December 20, 2018 By David Bisson 2 min read

A weaponized document builder service known as LCG Kit added the ability to use Microsoft Word macros to load the necessary shellcode for installing malware.

Researchers at Proofpoint first detected LCG Kit back in March 2018. At the time of its discovery, the service enabled attackers to deliver Loki Bot malware primarily through RTF documents. It also supported the use of PDFs as well as Microsoft Word/Excel documents with either Object Linking & Embedding (OLE) objects containing Equation Editor code or embedded remote RTF objects.

In September 2018, Proofpoint observed an email campaign involving an Excel attachment that downloaded an HTML file containing VBScript, which then exploited CVE-2018-8174. Two months later, researchers came across an email campaign where Word attachments containing macros loaded LCG Kit shellcode into memory as a way to deliver Loki Bot.

Not the Only Weaponized Document Builder Around

LCG Kit isn’t the only weaponized document builder that’s been observed in the wild. In October 2017, Proofpoint researchers discovered ThreadKit, a service that enabled threat actors to build malicious Microsoft Office documents featuring a variety of exploits and payloads — including banking Trojans such as Trickbot and Chthonic as well as remote-access Trojans (RATs) such as FormBook and Loki Bot.

As reported by Bleeping Computer, the author of ThreadKit eventually sold their tool in May 2018, a move that allowed numerous threat actors — such as the Cobalt group — to use the malicious document builder service for their own attack campaigns.

How to Defend Against LCG Kit’s Malicious Documents

Security professionals can help defend against malicious documents created via LCG Kit and similar services by examining suspicious Office documents. Specifically, organizations should use VBA editor to inspect the macro code of documents and oledump.py tools to extract any malicious elements. They should also create an employee awareness training program that directly tackles user-centric security challenges and aligns with specific business initiatives.

Sources: Proofpoint, Proofpoint(1), Bleeping Computer

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

Ransomware attack on Rhode Island health system exposes data of hundreds of thousands

3 min read - Rhode Island is grappling with the fallout of a significant ransomware attack that has compromised the personal information of hundreds of thousands of residents enrolled in the state’s health and social services programs. Officials confirmed the attack on the RIBridges system—the state’s central platform for benefits like Medicaid and SNAP—after hackers infiltrated the system on December 5, planting malicious software and threatening to release sensitive data unless a ransom is paid. Governor Dan McKee, addressing the media, called the attack…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today