Security News > 2021 > January > 'Earth Wendigo' Hackers Exfiltrate Emails Through JavaScript Backdoor

'Earth Wendigo' Hackers Exfiltrate Emails Through JavaScript Backdoor
2021-01-06 20:44

A newly identified malware attack campaign has been exfiltrating emails from targeted organizations using a JavaScript backdoor injected into a webmail system widely used in Taiwan.

As an initial attack vector, the group used spear-phishing emails containing obfuscated JavaScript code meant to load malicious scripts from an attacker-controlled remote server.

These scripts were designed to steal browser cookies and webmail session keys, propagate the infection by appending code to the victim's email signature, and exploit a cross-site scripting vulnerability in the webmail server for JavaScript injection.

After performing the XSS injection or adding code to the Service Worker, which ensures that the malicious script is constantly loaded and executed, the attackers proceed to exfiltrate emails by establishing a WebSocket connection to an injected JavaScript backdoor.

The backdoor reads emails on the server and sends their content and attachments to the attacker's WebSocket server.

In addition to targeting webmail servers, Earth Wendigo also uses Python malware compiled as Windows executables, which were found to be shellcode loaders for code likely from Cobalt Strike.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/s-igNSZ0bIs/earth-wendigo-hackers-exfiltrate-emails-through-javascript-backdoor