Nasty malware abuses Microsoft e-signature service to steal your passwords

An abstract image of digital security.
(Image credit: Shutterstock)

A well-known malware is making new rounds online, abusing Microsoft’s digital signature verification to steal passwords and other sensitive information from its victims. 

According to cybersecurity researchers from Check Point Research (CPR), who spotted the new campaign, the ZLoader malware was most recently used to distribute the Conti ransomware several months ago. 

This time around, however, ZLoader is the final payload, while the goal of the campaign is to steal sensitive data, not encrypt the devices.

Sneaky insertion

The distribution process is nothing out of the ordinary, CPR explains. First, the victim installs a remote management program “pretending to be a Java installation” when, in fact, it grants the attackers full access to the system, and allows them to upload and download files, as well as run scripts.

The attackers then “upload and run a few scripts, that download more scripts that run mshta.exe with file appContrast.dll as the parameter”.

The file appContrast.dll is signed by Microsoft, even though more information has been added to the end of the file, CPR explains, adding that this added information downloads and runs the final ZLoad payloader which steals passwords and other sensitive data. 

Thousands of victims

CPR claims that the malware had been installed on more than 2,000 devices across 111 countries, with the majority of victims being in the United States, Canada, and India. 

CPR believes that the cybercrime group behind the campaign is called MalSmoke, “given a few similarities with previous campaigns”, it said.

“We first began seeing evidence of the new campaign around November 2021,” said Kobi Eisenkraft, Malware Researcher at Check Point. “All in all, it seems like the Zloader campaign authors put great effort into defense evasion and are still updating their methods on a weekly basis. I strongly urge users to apply Microsoft’s update for strict Authenticode verification, It is not applied by default.”

Besides applying Microsoft’s update for strict Authenticode verification, which is not applied by default, Check Point Research also reminds everyone to be mindful when installing programs from unknown sources or sites. And finally, to be vigilant when clicking on links or opening email attachments, as these are often malicious.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A computer being guarded by cybersecurity.
Huge cyberattack found hitting vulnerable Microsoft-signed legacy drivers to get past security
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
hacker.jpeg
Key trusted Microsoft platform exploited to enable malware, experts warn
A hacker typing on a MacBook laptop with code on the screen.
This devious phishing site repurposes legitimate web elements like CAPTCHA pages for malware distribution
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Microsoft reveals over a million PCs hit by malvertising campaign
Latest in Security
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
China
Notorious Chinese hackers FamousSparrow allegedly target US financial firms
A digital representation of a lock
NYU website defaced as hacker leaks info on a million students
NHS
NHS IT supplier hit with major fine following ransomware attack
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does