July 17, 2017 By Larry Loeb 2 min read

A remote access tool (RAT) is surging in popularity, spreading to multiple countries through a new spam campaign and putting countless users at risk. Among its capabilities, the tool can steal passwords, collect keystrokes and record audio by using an infected device’s microphone. Because it is written in Java, it will run on any machine that can run the programming language, such as Windows, Mac OSX, Linux and Android — making many systems vulnerable to infection.

The tool, called Adwind, is a growing threat. According to International Business Times, Russian cybersecurity firm Kaspersky Lab identified more than 443,000 instances of Adwind infection between 2013 and 2016.

More recently, Trend Micro found that the use of the RAT grew dramatically in the last few months alone. In fact, detection of Adwind increased by 107 percent from May to June 2017.

A Resurgence for a Remote Access Tool

The current campaign is spam-based, purporting to be a charter agreement from the chair of the Mediterranean Yacht Broker Association Charter Committee, according to Trend Micro. The email said the attachment contained urgent changes to the agreement for immediate review.

In a particularly nasty trick, the email sender address is forged to increase apparent legitimacy. The threat actors are obviously hoping that any victim who owns a yacht would not be aware of current best practices for security or would assume that they would not be touched by this kind of malware. Researchers noted that the spam was directed at the aerospace industry, with Switzerland, Ukraine, Austria and the U.S. being the most targeted countries.

Trend Micro also found that there were two separate spam waves in the campaign. “We saw the first on June 7, 2017, using a different URL to divert victims to their .NET-written malware equipped with spyware capabilities,” the researchers said. “The second wave was observed on June 14, and used different domains that hosted their malware and command-and-control (C&C) servers.”

Flexible Malware Awareness

Adwind is flexible malware that can have many effects. It has been known to “steal credentials, record and harvest keystrokes, take pictures or screenshots, film and retrieve videos, and exfiltrate data,” Trend Micro researchers explained. It can even compromise an affected machine and turn it into a botnet. It has been deployed in many forms, all malicious.

This particular campaign seemed to be targeted at Windows machines, since the malicious URL drops a .pif file, which is used by Windows to run some MS-DOS programs. Run similarly to an .exe file, the file is written in .NET and is actually a downloader. The downloader kicks off the infection process by attempting to change the machine’s system certificate.

Everyone in an organization needs to understand how malware acts and adjust their behaviors online accordingly. Following the best practices for security awareness and training should also help enterprises protect their users and data.

More from

Widespread exploitation of recently disclosed Ivanti vulnerabilities

6 min read - IBM X-Force has assisted several organizations in responding to successful compromises involving the Ivanti appliance vulnerabilities disclosed in January 2024. Analysis of these incidents has identified several Ivanti file modifications that align with current public reporting. Additionally, IBM researchers have observed specific attack techniques involving the theft of authentication token data not readily noted in current public sources. The blog details the results of this research to assist organizations in protecting against these threats. Key Findings: IBM research teams have…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

How I got started: Cyber AI/ML engineer

3 min read - As generative AI goes mainstream, it highlights the increasing demand for AI cybersecurity professionals like Maria Pospelova. Pospelova is currently a senior data scientist, and data science team lead at OpenText Cybersecurity. She also worked at Interest, an AI cybersecurity company acquired by MicroFocus and then by OpenText. She continues as part of that team today.Did you go to college? What did you go to school for?Pospelova: I graduated with a bachelor’s degree in computer science and a master’s degree…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today