September 18, 2018 By Shane Schick 2 min read

Japanese users were flooded with BEBLOH and URSNIF malware infections last month via spam campaigns that exploited internet query (IQY) files.

Much like traditional approaches to social engineering, the cybercriminals behind the attacks attempted to fool users with a variety of calls to open an email attachment, Trend Micro reported in late August. This included requests such as “please confirm,” “photos attached” and even “payment.” According to the researchers, the spam campaigns, which began on Aug. 6 and appeared to die down as of Aug. 10, involved an estimated 500,000 messages.

While URSNIF is best known for monitoring browser sessions and stealing data, BEBLOH is a banking Trojan that has been active in Japan since 2016.

Why IQY Attacks Are Basic by Design

When victims downloaded the attachment, it triggered an IQY file that sent a request to a specific URL. At the same time, it also exploited Excel’s Dynamic Data Exchange (DDE) feature with a script that used PowerShell to confirm that the machine’s IP address was based in Japan. If confirmed, the payload containing BEBLOH or URSNIF malware was executed.

IQY files are not necessarily complex, and that’s the point. Security researchers said the basic composition of IQY files makes it easier for cybercriminals to avoid detection by more traditional, structure-based ways of uncovering security threats.

How to Prepare for IQY Attacks and Spam Campaigns

Research has shown that the use of IQY files for nefarious purposes may be on the rise. IBM X-Force has been tracking similar activity to spread malware via the Necurs botnet, for example.

While IP address whitelisting and email filtering may help to some extent, IBM experts recommend using a security information and event management (SIEM) solution to help identify IQY-based threats early on. Security leaders should also train employees about the risks associated with IQY files and how they can be used in spam campaigns.

Source: Trend Micro

More from

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today