Complete Story
 

07/25/2018

Kronos Malware Returns With New Attack Campaigns, Updates

The State of Security

The Kronos banking trojan has returned with several new attack campaigns as well as a few updates.

In April 2018, researchers at Proofpoint detected a new variant of the malware. It’s the first time Kronos surfaced after largely disappearing from the threat landscape. Given that absence, the trojan’s operators didn’t waste any time in getting up to no good.

Proofpoint observed the first malware campaign at the end of June. As part of that operation, bad actors posed as German financial companies and sent attack emails to German users with subject lines informing them of updates made to their terms and conditions. Other versions of the campaign notified them of a “reminder.” All instances of the campaign contained Word documents that used malicious macros to download Kronos.

The second and third campaigns both occurred in mid-July. For the former, attackers targeted Japan with a malvertising chain that sent users to websites containing malicious JavaScript. Those sites redirected users to the RIG exploit kit that distributed Smoke Loader, just one type of malware served by the compromised website of a Ukraine-based accounting software developer back in August 2017. Smoke Loader then downloaded Kronos.

Read more...

Printer-Friendly Version