Attackers Hide Malware in James Webb Telescope Images

Share post:

Securonix researchers have uncovered a malicious campaign called “GO # WEBBFUSCATOR,” which embeds malicious documents in space images from the Webb telescope.

After investigating a recent incident, researchers discover that the threat actor drops payloads onto the virus scanning platform that are not now marked as malicious.

The infection process begins with a phishing email with an attached malicious document, “Gens-Rates.docx,” which downloads a template file. The file contains an obfuscated VBS macro that auto-executes it macros are enabled in the Office suite.

The code then downloads a JPG image from a remote resource, decodes it into an executable program, and launches it. JPG shows the galaxy cluster SMACS 0723, which was released by NASA in July 2022 when it was launched with an image viewer. When opened with a text editor, the image displays additional content disguised as an accompanying certificate, which is a Base64-encoded payload that turns into the malicious 64-bit executable.

The malware achieves persistence by copying itself and adding a new registry key. Once executed, the malware establishes a DNS connection to the command and control (C2) server and sends encrypted queries.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Massive Credential Stuffing attack exploits home devices

Okta, a leading authentication service, is raising alarms over a massive credential-stuffing attack that cleverly disguises fraudulent login...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways