A remote access tool (RAT) is surging in popularity, spreading to multiple countries through a new spam campaign and putting countless users at risk. Among its capabilities, the tool can steal passwords, collect keystrokes and record audio by using an infected device’s microphone. Because it is written in Java, it will run on any machine that can run the programming language, such as Windows, Mac OSX, Linux and Android — making many systems vulnerable to infection.

The tool, called Adwind, is a growing threat. According to International Business Times, Russian cybersecurity firm Kaspersky Lab identified more than 443,000 instances of Adwind infection between 2013 and 2016.

More recently, Trend Micro found that the use of the RAT grew dramatically in the last few months alone. In fact, detection of Adwind increased by 107 percent from May to June 2017.

A Resurgence for a Remote Access Tool

The current campaign is spam-based, purporting to be a charter agreement from the chair of the Mediterranean Yacht Broker Association Charter Committee, according to Trend Micro. The email said the attachment contained urgent changes to the agreement for immediate review.

In a particularly nasty trick, the email sender address is forged to increase apparent legitimacy. The threat actors are obviously hoping that any victim who owns a yacht would not be aware of current best practices for security or would assume that they would not be touched by this kind of malware. Researchers noted that the spam was directed at the aerospace industry, with Switzerland, Ukraine, Austria and the U.S. being the most targeted countries.

Trend Micro also found that there were two separate spam waves in the campaign. “We saw the first on June 7, 2017, using a different URL to divert victims to their .NET-written malware equipped with spyware capabilities,” the researchers said. “The second wave was observed on June 14, and used different domains that hosted their malware and command-and-control (C&C) servers.”

Flexible Malware Awareness

Adwind is flexible malware that can have many effects. It has been known to “steal credentials, record and harvest keystrokes, take pictures or screenshots, film and retrieve videos, and exfiltrate data,” Trend Micro researchers explained. It can even compromise an affected machine and turn it into a botnet. It has been deployed in many forms, all malicious.

This particular campaign seemed to be targeted at Windows machines, since the malicious URL drops a .pif file, which is used by Windows to run some MS-DOS programs. Run similarly to an .exe file, the file is written in .NET and is actually a downloader. The downloader kicks off the infection process by attempting to change the machine’s system certificate.

Everyone in an organization needs to understand how malware acts and adjust their behaviors online accordingly. Following the best practices for security awareness and training should also help enterprises protect their users and data.

More from

New Attack Targets Online Customer Service Channels

An unknown attacker group is targeting customer service agents at gambling and gaming companies with a new malware effort.Known as IceBreaker, the code is capable of stealing passwords and cookies, exfiltrating files, taking screenshots and running custom VBS scripts. While these are fairly standard functions, what sets IceBreaker apart is its infection vector. Malicious actors are leveraging the helpful nature of customer service agents to deliver their payload and drive the infection process. Here’s a look at how IceBreaker is cracking…

Operational Technology: The evolving threats that might shift regulatory policy

Listen to this podcast on Apple Podcasts, Spotify or wherever you find your favorite audio content. Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022 — a direct result of Russia’s invasion of Ukraine sparking a growing willingness on behalf of criminals to target the ICS of critical infrastructure. Conversations about what could happen if these kinds of systems were compromised were once relegated to “what ifs” and disaster movie scripts. But those days are…

Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them.ASM is a cybersecurity approach that continuously monitors an organization’s IT infrastructure to identify and remediate potential points of attack. Here’s how it can give your organization an edge.Understanding Attack Surface ManagementHere are some key…

Six Ways to Secure Your Organization on a Smaller Budget

My LinkedIn feed has been filled with connections announcing they have been laid off and are looking for work. While it seems that no industry has been spared from uncertainty, my feed suggests tech has been hit the hardest. Headlines confirm my anecdotal experience. Many companies must now protect their systems from more sophisticated threats with fewer resources — both human and technical. Cobalt’s 2022 The State of Pentesting Report found that 90% of short-staffed teams are struggling to monitor for…