Connect with us

Hi, what are you looking for?

HEADLINES

Sophos uncovers Squirrelwaffle malware, financial fraud attacks using the same vulnerable Exchange server

The researchers discovered that while the malicious spam campaign was being implemented, the same vulnerable server was used for a financial fraud attack with knowledge extracted from a stolen email thread and “typo-squatting” to convince an employee to redirect a legitimate customer transaction to the attackers.

Sophos, a global leader in next-generation cybersecurity, published research detailing an incident when the Squirrelwaffle malware loader was used in conjunction with the ProxyLogon and ProxyShell exploits to target an unpatched Microsoft Exchange server and mass distribute Squirrelwaffle to internal and external recipients by inserting malicious replies onto employees’ existing email threads.

The researchers discovered that while the malicious spam campaign was being implemented, the same vulnerable server was used for a financial fraud attack with knowledge extracted from a stolen email thread and “typo-squatting” to convince an employee to redirect a legitimate customer transaction to the attackers.

The fraud almost succeeded. The transfer of funds to the malicious recipient was authorized, but luckily a bank became suspicious and prevented the transaction from going through. 

Matthew Everts, an analyst at Sophos Rapid Response and one of the researchers, said: “In a typical Squirrelwaffle attack leveraging a vulnerable Exchange server, the attack ends when defenders detect and remediate the breach by patching the vulnerabilities, removing the attacker’s ability to send emails through the server. However, in the incident investigated by Sophos Rapid Response, such remediation wouldn’t have stopped the financial fraud attack because the attackers had exported an email thread about customer payments from the victim’s Exchange server.

Advertisement. Scroll to continue reading.

“It is a good reminder that patching alone isn’t always enough protection. For example, in the case of vulnerable Exchange servers, you need to check that the attackers haven’t left behind a web shell to maintain access. When it comes to sophisticated social engineering attacks such as those used in email thread hijacking, educating employees about what to look out for and how to report it is critical for detection.”

The Squirrelwaffle Incident Guide 

Alongside the new research, Sophos has published a Squirrelwaffle Incident Guide that provides step-by-step guidance on investigating, analyzing, and responding to incidents involving this increasingly popular malware loader, which is distributed as a malicious office document in spam campaigns and provides attackers with an initial foothold in a victim’s environment and a channel to deliver and infect systems with other malware.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

This is in line with the Philippine government’s efforts to strengthen the security and resilience of the country’s cyberspace under the National Cybersecurity Plan...

HEADLINES

The upcoming Paris Olympics, the first in-person summer Games since pandemic restrictions were lifted, are expected to attract thousands of tourists. Amid the event,...

HEADLINES

On July 19th, a significant global IT outage resulted in widespread disruptions across various sectors, impacting businesses, institutions, and critical services.

HEADLINES

Carlos Tengkiat, chief information security officer of the Rizal Commercial Banking Corporation (RCBC), cautioned that millions of pesos can potentially be lost as online...

White Papers

“Criminals focus where they can cause the most pain and disruption so the public will demand quick resolutions, and they hope, ransom payments to...

HEADLINES

Kaspersky solution received an 'Approved' certification for detecting 93% of phishing URLs — the highest among all 15 participants. This accomplishment solidifies Kaspersky's commitment...

HEADLINES

By isolating threats that have evaded detection-based tools – but still allowing malware to detonate safely – HP Wolf Security has specific insight into...

HEADLINES

The database, named "rockyou2024.txt," reportedly contains nearly 10 billion unique passwords, collected from thousands of data leaks. This massive compilation surpasses the previous record...

Advertisement