OpenBCM V1.07b11 (WIN32)

Packet Radio Mailbox

DBO595

[LAU JN59RM]

 Login: GAST





  

HB1PMS > TECH     04.02.20 10:02l 97 Lines 4356 Bytes #999 (0) @ WW
BID : 924HB1PMS
Read: GAST
Subj: Emotet Gang Attempts to Infect Japanese Targets wi
Path: DBO595<DBX320<FRB024<BBS645<NL3TD<NL3PRC<GY1BBS<HB1BBS
Sent: 200203/1526Z 6855@HB1BBS.ZL.NLD.EU BPQ6.0.19

Van: HB1PMS@HB1BBS.ZL.NLD.EU

Emotet Gang Attempts to Infect Japanese Targets with the Scare of 
Coronavirus

January 31, 2020 | Identity Theft, Fraud, Scams 

no, monitor, table, antivirus, tools, malware, supplies, detected, digital, 
people, technology, security, computer, equipment, protection, scanning, 
detection, of, desktop, pc, desk, electronic, alert, trojan, work, device, 
scam, warning, spyware, browser, browsing, horse, display, workspace, 
internet, threat, infection, word, scan, modern, icon, connection, place, 
safety, spam, workplace, working
The emails are disguised to look like its sent on behalf of disability 
welfare service provider and public health centers.
The scam has been observed in various prefectures from Japan, including 
Gifu, Osaka, and Tottori.
Researchers noted notorious spam email activities camouflaged as official 
notifications related to coronavirus.

What happened?

A group of researchers reported a malspam campaign disguised as 
notifications to provide more details on preventive measures against 
coronavirus infections, which is currently an epidemic in China.

The emails are disguised to look like its sent on behalf of disability 
welfare service provider and public health centers to gain the confidence of 
the readers.
The attackers were, in fact, distributing Emotet payloads via attachments in 
the emails.
The attachments promise to provide preventive measures against coronavirus 
infections for Japanese citizens.
The scam has been observed in various prefectures from Japan, including 
Gifu, Osaka, and Tottori.
Earlier, the Emotet gang rode on the back on similar trending events where 
it targeted people using custom holiday for Christmas and Halloween, and 
used fake invites to a Greta Thunberg Demonstration to lure targets.

How coronavirus spam mail works?

Reports from the infosec community suggest that the malspam campaign used 
stolen emails (as a template) from previously compromised accounts to 
attempt and infect the recipients. Some experts indicated that "Japanese in 
the subject and file names are strange" and that makes the emails look more 
sophisticated in comparison with other Emotet distribution attempts.

The IBM X-Force Threat Intelligence team noted that, "The subject of the 
emails, as well as the document filenames, are similar, but not identical... 
they are composed of different representations of the current date and the 
Japanese word for 'notification', in order to suggest urgency.ö

Some of the email samples also had the address of the institution that 
supposedly sent the coronavirus infection notification for added 
authenticity in the footer.

Objectives of Emotet attacks

Usually relying on spam emails, Emotet actors attempt to trick their 
prospective recipients into opening email attachments, which, when opened, 
result in the download and installation of the malware.

Users normally see the attachment as a standard Emotet malspam Office 365 
document template that asks them to "Enable Content" to properly view the 
full document.
Doing this enables the macros feature in Microsoft Office which allows the 
Emotet payload to get installed on the victim's device using a PowerShell 
command.
Then, the spam messages are made to travel to other systems to drop other 
malware strains such as the Trickbot trojan, known for delivering 
ransomware.
Ultimately, attackers look to harvest user credentials, browser history, and 
other critical documents.

73 Henk.

======================================================================
  _    _ ____  __ ____  ____   _____ 
 | |  | |  _ \/_ |  _ \|  _ \ / ____|  SYS: Henk (hb1nos@hb1bbs.com)
 | |__| | |_) || | |_) | |_) | (___    QTH: Ouwerkerk - JO11XO
 |  __  |  _ < | |  _ <|  _ < \___ \   BBS: HB1BBS.ZLD.NLD.EU
 | |  | | |_) || | |_) | |_) |____) |  QRV: 27.235 MHz (FM 1200bps)
 |_|  |_|____/ |_|____/|____/|_____/   WEB: www.hb1bbs.com

======================================================================

** Host of BPQ Netrom/Node NLDHUB::NL9HUB 85.214.163.10 UDP 93  

======================================================================
** This message is generated with Sally 7.2.033
----------------------------------------------------------------------
** Timed maandag 03 februari 2020  16:22 West-Europa (standaardtijd)
** BBS HB1PMS@HB1BBS.ZL.NLD.EU





Lese vorherige Mail | Lese naechste Mail


 15.11.2024 03:28:16lZurueck Nach oben