Watch out, Locky ransomware spread via SVG images on Facebook Messenger

KNOWLEDGE BELONGS TO THE WORLD
Share on FacebookTweet about this on TwitterShare on LinkedInShare on RedditShare on Google+Share on TumblrPin on PinterestDigg this

Researchers have discovered a new hacking campaign leveraging on Facebook Messenger to spread the Locky ransomware via SVG images.

The Locky Ransomware is spread via a downloader, experts noticed that it is able to bypass Facebook defense measures by pretending to be a harmless  image file.

The campaign was first spotted during the weekend by the malware expert Bart Blaze and by the researchers Peter Kruse.

‚ÄúEarlier today, a friend of mine notified me of something strange going on with his Facebook account; a message containing only an image (an .svg file in reality) had been sent automatically, effectively bypassing Facebook‚Äôs file extension filter:‚ÄĚ wrote Bart Blaze in a blog post.

SVG images facebook-locky-ransomware

The SVG image file could be used by attackers as a sort of container that can include a malicious code such as a Java Script. 

In May 2015, researchers at the AppRiver security firm discovered a malicious campaign that was distributing a strain of ransomware by exploiting SVG files.

The SVG (Scalable Vector Graphics) is an XML-based vector image format for two-dimensional graphics with support for animation and interactivity. The SVG images include the definition of their behaviors in XML text files, this feature makes possible SVG image can be searched, indexed, scripted, and compressed. Despite SVG images can be created and edited with any text editor, more often they are created directly with a software that elaborates the images.

The experts at AppRiver noticed that threat actors in the wild were exploiting a small JavaScript entry contained in the SVG files that allow them to redirect victims to a website used to serve the Cryptowall malware.

‚ÄúThese SVG files however contained a small javascript entry that would open a webpage to download some malware.‚ÄĚ AppRiver researchers said in a blog post. ‚ÄúThe IP link in question ends up forwarding to another domain where a zip is downloaded of the actual exe payload. It didn‚Äôt auto execute, user interaction would still be needed for that. ‚Äú

Back to the present, the new attack leverages a downloader called Nemucod that is spread via Facebook Messenger as a .svg file, as confirmed by Peter Kruse via Twitter.

Visualizza l’immagine su Twitter

Visualizza l'immagine su Twitter

When the victim accesses the malicious SVG file it will be directed to a website that appears to be YouTube in design only, but once the page is loaded, the victim is asked to install a codec in order to play the video that is shown on the page.

‚ÄúA website purporting to be Youtube, wih a video from Facebook ‚Äď of course, you needed to install an additional extension to view it :)‚ÄĚ continues¬†Bart Blaze.

If the victim installs the Chrome extension as requested on the page, the attack is this spread further via Facebook Messenger. The experts observed that sometimes the malicious Chrome extension installs the Nemucod downloader, which launches the Locky ransomware attack.

The experts warn of several variants of the attack and likely several malicious extensions used to spread malware like the Locky Ransomware.

‚ÄúCurrently, I‚Äôm not exactly sure what this extension is supposed to do beside spreading itself automatically via Facebook, but likely it downloads other malware to your machine.‚ÄĚ Blaze added in the post.

Source:http://securityaffairs.co/

KNOWLEDGE BELONGS TO THE WORLD
Share on FacebookTweet about this on TwitterShare on LinkedInShare on RedditShare on Google+Share on TumblrPin on PinterestDigg this