New Attack Method Delivers Malware Via Mouse Hover

科技动态 2017-06-10

'Mouseover' technique relies on users hovering over hyperlinked text and images in Microsoft PowerPoint files to drop Trojan.

Researchers have found a new form of attack that abuses the action of hovering over hyperlinked text and images in a Microsoft PowerPoint presentation.

Trend Micro researchers discovered the "mouseover" technique, used by a Trojan downloader also found in a spam campaign hitting EMEA businesses in the manufacturing, education, pyrotechnics, logistics, and device fabrication industries. The downloader they analyzed delivers a version of the OTLARD banking Trojan, also known as GootKit.

"This is the first occurrence of malware using the 'hover' method to initiate a download that we know of," says Mark Nunnikhoven, Trend Micro's VP of cloud security.

GootKit first appeared in 2012 and grew into an information-stealing Trojan with remote access, persistence, network traffic monitoring, and browser manipulation capabilities. It has traditionally been used to steal banking credentials from European financial businesses.

Today's news is less about the capabilities of GootKit and more about its new method of delivery, which is likely to fall under users' radar.

"While GootKit is known malware, businesses should be more concerned about this latest technique as it shows none of the usual indicators of an infected document," he explains. This is novel because it abuses the previously safe user practice of hovering over a link before clicking.

The malware arrives as a spam email disguised as a purchase order or invoice with a malicious PowerPoint Open XML Slide Show (PPSX), or PowerPoint Show (PPS) file attached. These two file types differ from PowerPoint presentation files (PPT or PPTX), which can be edited. A PPS or PPSX file directly opens into presentation mode.

Once the file is downloaded and opened, it requires user interaction to work. This involves hovering over text or photo embedded with a malicious link, which triggers a mouseover action. From there, they need to enable the content to run when they see a security alert.

The mouseover technique relies heavily on social engineering. Microsoft disables the content of suspicious files by default; a feature part of Protected View in later versions of Office. That's why victims need to open the file and enable malware to run on their machine.

"This technique only targets PowerPoint files," says Nunnikhoven. "I would expect it to expand to other Microsoft Office documents shortly since they support similar functionality."

This tactic won't work in Microsoft PowerPoint Online or "Web mode" in Office 365 because neither have the same actions functionality as offline/desktop versions. Office 365 users can still get hit if they access their accounts and open the bad file via locally installed PowerPoint.

The mouseover tactic is a more streamlined vector for cybercriminals because it doesn't rely on additional or initial vectors to deliver the payload. Office documents are popular in malware attacks because of how often they are used to send information throughout the enterprise, says Nunnikhoven. PDF files are frequently used by cybercriminals for the same reason.

Most malware authors and operators rely on old techniques like banking Trojans, targeted attacks, and malicious macros and shortcut (LNK) files in ransomware. Today's news is a sign that many are experimenting with new techniques.

The implications of this discovery are dangerous. Features like macros and mouse hover have legitimate use cases but could be disastrous under control of a threat actor. A socially engineered email and mouse hover, and maybe a click, is all that's necessary to infect a victim.

There are ways businesses can protect themselves. "The most effective technique against this attack is Web filtering," says Nunnikhoven. "Preventing systems from reaching the sites where malware is hosted is the best way to stop this attack."

End users should use Protect View, which lets them read content while cutting the chance of infection. IT and system admins can lessen the risk by disabling macros, OLEs, and mouse hovers by disabling these features on machines or employing group policies that block users from running them.

If features like mouse hover and macros are critical to business processes, Trend Micro suggests
enabling them only in the applications and software that use them, or only allowing signed or approved macros.


Russia’s ‘Fancy Bear’ Hackers Ex... As dangerous as they may be, the Kremlin-linked hacking group known as APT28, or Fancy Bear, gets points for topicality. Last year, the group hac...
Vega Stealer Malware Takes Aim at Chrome, Firefox A malware dubbed Vega Stealer has been uncovered, looking to make off with saved credentials and credit-card information in the Chrome and Firefox...
Dvmap is said to be Android’s 1st virus with code ... Android viruses get talked about a lot, but the truth is there’s not much risk of ever getting one. Most of the viruses that pop up on Android are...
News in brief: Ariana Grande hacked; new data laws... Your daily round-up of some of the other stories in the news Ariana Grande’s Instagram account hijacked US pop star Ariana Grande (pictured)...
“红遍全球”的恶意软件 Mirai 换了个新马甲,这次瞄上我国2亿多台IoT设备... 在一年前的今天(2016.10.21),美国发生了一起规模极大的互联网瘫痪事故,多个城市的主要网站被攻击,人们发现连经常登录的推特、亚马逊、Paypal 等在内的大量网站连续数小时无法正常访问。 事后查明,一种名为“Mirai”的恶意程序,通过扫描智能摄像头,尝试默认通用密码(比如懒人...