs Blog spotted the campaign, which started on August 16.

“This campaign is designed to steal banking and personal information from global customers, by infecting their systems with banking trojans. The packaging of malicious JavaScript in a Zip archive that is accessed through a URL sent via a legit-looking phishing email, provides the perfect means to evade detection mechanisms,” researchers Dr. Fahim Abbasi and Rodel Mendrez report.

Scammers used genuine-looking emails with a xeronet.org domain name and sender details listed as Xero Billing Notifications.

The xeronet.org domain was registered in China on the same day of the campaign launch. Xero’s official domain name is xero.com.

The emails appeared to offer a subscription invoice for the previous billing period, and a link to the supposed invoice.

That link tricked users into downloading a JavaScript file housed in a .ZIP archive. The JavaScript file downloads and launches the Dridex banking malware that steals confidential information.

While the invoice link redirects to the malicious website, other links in the email point to the genuine Xero.com website, researchers explain.

The JavaScript file uses Microsoft ActiveX object MSXML2.XMLHTTP to download the malware to a temp folder.

When the ActiveX WScript Shell object launches the payload, users may witness its execution like any Windows binary.

Researchers say the malware first analyses the operating system, users and applications installed on the infected machine. It then changes policies for a number of system setting and Internet Explorer.

“Dridex is designed to steal banking and personal information by injecting itself into web browsers such as Firefox, Chrome and Internet Explorer. It monitors browsing activity and steals sensitive information for target online banks listed in its configuration file,” researchers explain.

“The malware communicates with several hosts over different ports using SSL. The use of encrypted channels for communication over nonstandard ports adds to the sophistication of the malware,” they continue.

But the attackers aren’t just behind one particular Xero scam. Researchers suspect attackers have also used xeroaccounting.org, quickbooks-support.biz, australiangovernments.com and myobaustralia.org.

Australian firm MYOB was also the subject of a phishing spoof, shortly after the Xero campaign was launched.

While the phishing emails used similar tactics, the malicious JavaScript file downloaded the Ursnif Trojan. It monitors online banking activity and reports captured data back to its server.

In June, MYOB was spoofed in a similar phishing campaign. The company’s COO, Andrew Birch, said that the company was making every effort to bring the fake website down.

“It’s important that people stay alert and consider their safety online. This includes checking the authenticity of invoices, and calling the vendor if in any doubt,” he said at the time.

“We’d also like to remind people to ensure they have good anti-virus protection installed, make sure their software is up-to-date and they have firewalls in place.”

Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More
Link image
Remote working remains a high-risk endeavour
A remote workforce needs phishing protection, automated incident response and security training to avoid the worst from happening. Here's how to get there.More
Story image
Yubico launches latest YubiKey with NFC & USB-C support
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More