Researchers have uncovered malicious emails that are spoofing terror alerts from law enforcement agencies in order to trick users into downloading the Jsocket remote access trojan.
Lionel Payet, Threat Intelligence Officer at cyber security firm Symantec, recently published a blog post in which he explains how malicious emails spoofing the email addresses of United Arab Emirates (UAE) law enforcement agencies, particularly the Dubai Police Force, are deceiving users into executing malicious email attachments.
“The emails come with two attachments, one of which is a PDF file that is not actually malicious but acts as a decoy file,” writes Payet. “The malware resides in the other attachment, an archive .jar file. Further analysis of the malware confirms that the cybercriminals behind this campaign are using a multi-platform remote access Trojan (RAT) called Jsocket (detected as Backdoor.Sockrat).”
A new product from the creators of the AlienSpy RAT, which was discontinued earlier this year, Backdoor.Sockrat opens a backdoor that allows an attacker to download files onto infected computers.
Part of the email reads as follows:
We got a terror alert regarding your business area.
Be advised to follow the protective measures (SECURITY TIPS) as attached to keep yourself, your company and your family secured.
Attached to the emails is a PDF and another file called SECURITYTIPS2015.zip.
To enhance the legitimacy of their scams, as Infosecurity Magazine reports, the attackers sign the spoofed emails with the names of incumbent law enforcement officials. They also incorporate the name of an employee who works at the target company into the email’s subject line, indicating that they spend a fair amount of time researching their victims beforehand.
These spear-phishing campaigns are mainly based in the UAE. However, Symantec notes that it recently observed similar emails targeting companies in Bahrain, Turkey, and Canada. Those organizations have generally been based in the energy, defense, finance, government, marketing, and IT industry verticals.
When it comes down to it, spear-phishing emails are all about forcing a user to do something they otherwise would not do, which includes using fear and/or urgency to trick them into downloading a suspicious email attachment.
We all know this. As online users, it is our responsibility to expect these types of ploys and prepare for them. An updated security solution goes a long way towards protecting against Jsocket and other Trojans.
And when it comes to email security, suspicious attachments and links are better left untouched.
Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.