November 17, 2016 By Douglas Bonderud 2 min read

Known for billion-dollar bank heists from financial institutions worldwide, the Carbanak gang recently redesigned its flagship malware to target companies in the hospitality industry. According to Threatpost, the new strain targets hotel and restaurant call centers in the U.S.

While the code itself is fairly hard to detect and efficient at grabbing credit data, the real problem stems from social engineering. Call center agents, trained to be helpful and polite, are empowering the spread of this code as cybercriminals leverage existing reservation procedures to sneak their malware onto corporate systems.

Too Much Hospitality

As noted by SC Magazine, the new version of this old malware depends on helpful call center agents and Microsoft Word for success. It starts when attackers call customer service lines and claim they’re unable to submit reservations through the hotel or restaurant’s online portal. Then they ask if it’s possible to send an email attachment with their reservation request, which contains the Carbanak dropper.

While this seems like a relatively easy scam to spot, fraudsters have upped the ante by using callers who are fluent in English. They take the time to develop a rapport with customer service agents, making staff more willing to assist however they can. Callers stay on the line while they wait for agents to open their malicious attachments, then abruptly hang up.

Once opened, the attachment runs macros in Microsoft Word and uses an encoded .VBS script that can steal system information, take desktop screenshots and download additional malware, which enables it to map target networks and work its way into payment systems and card processing devices. According to IT World Canada, Carbanak also replaces existing svchost.exe processes with a custom version that seeks out specific antivirus tools and disables them to avoid detection.

Macro Management

While the form has changed, the intent remains the same — grab financial and credit card data and stay hidden as long as possible. But with the original malware version picked apart by security researchers over the last year, the gang needed a new iteration.

By blending multiple types of their existing malware suite and adding abilities such as remote desktop enabling, password stealing and email searching, Carbanak’s creators have made it difficult to detect before it gets to work and starts grabbing credit data.

But it’s not all bad news. Since the malware relies on .VBS to begin the infection process, disabling macros in Microsoft Word effectively cripples this code before it can do any damage. As noted by ZDNet, a resurgence of macro-based malware led Microsoft to include new group policy features that allow admins to block macro execution in risky environments. Activating this option is a surefire way to shut down any Carbanak compromises.

Cancel Carbanak’s Reservation

Despite the inherent risk of macros, however, willing and helpful customer service agents represent the biggest threat to hospitality organizations’ credit card data. Avoiding social phishing scams in this scenario is tough, especially when staff members are trained to minimize customer frustration and enable simple transactions.

The solution is a detailed policy that specifies what types of transactions are acceptable. For example, companies should clarify that any complaints about the online reservation portal — no matter how articulate or convincing — are escalated to technical support rather than avoided by accepting email attachments. If consumers complain, escalate the call up the chain of command.

The Carbanak gang is back and inviting itself into the networks of restaurants and hotels across the U.S. Cancel its reservation by disabling macro functions and empowering staff to detect phishy phone calls.

More from

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Quishing: A growing threat hiding in plain sight

4 min read - Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.However, legitimate organizations aren’t the only ones…

Cybersecurity Awareness Month: 5 new AI skills cyber pros need

4 min read - The rapid integration of artificial intelligence (AI) across industries, including cybersecurity, has sparked a sense of urgency among professionals. As organizations increasingly adopt AI tools to bolster security defenses, cyber professionals now face a pivotal question: What new skills do I need to stay relevant?October is Cybersecurity Awareness Month, which makes it the perfect time to address this pressing issue. With AI transforming threat detection, prevention and response, what better moment to explore the essential skills professionals might require?Whether you're…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today