Three U.S. firms in the utility sector were hit with a spear phishing campaign in mid-July with the emails containing a malicious Word document that can contain and can install the new remote access trojan LookBack.The Proofpoint Threat Insight Team’s initial take is the
attack was the work of a nation-state sponsored actor based on the macro used
and comparing it to other previous attacks conducted by such groups.The social engineering behind the emails, which were sent
between July 19-25 makes it appear as if the correspondence comes from a domain
owned by the U.S. National Council of Examiners for Engineering and Surveying
and includes that organization’s logo. The email itself pretends to contain a
failed examination result from the National Council of Examiners for
Engineering and Surveying, a subject likely to pique someone’s interest and be
opened, Proofpoint said.“The email sender address and reply-to fields contained the
impersonation domain nceess[.]com. Like the phishing domain, the email bodies
impersonated member ID numbers and the signature block of a fictitious employee
at NCEES. The Microsoft Word document attachment included in the email
also invoked the failed examination pretense with the file name ‘Result
Notice.doc,’” Proofpoint wrote. Once installed on a machine LookBack, which is written in
C++ is able to conduct several tasks. This includes listing of services;
viewing of process, system, and file data; deleting files; executing
commands; taking screenshots; moving and clicking the mouse; rebooting the
machine and deleting itself from an infected host.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
Related Terms
AdwareYou can skip this ad in 5 seconds