Service to Embed Documents with Malicious Executables for Sale on Cybercrime Forum

Summary

A post on a cybercrime forum is advertising a service allegedly claimed that it can embed documents with any malicious executables.
Category Adversary Intelligence
Affected Industries All
Affected Region Global
 

Executive summary

CloudSEK’s flagship digital risk monitoring platform XVigil discovered a post, on a cybercrime forum, advertising a service allegedly claimed that it can embed documents with any malicious executables. The threat actor claims that the embedded document can bypass Google, Gmail, and Google Drive protection. CloudSEK’s Threat Intelligence Research team is in the process of validating this post. Analysis of the demonstration video indicates exploitation of Microsoft Excel Add-ins extension “.xll”.
Post advertising the service to embed documents with malicious executables
 
Post advertising the service to embed documents with malicious executables
 
Potential Impact Mitigation Measures
The service claims it will enable the buyer to:
  • Embed malicious executables, such as malware, in any document. 
  • Disseminate phishing emails with malicious documents as attachments.
  • Establish initial access to the victim machine.
  • Update anti-virus, prevention and detection endpoints regularly. 
  • Patch all applications and systems. 
  • Backup all data, with one offline backup, periodically. 
  • Avoid downloading suspicious documents. 
  • Don’t enable macros or content of unknown documents.

Table of Contents

Request an easy and customized demo for free