New Blog Post | HTML smuggling surges: Loader technique used in banking malware, targeted attacks

%3CLINGO-SUB%20id%3D%22lingo-sub-2956802%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20HTML%20smuggling%20surges%3A%20Loader%20technique%20used%20in%20banking%20malware%2C%20targeted%20attacks%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2956802%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Fig1-HTML-smuggling-overview.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F326470i51AF3CCE45091D12%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Fig1-HTML-smuggling-overview.png%22%20alt%3D%22Fig1-HTML-smuggling-overview.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F11%2F11%2Fhtml-smuggling-surges-highly-evasive-loader-technique-increasingly-used-in-banking-malware-targeted-attacks%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EHTML%20smuggling%20surges%3A%20Highly%20evasive%20loader%20technique%20increasingly%20used%20in%20banking%20malware%2C%20targeted%20attacks%20-%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EHTML%20smuggling%2C%20a%20highly%20evasive%20malware%20delivery%20technique%20that%20leverages%20legitimate%20HTML5%20and%20JavaScript%20features%2C%20is%20increasingly%20used%20in%20email%20campaigns%20that%20deploy%20banking%20malware%2C%20remote%20access%20Trojans%20(RATs)%2C%20and%20other%20payloads%20related%20to%20targeted%20attacks.%20Notably%2C%20this%20technique%20was%20observed%20in%20a%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F05%2F27%2Fnew-sophisticated-email-based-attack-from-nobelium%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Espear-phishing%20campaign%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Efrom%20the%20threat%20actor%20NOBELIUM%20in%20May.%20More%20recently%2C%20we%20have%20also%20seen%20this%20technique%20deliver%20the%20banking%20Trojan%20Mekotio%2C%20as%20well%20as%20AsyncRAT%2FNJRAT%20and%20Trickbot%2C%20malware%20that%20attackers%20utilize%20to%20gain%20control%20of%20affected%20devices%20and%20deliver%20ransomware%20payloads%20and%20other%20threats.%3C%2FP%3E%0A%3CP%20class%3D%22%22%3EAs%20the%20name%20suggests%2C%20HTML%20smuggling%20lets%20an%20attacker%20%E2%80%9Csmuggle%E2%80%9D%20an%20encoded%20malicious%20script%20within%20a%20specially%20crafted%20HTML%20attachment%20or%20web%20page.%20When%20a%20target%20user%20opens%20the%20HTML%20in%20their%20web%20browser%2C%20the%20browser%20decodes%20the%20malicious%20script%2C%20which%2C%20in%20turn%2C%20assembles%20the%20payload%20on%20the%20host%20device.%20Thus%2C%20instead%20of%20having%20a%20malicious%20executable%20pass%20directly%20through%20a%20network%2C%20the%20attacker%20builds%20the%20malware%20locally%20behind%20a%20firewall.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2956802%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20365%20Defender%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Fig1-HTML-smuggling-overview.png

HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targete...

HTML smuggling, a highly evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features, is increasingly used in email campaigns that deploy banking malware, remote access Trojans (RATs), and other payloads related to targeted attacks. Notably, this technique was observed in a spear-phishing campaign from the threat actor NOBELIUM in May. More recently, we have also seen this technique deliver the banking Trojan Mekotio, as well as AsyncRAT/NJRAT and Trickbot, malware that attackers utilize to gain control of affected devices and deliver ransomware payloads and other threats.

As the name suggests, HTML smuggling lets an attacker “smuggle” an encoded malicious script within a specially crafted HTML attachment or web page. When a target user opens the HTML in their web browser, the browser decodes the malicious script, which, in turn, assembles the payload on the host device. Thus, instead of having a malicious executable pass directly through a network, the attacker builds the malware locally behind a firewall.

0 Replies