August 13, 2019 By David Bisson 2 min read

Attackers took a sophisticated dropper and disguised it as a fake DHL shipping invoice to distribute Ursnif malware.

Deep Instinct recently came across an attack email that attempted to trick people into opening a fake DHL invoice. This notice was actually an Excel spreadsheet that prompted users to enable a VBA macro contained therein.

Once activated, the macro displayed a fake progress bar to trick the user into thinking the malicious document was legitimate while it secretly ran malicious code in the background. The macro was also obfuscated and contained randomly generated comments to make the code appear benign and help it evade detection by security solutions.

After loading the fake progress bar, the VBA macro read a portion of the Excel file, called WMIC.exe, using a Shell() function and executed a PowerShell command. This PowerShell code also came with multiple layers of obfuscation, encoding and compression. Ultimately, the code executed the campaign’s Ursnif malware payload.

A History of DHL Malware Campaigns

This is not the first time threat actors have disguised their malware campaigns as DHL correspondence. Back in 2018, for instance, Yoroi Security discovered a malspam campaign that used the cover of a message from DHL to target Italian users with Gozi/Ursnif/IFSB/Dreambot variants.

That was just a few months before SI-Lab spotted a DHL-themed phishing campaign pushing Muncy malware. Not long thereafter, My Online Security saw an email that pretended to deliver a DHL shipment notification, but actually used a link in the email body and two Microsoft Word documents to spread various malware.

How to Defend Against Ursnif Attacks

Security professionals can help defend their organizations against DHL-themed Ursnif attacks by using ahead-of-threat detection to spot potentially malicious domains before they become active in phishing campaigns and other attacks. Organizations should also use test phishing engagements to educate their employees and test their awareness of social engineering attacks.

More from

Evolving red teaming for AI environments

2 min read - As AI becomes more ingrained in businesses and daily life, the importance of security grows more paramount. In fact, according to the IBM Institute for Business Value, 96% of executives say adopting generative AI (GenAI) makes a security breach likely in their organization in the next three years. Whether it’s a model performing unintended actions, generating misleading or harmful responses or revealing sensitive information, in the AI era security can no longer be an afterthought to innovation.AI red teaming is emerging…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today