Malicious password-protected files - Blog | Menlo Security (2024)

Attackers are constantly crafting new ways to evade enterprise cybersecurity defenses. Consider both how phishing attacks and the delivery of malware are evolving. In this case, through password-protected files to infect endpoints. It’s a growing risk for all organizations.

There was a time when nearly all phishing attacks, whether crafted to cull credentials from an unsuspecting target or to distribute a malware payload, were delivered via email. No more. Today, because email has lost its dominion as the singular communication channel it once was, threat actors are increasingly targeting other communication channels, such as text, social media direct messaging, and collaboration tools. Attackers are not only turning to different social media communication channels and improving their social engineering tactics. They are also using an old and very effective evasion technique: password-protected files with malicious payloads.

Their goal is to evade the protections enterprises' have put into place to defend their email: anti-virus, content filters, and signature-based security tools. Attackers simply find new delivery vectors by sending phishing attacks via communication channels different from email and cleverly hide the malicious payload through encryption.

What are malicious password-protected files?

Attackers use password-protected files, typically delivered through a phishing email, to obfuscate payloads within widely used and legitimate file formats. By encrypting their payloads within these files, the attackers make it much more difficult for traditional anti-malware engines and content filters to identify and stop this malicious content. Despite the risk of malware-infected password-protected files, most organizations have decided not to block them at the email gateway because it can dramatically hurt productivity.

The password-protected files attackers use most often to deliver their malicious payloads include Microsoft Word and Excel (which is more common now since Microsoft disabled macros in Word documents), PDF files, and ZIP files.

Let’s examine how these attacks work.

How seemingly innocuous password-protected files sent through email work to evade security defenses and infect endpoints:

Because password-protected files are encrypted, they can’t be accessed without the password, making them unreadable by most security tools, which cannot open and examine them. Consider how this negatively impacts the defenses in place at the typical organization: A threat actor sends a password-protected file through social media messaging or email. To add credibility to the social-engineering aspect of the attack, the attacker uses file names that will entice the target, such as an invoice or financial information. The attacker also sometimes texts or emails the password to the protected file in a separate communication, trying to add further legitimacy.

The password-protected file containing malware then manages to:

Evade network or gateway security defenses

Because the file is encrypted with a commonly used file extension, the organization allows the file to pass through the email gateway and through any security sandboxes or automated analysis tools (which don’t have the password) onto the user. When/if this file encounters a network security scanning engine, it’s again (because of business productivity concerns) allowed on through to the end user.

Evade endpoint detections

The phishing email and attachment finally reach the endpoint. Whether pretending to be a trusted vendor or perhaps someone from another department in the organization, the attacker manages to trick a certain percentage of users into clicking on the attachment and entering the password provided. The user clicks on the document, or embedded link, which launches the web browser, and the endpoint is now infected.

As mentioned above, attackers could skip email altogether and leverage social media channels to deliver phishing attacks. Here, attackers will send a social media message with a link that launches the web browser and goes to an external storage service such as Box, Dropbox, or Google Drive. In this scenario, the malicious password-protected file is automatically downloaded to the endpoint. The user clicks on the file and enters the password. The attack is identical to the above, except there’s no email necessary. The entire attack occurs within an app and the web browser, or just the web browser.

There are many examples of password-protected files being used in attacks. Here are a few:

  • The North Korean Lazarus group is an example of attackers leveraging these techniques. While pursuing Russian organizations, the group delivered malicious Office documents tucked within ZIP files. Targeted individuals would click on the ZIP file, and users would open what appeared to be a legitimate Word document. That document launches macros that begin infecting the targeted computer. According to the US-CERT, the Trojan then accesses device configuration data, downloads files, can execute commands, modify the system register, screen captures what’s being displayed on the monitor, and otherwise exfiltrate data.
  • Chinese nation-state threat actor Earth Preta recently began its attack campaign with a spear-phishing email with malicious links. The links accessed a cloud storage provider with a password-protected malicious file. Once clicked, the malware is downloaded from the web browser onto the endpoint. Once complete, the malware provided the attackers with backdoor access, command and control, and data exfiltration capabilities.
  • The Qbot botnet has also pushed malware payloads via phishing emails with password-protected ZIP files. These files on targeted devices contain malicious MSI Windows Installer packages or MS Office docs with malicious macros.

