Malware Continues to Attack German Car Industry for Nearly a Year

A long-running malware campaign targeting German auto manufacturing companies has been revealed in a report by Check Point researchers.

The targets included several German automakers and car dealers, and the attackers registered multiple similar domains for use in the attack by cloning the legitimate sites of companies in the field.

These sites are used to send phishing emails written in German and host malware payloads that are downloaded to target systems.

According to the report, the attack campaign started around July 2021 (and possibly March) and is still ongoing.

Target the German Automotive Industry

A malware infection chain begins with an email sent to a specific target containing an ISO disk image file that bypasses many internet security controls.

The archive in turn contains an HTA file that contains JavaScript or VBScript code that is executed via HTML smuggling.

Malware Infection Chain

This is a technique that is used regularly by hackers of all skill levels, from “script kiddies” who rely on automated toolkits to state hackers who deploy custom backdoors.

When the victim sees the decoy document opened via the HTA file, malicious code runs in the background, fetching and launching the malware payload.

The security researchers noted: “We found multiple versions of these scripts, some triggering PowerShell code, some obfuscated, and others in plain text. They all download and execute various MaaS (Malware as a Service) information stealers. ”

The MaaS info stealers used in this campaign varied, including Raccoon Stealer, AZORult, and BitRAT. All three are available for purchase on cybercrime markets and darknet forums.

In later versions of the HTA file, run PowerShell code to change registry values ​​and enable content on the Microsoft Office suite. This eliminates the need for an attacker to trick receivers into enabling macros, reducing the payload drop rate.

Goals and Attribution

Check Point said the 14 targeted entities it has tracked for these attacks are all German organizations with some ties to the auto-manufacturing industry. However, no specific company names were mentioned in the report.

The info-stealing payload was hosted on an Iranian-registered site (“bornagroup[.]ir”), while the same email was used for phishing subdomains such as “groupschumecher[.]com”.

Threat analysts were able to find links to different phishing campaigns targeting Santander customers, verifying that the campaign’s website was hosted on an Iranian ISP.

Attacker’s Infrastructure

All in all, it’s very likely that Iranian threat actors orchestrated the campaign, but Check Point doesn’t have enough evidence to prove its attribution.

Finally, regarding the targeting of the campaign, it is likely industrial espionage or BEC (commercial email compromise) against these companies or their customers, suppliers and contractors.

Conclusion

Today, businesses of all sizes across all industries face the growing threat of ransomware attacks. Storage systems may seem to have little to do with an organization’s cybersecurity posture and policies, but it just might be the best defense. Some features and components of virtual machine backup, such as easy-to-manage, cost-effective, and storage-friendly, make it essential to protect sensitive data from ransomware attacks, helping to create unbreakable cloud storage for enterprise data centers and effectively prevent ransomware attack. Most common used VM backup solution includes VMware Backup, Xenserver Backup, oVirt Backup and so on.

Explore more

Exploring the Rich Tapestry of Scottish Custom and Cultural Wear

Exploring the Rich Tapestry of Scottish Customand Cultural Wear

Scotland is a land filled with stunning landscapes, a deep-rooted history, and lively traditions, and it boasts some of the most iconic and culturally...

Why Pork Crackling is a Healthy Snack Choice

Pork crackling has long been a popular snack in the UK, known for its crispy texture and savoury taste. Traditionally enjoyed in pubs alongside...

Boilers Repair: For the Safety and Efficiency of Your Home

Boilers are at the core of heating houses, particularly during the cold winter season. Boilers warm water as well as central heating, making them...

Streamline Your Shift Handover for Better Production

Are you facing production flow interruptions and desire to improve? Streamlining your shift handover process is the best for better production. In manufacturing, disruptions...
Types and Uses of Scottish Jackets

Types and Uses of Scottish Jackets

A Beginner’s Guide Towards Choosing a Perfect Traditional Scottish Jacket Scottish Jackets Since the 17th Century Jackets have been the most significant part of Scotsmen wearing...

Maximizing Product Appeal: Top Strategies on Selecting the Appropriate Display Furniture

We have also seen how the furniture used for product display significantly draws customers' attention, hence increasing sales. Retail fixtures are not simply utility...
The Sparkling Advantages of Custom Diamond Rings

The Sparkling Advantages of Custom Diamond Rings

When it comes to any big life event like engagements, anniversaries, etc, nothing has more significance than a diamond ring. A diamond ring represents...
Helping the Most Vulnerable on the Road: Expert Legal Support for NYC’s Accidents

Helping the Most Vulnerable on the Road: Expert Legal Support for...

The traffic in New York City roads are caused by  cars, bicycles, pedestrians, and motorcyclists all travelling around the street. However bicycle riders, walkers,...