SUBSCRIBE

Canada Revenue warning scam uses .MSG attachment

Everyone loves to hate the Canada Revenue Agency. Unfortunately, criminals apparently love the tax man โ€” they keep finding ways of leveraging Canadiansโ€™ fear of the agency to lure them into malware.

Often its fraudulent phone calls in the spring claiming to be from the agency. But recently an email campaign was detected by Trustwave, which in a blog Wednesday described how someone is using aย .MSG email attachment, the format of Microsoft Outlook and Exchange message files, as the vehicle for malware. Some of this mail will likely fall into the mailboxes of enterprises.

The subject line will be โ€œCanada Revenue Agency โ€” Notification.โ€ The sender appears to be legit as โ€œCanada Revenue Agency Online Mail.โ€

The first clue this is phoney is itโ€™s email. Governments do NOTHING unsolicited by email โ€” they love paper because it can be traced.

The second clue is body of the text: Itโ€™s addressed to โ€œDear Taxpayer.โ€

Lesson: Do not click on the attachment, which purports to be a case file.

Whatโ€™s more interesting to our readers is the analysis of the malware by Trustwave. Opening the attachment researchers found a number of files and four folders. Two of the folders have images of spoofed PDF files with spoofed file names, while theย third folder has a compressed file with another OLE file. Inside that file is another compressed file with JavaScript. When it runs it downloads a malicious executable from a command server, a Trojan which injects its code into an available Windows Explorer browser, and then downloads the Zbot banking Trojan, which canย intercept network traffic and steal system information, online banking credentials and passwords.

โ€œWe donโ€™t often see malicious files embedded in .MSG file attachments,โ€ notes Trustwave. โ€œIt represents yet another technique used by cybercriminals to bypass email gateways. While extracting the malicious JavaScript object, we encountered layers of compression that would perhaps be difficult for some antivirus product to detect.โ€

The lesson for infosec teams with organizations that use Outlook is to pass the word that employees should be wary of opening .MSG files.ย By default, Outlook will prompt users with a warning that some objects in the message may have a virus.

Trustwave calls this hunt for the malware package going down the rabbit hole. For young threat researchers itโ€™s a lesson on how to do it.

Tech Jobs

Categories