{"id":85258,"date":"2018-09-06T11:00:09","date_gmt":"2018-09-06T18:00:09","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=85258"},"modified":"2023-08-10T14:14:36","modified_gmt":"2023-08-10T21:14:36","slug":"small-businesses-targeted-by-highly-localized-ursnif-campaign","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/09\/06\/small-businesses-targeted-by-highly-localized-ursnif-campaign\/","title":{"rendered":"Small businesses targeted by highly localized Ursnif campaign"},"content":{"rendered":"
Cyber thieves are continuously looking for new ways to get people to click on a bad link, open a malicious file, or install a poisoned update in order to steal valuable data. In the past, they cast as wide a net as possible to increase the pool of potential victims. But attacks that create a lot of noise are often easier to spot and stop. Cyber thieves are catching on that we are watching them, so they are trying something different. Now we\u2019re seeing a growing trend of small-scale, localized attacks that use specially crafted social engineering to stay under the radar and compromise more victims.<\/p>\n
In social engineering attacks, is less really more?<\/em><\/p>\n A new malware campaign puts that to the test by targeting home users and small businesses in specific US cities. This was a focused, highly localized attack that aimed to steal sensitive info from just under 200 targets. Macro-laced documents masqueraded as statements from legitimate businesses. The documents are then distributed via email to target victims in cities where the businesses are located.<\/p>\n With Windows Defender AV\u2019s next gen defense, however, the size of the attack doesn\u2019t really matter.<\/em><\/p>\n Several cloud-based machine learning algorithms detected and blocked the malicious documents at the onset, stopping the attack and protecting customers from what would have been the payload, info-stealing malware Ursnif<\/a>.<\/p>\n The map below shows the location of the targets.<\/p>\n Figure 1. Geographic distribution of target victims<\/em><\/p>\n Here\u2019s how the attack played out: Malicious, macro-enabled documents were delivered as email attachments to target small businesses and users. Each document had a file name that spoofed a legitimate business name and masqueraded as a statement from that business. In total, we saw 21 unique document file names used in this campaign.<\/p>\n The attackers sent these emails to intended victims in the city or general geographic area where the businesses are located. For example, the attachment named Dolan_Care_Statement.doc<\/em> was sent almost exclusively to targets in Missouri. The document file name spoofs a known establishment in St. Louis. While we do not believe the establishment itself was affected or targeted by this attack, the document purports to be from the said establishment when it\u2019s really not.<\/p>\n The intended effect is for recipients to get documents from local, very familiar business or service providers. It\u2019s part of the social engineering scheme to increase likelihood that recipients will think the document is legitimate and take the bait, when in reality it is a malicious document.<\/p>\nHighly localized social engineering attack<\/h2>\n