Phishing Campaign Use CSV Text Files To Install Malware

Share post:

A malicious comma-separated values (CSV) file is now used to infect devices with the malware BazarBackdoor.

The malware BazarBackdoor was developed by the TrickBot group and gives attackers remote access to an internal file that can be used to spread laterally within a network.

A CSV is considered harmless because it is a simple text with no executable code. However, a Dynamic Data Exchange (DDE) feature in Microsoft Excel can be used to execute commands whose output is inputted into the open table, including CSV files.

The phishing campaign disguised as the Payment Remittance Advice provides links to remote websites that download a CSV file with names similar to ‘document-21966.csv.’

This text file contains a strange WMIC call in one of the columns of data called a DDE function. The DDE uses WMIC to create a new PowerShell process, which opens a remote URL, which contains another PowerShell command, which is then executed.

However, the process of installing the malware is not complete without users confirming the execution of the DDE function.

For more information read the original story in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean Job Scam Targeting IT Job Seekers

North Korea’s Lazarus advanced persistent threat (APT) group has launched a sophisticated campaign, “Operation 99,” targeting freelance software...

Hackers Exploit FastHTTP in High-Speed Microsoft 365 Attacks

Threat actors are employing the FastHTTP Go library to launch high-speed brute-force password attacks on Microsoft 365 accounts...

YouTubers Targeted As Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results

Attackers have found a new way to infect people seeking pirated or cracked software: planting malicious download links...

New macOS Malware Exploits Apple’s Security Features to Stay Hidden and Steal User Data

A newly discovered variant of the Banshee macOS Stealer malware is putting 100 million Apple users at risk...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways