www.bleepingcomputer.com
Open in
urlscan Pro
104.20.60.209
Public Scan
Submitted URL: https://feedly.com/i/entry/52n1/z/lTzTmgPyzjwpcQsgAXThWJnzNdlmdUTVJWGQ=_18724909a2b:47f0b0b:c51640ac
Effective URL: https://www.bleepingcomputer.com/news/security/new-icedid-variants-shift-from-bank-fraud-to-malware-delivery/amp/
Submission: On March 28 via manual from US — Scanned from DE
Effective URL: https://www.bleepingcomputer.com/news/security/new-icedid-variants-shift-from-bank-fraud-to-malware-delivery/amp/
Submission: On March 28 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
User Consent Prompt Focus Prompt ☰ × * News ▾ ▸ * Security * Microsoft * Software * Ransomware * Hardware * Technology * Linux * Mobile * Google * Tutorials * Virus Removal * Forums * Deals * Downloads * More ▾ ▸ * Startup Database * Uninstall Database * Glossary * Chat on Discord * Send us a Tip! * Welcome Guide Close the sidebar NEW ICEDID VARIANTS SHIFT FROM BANK FRAUD TO MALWARE DELIVERY By BILL TOULAS * March 27, 2023 * 03:25 PM New IcedID variants have been found without the usual online banking fraud functionality and instead focus on installing further malware on compromised systems. According to Proofpoint, these new variants have been seen used by three distinct threat actors in seven campaigns since late last year, focusing on further payload delivery, most notably ransomware. Proofpoint has identified two new variants of the IcedID loader, namely “Lite” (first seen in November 2022) and “Forked” (first observed in February 2023), both delivering the same IcedID bot with a more narrow-focused feature set. Removing unneeded functions on IcedID, which has been deployed in numerous malicious campaigns without many code changes since 2017, makes it stealthier and leaner, which can help the threat actors evade detection. Separate clusters of IcedID activity (Proofpoint) NEW ICEDID CAMPAIGNS Starting in November 2022, the “Lite” variant of the IcedID loader was delivered as a second-stage payload on systems infected by the newly-returned Emotet malware. The “Forked” version of the malware loader first appeared in February 2023, distributed directly through thousands of personalized invoice-themed phishing emails. These messages used Microsoft OneNote attachments (.one) to execute a malicious HTA file that, in turn, runs a PowerShell command which fetches IcedID from a remote resource. At the same time, the victim is served a decoy PDF. Malicious OneNote attachment used in recent campaign (Proofpoint) At the end of February, Proofpoint’s researchers observed a low-volume campaign distributing IcedID “Forked” via fake notices from the National Traffic and Motor Vehicle Safety Act and the U.S. Food and Drug Administration (FDA). It is important to note that while some threat actors use new variants of the IcedID malware, others still choose to deploy the “Standard” variant, with one of the most recent campaigns dating March 10, 2023. THE NEW VARIANTS The “Forked” IcedID loader is quite similar to the “Standard” version in terms of its role, sending basic host info to the C2 and then fetching the IcedID bot. However, “Forked” uses a different file type (COM Server) and features additional domain and string-decryption code, making the payload 12KB larger than the “Standard” version. Domains decryption (Proofpoint) On the other hand, the “Lite” loader variant is lighter, at 20KB, and does not exfiltrate host info to the C2. This change makes sense since it was deployed alongside Emotet, which had already profiled the breached system. The “Forked” version of the IcedID bot is 64KB smaller than the “Standard” bot, and is basically the same malware minus the web injects system, the AiTM (adversary in the middle) functions, and the backconnect capabilities that give threat actors remote access to infected devices. Standard and Forked bot comparison (Proofpoint) IcedID is generally used for initial access by threat actors, so developing new variants is a worrying sign, signifying a shift towards specializing the bot to payload delivery. Proofpoint predicts that most threat actors will continue to use the “Standard” variant, but the deployment of new IcedID versions will likely grow, and more variants may pop up later in 2023. RELATED ARTICLES: How to prevent Microsoft OneNote files from infecting Windows with malware Emotet malware distributed as fake W-9 tax forms from the IRS Emotet malware now distributed in Microsoft OneNote files to evade defenses Microsoft OneNote to get enhanced security after recent malware abuse Emotet malware attacks return after three-month break * Emotet * IcedID * Malware * Malware Loader * OneNote * Phishing View Comments Popular Stories * New MacStealer macOS malware steals passwords from iCloud Keychain * New Microsoft Teams is twice as fast, available for all in June Ad About Us - Terms of Use - Privacy Policy - Ethics Statement Do Not Sell My Info Privacy Settings Copyright @ 2003 - 2023 Bleeping Computer® LLC - All Rights Reserved