Why this technique remains popular among threat actors

According to HP Wolf, 42% of all malware is now delivered as archive files, such as ZIP and RAR. “Archives are attractive to threat actors because they are easily encrypted, making them difficult for web proxies, sandboxes, and email scanners to detect malware," HP Wolf’s Q3 2022 Quarterly Insights Report said.

Cyber attacks that leverage password-protected malicious files are classified as Highly Evasive Adaptive Threats (HEAT). As we’ve covered previously, HEAT attacks arose during the increase in remote work and the hybrid workforce, cloud migration, and the accelerated adoption of software-as-a-service (SaaS) applications. HEAT attacks, such as malicious password-protected files, utilize techniques that successfully avoid detection-based security tools today, such as malicious password-protected files.

Further, HEAT attacks target knowledge workers' go-to productivity software: the web browser. Password-protected malicious files enable threat actors to successfully deliver and execute exploitative payloads because they can avoid the most commonly deployed security defenses.

How to prevent attacks leveraging malicious password-protected files

Organizations that successfully stop HEAT attacks, such as those attacks that hide malicious payloads within password-protected files, will be those that leverage preventative security technology that provides visibility into web browser activity and applies dynamic policy enforcement to prevent zero-hour attacks.

That’s the only way to identify and prevent such HEAT attacks in real time. Because defending against the previous generation of attacks that are known and recognized by current signature-based technologies–such as those that solely targeted email– is not sufficient when it comes to these evasive threats.

Malicious password-protected files - Blog | Menlo Security (2024)
Top Articles
Back up and recover account credentials in the Authenticator app
Mutant
Great Clips Mount Airy Nc
English Bulldog Puppies For Sale Under 1000 In Florida
Fat Hog Prices Today
Unblocked Games Premium Worlds Hardest Game
PRISMA Technik 7-10 Baden-Württemberg
Jennette Mccurdy And Joe Tmz Photos
Bellinghamcraigslist
Beds From Rent-A-Center
Green Bay Press Gazette Obituary
Snarky Tea Net Worth 2022
Truist Drive Through Hours
My.doculivery.com/Crowncork
Myunlb
Moe Gangat Age
10 Great Things You Might Know Troy McClure From | Topless Robot
Cincinnati Bearcats roll to 66-13 win over Eastern Kentucky in season-opener
2024 Non-Homestead Millage - Clarkston Community Schools
Los Angeles Craigs List
Craigslist Motorcycles Orange County Ca
Classic Lotto Payout Calculator
Immortal Ink Waxahachie
Mani Pedi Walk Ins Near Me
Straight Talk Phones With 7 Inch Screen
Sea To Dallas Google Flights
TeamNet | Agilio Software
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
In hunt for cartel hitmen, Texas Ranger's biggest obstacle may be the border itself (2024)
Slv Fed Routing Number
Truis Bank Near Me
Gabrielle Enright Weight Loss
Rocketpult Infinite Fuel
Darrell Waltrip Off Road Center
Ny Post Front Page Cover Today
Solemn Behavior Antonym
Whitehall Preparatory And Fitness Academy Calendar
D3 Boards
Section 212 at MetLife Stadium
Kerry Cassidy Portal
Yogu Cheshire
Express Employment Sign In
Garland County Mugshots Today
Searsport Maine Tide Chart
How the Color Pink Influences Mood and Emotions: A Psychological Perspective
Headlining Hip Hopper Crossword Clue
Plumfund Reviews
Diablo Spawns Blox Fruits
Lorcin 380 10 Round Clip
Cheryl Mchenry Retirement
Bellin Employee Portal
Dr Seuss Star Bellied Sneetches Pdf
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 6223

Rating: 4.2 / 5 (53 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.