Malware

Financially Motivated Hackers Group “Cobalt” Now Attack Banks by Launching Weaponized Word Document

Security researchers uncovered a new attack targeting the financial institution such as banks in Kazakhstan, and the attack believed to be initiated by one of the Financially motivated cyber-crime gang “Cobalt”.

Cobalt group actively targeting victims in various countries since at least 2016, they particularly focus on the bank’s network to compromise the internal components such as ATM and card processing system.

Also, researchers believe that this gang was ultimately responsible for  SWIFT banking system attack that causes million dollar damage.

In order to compromise the company or bank sectors, they are sending malicious emails that look like a legitimate one from other trusted partners.

Threat actors from this group building a tailored document to masquerade as a legitimate one with a valid certificate and planed well before executing the attack to evade the detection.

Even though Europol arrested the Cobalt group leader in 2018, the group remains active until today and still targeting the victims around the globe.

In this current attack, researchers found enough evidence that related to the Cobalt group, including a large number of similar Cobalt Strike loaders in this campaign that they used for some previous attacks.

Infection process

Threat actors hosting a weaponized document on the promotion website of Kassa Nova Bank (https://kassanova[.]kz/files/docs/T47188445.doc) and the website claimed financial products and services to the public and small enterprises in Kazakhstan.

Once it’s launched into the targeted system and opened by a victim, the content of document tricks the user to enable the malicious Macro and the Document_Open macro function is automatically triggered once the user presses the “Enable Macros” button.

If it’s enabled, a multistage Infection chain that eventually downloads and executes a Cobalt Strike beacon to proceed with the further infection process.

Cobalt attack infection chain

Threat actors heavily obfuscate the codes used for the malware and it drops the executable payload “file.exe”  which is signed by Sectigo.

Later the executable communicate with its C&C server to download and decrypt a Cobalt Strike beacon. 

According to Checkpoint Research ” Surprisingly, this communication resembles legitimate requests made when viewing the Office 365 Outlook calendar. Looking up the unique request header led us to a GitHub project called “Malleable C2 Profiles”, which offers a variety of “profiles” that mimic the communication patterns of legitimate services, known malware families or even APT groups. “

Cobalt group is known to be mainly attacked in Eastern Europe and Central Asia, and as it turns out, this is the second time that Kassa Nova bank was involved in a Cobalt Group related attack: During December 2018, a malicious attachment was sent from the e-mail address belonging to one of the bank’s employees, Checkpoint said.

To Top

Pin It on Pinterest

Share This