June 21, 2021 By David Bisson 2 min read

Digital attackers are using fake DHL shipping emails to trick recipients into opening a malicious Microsoft Office document. According to Proofpoint, the DHL scam email leads to an infection of ‘RustyBuer,’ a new variant of the Buer Loader malware family that’s written in the Rust programming language.

Take a look at how this Rust rewrite works in the favor of Buer’s handlers.

DHL Scam Emails Bring New Buer in Town

The campaign uses DHL-themed phishing emails to target users with malicious Word and Excel documents. Those files, which come attached to emails purporting to give a DHL shipping update, pushed out one of two Buer Loader variants. The first variant was written in C, while the second one came written in Rust. RustyBuer’s attachments arrived with more detailed content than those of the other variant, as a means to engage with recipients more thoroughly.

After taking a closer look, Proofpoint found that a document macro contained the malware payload and required user interaction. That macro used an application bypass to evade detection.

Once loaded, RustyBuer used a shortcut file to establish persistence at startup. It then went on to distribute a Cobalt Strike beacon in some instances. This type of attack would enable malicious actors to establish a foothold into their victims’ networks.

Back to Buer’s Basics

Proofpoint reasoned that Buer Loader’s authors rewrote their malware for the DHL scam email campaign in Rust for one of two reasons.

First, Rust is an increasingly popular programming language that comes with more features than C. Making such a change creates opportunities for releasing new features in the future.

That leads into the second point. Buer Loader has been around for a while. Proofpoint first detected the digital threat on an underground web marketplace in the summer of 2019. At that time, attackers used it to distribute malicious macros embedded in Microsoft Word documents for distribution. Within a year, Buer Loader became a viable alternative to Emotet and Trickbot’s Bazar, noted Sophos. In the months that followed, the malware also spoofed GlobalSign and DHL in email-based attacks.

All this threat activity suggests that security firms already know what to look for when it comes to Buer. By rewriting their creation in Rust, the attackers give their creation a chance to evade detection.

How to Defend Against Email Scams

The DHL scam email described above highlights the need for organizations to defend themselves against email-borne Buer attacks. One of the ways they can do this is by investing in a security awareness training program that covers their entire workforce. Through that program, security professionals can conduct phishing simulations that familiarize employees with the types of lures that spread Buer Loader and other malware payloads.

Organizations can’t rely on human controls alone to protect against phishers. They also need to implement technical controls such as banners to flag external messages, emails from disallowed domains and disabled attachments. Those technical controls are crucial for building a layered approach to email security.

More from News

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally. The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets. Who is exploiting the NGFW zero-day? As of now, little is known about the…

Will arresting the National Public Data threat actor make a difference?

3 min read - The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place? As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today