Security News > 2021 > January > 'Earth Wendigo' Hackers Exfiltrate Emails Through JavaScript Backdoor
A newly identified malware attack campaign has been exfiltrating emails from targeted organizations using a JavaScript backdoor injected into a webmail system widely used in Taiwan.
As an initial attack vector, the group used spear-phishing emails containing obfuscated JavaScript code meant to load malicious scripts from an attacker-controlled remote server.
These scripts were designed to steal browser cookies and webmail session keys, propagate the infection by appending code to the victim's email signature, and exploit a cross-site scripting vulnerability in the webmail server for JavaScript injection.
After performing the XSS injection or adding code to the Service Worker, which ensures that the malicious script is constantly loaded and executed, the attackers proceed to exfiltrate emails by establishing a WebSocket connection to an injected JavaScript backdoor.
The backdoor reads emails on the server and sends their content and attachments to the attacker's WebSocket server.
In addition to targeting webmail servers, Earth Wendigo also uses Python malware compiled as Windows executables, which were found to be shellcode loaders for code likely from Cobalt Strike.
News URL
Related news
- U.K. Hacker Charged in $3.75 Million Insider Trading Scheme Using Hacked Executive Emails (source)
- Critical Zimbra RCE flaw exploited to backdoor servers using emails (source)
- North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks (source)
- Hackers exploit Roundcube webmail flaw to steal email, credentials (source)
- Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails (source)