{"id":5867,"date":"2019-09-15T19:56:27","date_gmt":"2019-09-15T22:56:27","guid":{"rendered":"https:\/\/forti1.com\/?p=5867"},"modified":"2025-02-12T19:49:58","modified_gmt":"2025-02-12T19:49:58","slug":"phishing-cuidado-nova-versao","status":"publish","type":"post","link":"https:\/\/forti1.com\/en\/phishing-care-new-version\/","title":{"rendered":"Phishing: New Version of Trojan Malware"},"content":{"rendered":"<p>Phishing: beware of this new version of Trojan malware.<\/p>\n\n\n\n<p><a href=\"\/\/help.fortinet.com\/fos50hlp\/54\/Content\/FortiOS\/fortigate-security-profiles-54\/Antivirus\/Trojan%20horses.htm\">Trojan malware:<\/a> beware of this new version of Trojan malware that spreads through malicious Word documents. <\/p>\n\n\n\n<p>Beware of this new version of Trojan malware <a href=\"https:\/\/forti1.com\/en\/phishing-care-new-version\/\" target=\"_blank\" data-type=\"post\" data-id=\"5867\" rel=\"noreferrer noopener\">Phishing<\/a><\/p>\n\n\n\n<p>A new version of the Trojan <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/ursnif-variant-spreading-word-document\" target=\"_blank\" data-type=\"URL\" data-id=\"https:\/\/www.fortinet.com\/blog\/threat-research\/ursnif-variant-spreading-word-document\" rel=\"noreferrer noopener\">Ursnif<\/a> is being sent via malicious Word documents with the aim of stealing bank information and other credentials.<\/p>\n\n\n\n<p>A new variant of Trojan malware, popular with cyber criminals, is spreading via malicious Word documents with the aim of <a href=\"https:\/\/forti1.com\/en\/malware-stealing-information\/\" target=\"_blank\" data-type=\"post\" data-id=\"6298\" rel=\"noreferrer noopener\">steal data<\/a> bank details and other useful personal information.<\/p>\n\n\n\n<p>O <a href=\"https:\/\/forti1.com\/en\/malware-stealing-information\/\">Malware<\/a> The Ursnif Trojan targets Windows machines and has existed in one form or another since at least 2007, when its code first appeared in the Gozi banking Trojan.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-1024x683.jpg\" alt=\"Ransomware and Phishing Protection\" class=\"wp-image-7309\" title=\"\" srcset=\"https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-1024x683.jpg 1024w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-300x200.jpg 300w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-768x512.jpg 768w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-1536x1024.jpg 1536w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-2048x1365.jpg 2048w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-scaled.jpg 1619w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Fortione Helping Protect Against Ransomware Escalation<\/figcaption><\/figure>\n\n\n\n<p>Ursnif has become incredibly popular with cybercriminals in recent years due to the leaking of its source code online, allowing attackers to take advantage of it for free.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-variantes-do-malware-de-trojan\">Variants of Trojan Malware<\/h2>\n\n\n\n<p>Different variants of <strong>Trojan malware<\/strong> have emerged since the code was leaked. Attackers use it and add their own custom features to steal bank details and other online account credentials.<\/p>\n\n\n\n<p>Researchers from the cybersecurity company <a href=\"https:\/\/forti1.com\/en\/category\/fortinet-news\/\" target=\"_blank\" data-type=\"category\" data-id=\"1\" rel=\"noreferrer noopener\">Fortinet<\/a>identified a new version of the <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/ursnif-variant-spreading-word-document\" target=\"_blank\" data-type=\"URL\" data-id=\"https:\/\/www.fortinet.com\/blog\/threat-research\/ursnif-variant-spreading-word-document\" rel=\"noreferrer noopener\">Ursnif<\/a> in the wild. It's spreading through emails from <a href=\"https:\/\/forti1.com\/en\/10-steps-protection-ransomware\/\" data-type=\"post\" data-id=\"6290\">phishing<\/a> containing Word documents with weapons. <\/p>\n\n\n\n<p>These infected lures are named with the format \"info_ [date] .doc\" and claim that the document was created in an earlier version of Word, requiring the user to enable macros in order to view it.<\/p>\n\n\n\n<p>Activating macros by clicking on the 'Enable Content' command releases the malicious VBA code. It starts the process of dropping a version of the Ursnif malware which, according to the researchers, was only recently compiled on July 25. This indicates how recently this latest incarnation was developed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-processos-executados-pelo-malware\">Processes executed by malware<\/h2>\n\n\n\n<p>Once installed on a system, the malware will execute various \"iexplorer.exe\" processes that appear and disappear repeatedly.<\/p>\n\n\n\n<p>This is Ursnif, creating the necessary conditions to connect to your command and control server. <\/p>\n\n\n\n<p>In an effort to make the activity less suspicious, the list of hosts on the C&amp;C server includes references to Microsoft and security companies.<\/p>\n\n\n\n<p>The researchers warn that the campaign is still active and have provided a review of the Indicators of Compromise in the malware analysis.<\/p>\n\n\n\n<p>The attack techniques deployed in this latest Ursnif campaign may seem basic. Even simple phishing email attacks can still provide hackers with <strong>means of breaking into networks or deploying malware<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-forti-one wp-block-embed-forti-one\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/forti1.com\/ai-automacao-em-seguranca-cibernetica\/\n<\/div><\/figure>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Phishing: beware of this new version of Trojan malware. Trojan malware: beware of this new version of malware [...]<\/p>","protected":false},"author":4,"featured_media":7598,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":null,"ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":null,"ast-hfb-below-header-display":null,"ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":null,"ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":null,"stick-header-meta":null,"header-above-stick-meta":null,"header-main-stick-meta":null,"header-below-stick-meta":null,"astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[2417],"tags":[16,790,33,791],"class_list":["post-5867","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-fortinet","tag-malware","tag-seguranca-de-redes","tag-ursnif-trojan"],"_links":{"self":[{"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/posts\/5867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/comments?post=5867"}],"version-history":[{"count":0,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/posts\/5867\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/media\/7598"}],"wp:attachment":[{"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/media?parent=5867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/categories?post=5867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/tags?post=5867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}