Dangerous new phishing campaign infects Windows devices with malicious Linux VM

A phishing attack leads to the download of a large fileThe Linux VM comes preloaded with malware, granting crooks all kinds of advantagesSecuronix advises caution when handing inbound emails

A creative new phishing technique has been spotted that looks to trick victims into downloading and installing a virtual Linux machine on their Windows endpoints. The virtual machine comes preloaded with a backdoor, granting the crooks unabated access to the compromised devices.

A report from cybersecurity researchers Securonix dubbed the campaign ‘CRON#TRAP’. It starts with a fake “OneAmerica” survey which distributes the VM installation file (285 MB), and a fake error popup image.

If the victims fall for the trick and trigger the installer, it will run in the background, while showing the fake error message in the front. That way, the victims will think that the survey was unavailable at the time. In the background, though, a fully legit version of a Linux VM, called TinyCore, will be installed via QEMU, a legitimate, open-source virtualization tool that allows for emulating various hardware and processor architectures.

Tricking the AV

Since QEMU is legitimate, no antivirus programs flag it as malicious. Furthermore, they will not flag anything that happens in the virtual machine, since it is walled in and operates as a sandbox. “This emulated Linux environment enables the attacker to operate outside the visibility of traditional antivirus solutions,” the researchers explained.

However, since the VM comes with a backdoor, crooks can use it for a number of things, including network testing and initial reconnaissance, tool installation and preparation, payload manipulation and execution, configuration persistence and privilege escalation, SSH key manipulation for remote access, file and environment management, system and user enumeration, and potential exfiltration or command control channels.

The backdoor was said to contain a tool called Chisel, which is a network tunneling program, pre-configured to set up a secure communications channel with the C2 server.

Since the campaign starts with a simple phishing email, Securonix advises care when handling inbound emails.

Via BleepingComputer

Cactus ransomware hackers say they stole terabytes of Schneider Electric dataHere’s a list of the best firewalls todayThese are the best endpoint protection tools right now

Related posts

Could this be Dell’s fastest laptop ever built? Dell Pro Max 18 Plus set to have ‘RTX 5000 class’ GPU capabilities and Tandem OLED display

Google TV users are getting even more free channels in time for the holidays

Open source machine learning systems are highly vulnerable to security threats

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More