Skip to main content

Attackers rely on Google Sheets to spread malware through CSV files



 
  • The malware appears to be a variant of the infamous NanoCore trojan.
CSV files containing the malware payload circumvent Google filters using Google Sheets as a distribution method.
A unique malware that uses Google Sheets has been discovered by well-known cyber security researcher Marco Ramili. The malware is found to be an improved version of the NanoCore RAT detected in 2014. It seems that attackers write malicious code in the cells of CSV files to automatically inject the system with the malware.
Ramili who received a spam mail containing this CSV file, mentioned that one of the cells had an executable command. “A series of empty fields preceding a final and fake formula piping a CMD.exe command is spawned. By using the bitsadmin technique the attacker downloads a file called now.exe and stores it into a temporary system folder for later execution,” he said.
Google Sheets as a malware vector
Earlier, attackers relied on desktop applications such as Microsoft Excel, LibreOffice and Apache OpenOffice due to the reason that they supported Dynamic Data Exchange (DDE). This feature/bug was the main exploit for threat actors. OpenOffice and LibreOffice patched this vulnerability in versions 4.1.1 and 4.3.1 respectively.
In case of files shared through Google Sheets, normal users are likely to consider the file trustworthy, thus exposing themselves to the malware lying in the file if they download and open it locally with Excel.
Modus Operandi
The attackers bypass Google security filters by injecting malicious code in CSV files which are not heavily scanned by Google. Then they share this file with unsuspecting users, asking them to download and open it Microsoft Excel, citing compatibility issues.
Many users fall for this trick and download the file to open it locally on their device. Thus, Google Sheets acts as a malware dropper. As soon as they open it locally, Microsoft Excel becomes the malware executor.
Though the issue has been reported to Google by the security researcher, it has not been considered as a security bug by the company.


Global Locations

  • Block A, A-25, Second Floor, Sector 3
    Noida, Uttar Pradesh
    +91-120 429 1672+91 931 991 8771

Comments

Popular posts from this blog

Phishing Campaigns Targeting Google and Yahoo Accounts To Bypassing Two-Factor Authentication Several phishing campaigns targeting hundreds of individuals across the Middle East and North Africa. The attacker targers HRDs, journalists, political actors. Amnesty International published a report on multiple campaigns that traget self-described “secure email” services, such as Tutanota and ProtonMail and another campaign that aimed in bypassing two-factor authentication. Crafted Phishing Sites – Secure Email Providers The phishing campaign primarily targeted popular secure email service providers such as Tutanota and ProtonMail. Threat actors used a well-crafted phishing page – by obtaining the domain tutanota[.]org, whereas the original domain of the service provider is tutanota[.]com. A phishing attack is one of the dangerous social engineering attacks that leads to capture a victim’s username and password that will get store it to an attacker machine and reuse it l...

software development services in noida

Red Securium Company Provide Software Development  Service In Noida Combining technological competency with domain expertise, Red Securium offers full spectrum of custom software design, development and deployment services for enterprises and SMEs to achieve exceptional business results.            Leveraging on its cross-functional width of expertise in application software development , Red Securium has developed the capabilities to build and run resilient applications at scale that seamlessly infuse your innovative ideas. Whether you are in need of the rapid development of a crucial business application or require the deployment and support for an entire suite of applications, we offer full software lifecycle coverage services. We adopt best practices and put highest levels of expertise to drive your technological assets deliver you business excellence and improved ROI. Custom Software Development Services in Noida Enterpri...

Tr0ll 1.0 – Vulnhub CTF Challenge Walkthrough

  Tr0ll 1.0 is an intentionally vulnerable machine, which is more of a   CTF  like type than real world scenario. Nevertheless, this machine has its own difficulties and you can learn some new stuff from it. So, let’s start. Enumeration Phase Let’s first run  netdiscover  to find the IP of our machine. netdiscover -r 192.168.1.1/24 After that, we run our typical  nmap  scan to see the open ports in the machine. nmap -A -sS -Pn -vv [target] Great we see many interesting stuff here. First of all, there is an open  FTP  port and we can connect to it with  anonymous access .  Also there is an open  http  port, we will run a nikto scan for it. The  ssh  port will be valuable later. From the nikto scan we got an interesting  /secret/  folder. When we get inside, we can understand why the machine got this name. Nothing interesting here, as you can see. we got trolled Let’s connect ...