A sophisticated phishing campaign has been unveiled, utilizing UUEncoding (UUE) files to distribute the notorious Remcos RAT malware. Disguised as emails concerning shipment import-export details, these malicious attachments exploit the Power Archiver compression tool for evasion. Upon execution, the malware establishes a backdoor, granting threat actors significant control over infected systems.
Researchers from AhnLab discovered that threat actors behind the campaign deploy UUEncoding files with a .UUE extension, designed to encode binary data in plain text format. The encoded files contain VBS scripts attached to phishing emails, aiming to bypass detection mechanisms. Once decoded, the obfuscated VBS script saves and executes a PowerShell script, which proceeds to download additional malicious components.
The Remcos RAT, a commercial remote access tool advertised as legitimate but frequently employed by threat actors, is the focal point of this campaign. It collects system information, stores keylogging data, and communicates with a remote command-and-control server. To combat this threat, researchers have provided indicators of compromise (IOCs) and general recommendations for users to enhance their security posture.
Given the sophisticated tactics employed by threat actors and the stealthy nature of the Remcos RAT, users are urged to exercise caution when handling email attachments, particularly from unknown sources. Avoiding the execution of macro commands within downloaded files and keeping anti-malware engines updated are crucial steps in mitigating the risks associated with such phishing campaigns. Vigilance and proactive security measures remain paramount in safeguarding against evolving cyber threats.
Reference: