Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

October 22, 2024 at 02:15PM

A new phishing campaign targets Russian-speaking users, using the Gophish toolkit to distribute DarkCrystal RAT and PowerRAT trojans. Attackers employ malicious documents and HTML links to trigger infections that allow remote access and data exfiltration. The evolving threats emphasize advanced techniques to evade detection and enhance malware effectiveness.

### Meeting Takeaways

1. **Phishing Campaign Targeting Russian-Speaking Users**: A new phishing campaign specifically targets Russian-speaking individuals using phishing emails that contain lures related to Yandex Disk and VK social media.

2. **Use of Gophish Toolkit**: The campaign employs Gophish, an open-source phishing framework, to send out phishing messages that aim to deliver malware, specifically DarkCrystal RAT (DCRat) and PowerRAT.

3. **Modular Infection Chains**: The attack utilizes modular infection chains that can be triggered either by malicious documents (Maldocs) or HTML-based infections that require victim action (e.g., enabling macros).

4. **Execution of Malicious Macros**: Victims who open a malicious Microsoft Word document and enable macros will execute rogue Visual Basic (VB) macros, which set up a Windows Registry key for persistence and download additional malicious files.

5. **PowerRAT Functionality**: PowerRAT is capable of executing PowerShell scripts, performing system reconnaissance, and communicating with command-and-control (C2) servers located in Russia.

6. **DCRat Deployment via HTML and JavaScript**: A separate infection chain involving HTML files embedded with JavaScript leads to the deployment of DCRat. Clicking a malicious link executes the JavaScript, which then retrieves a secured archive file containing the RAT payload.

7. **Multiple Infection Techniques**: The campaign reportedly uses techniques such as HTML smuggling with 7-Zip archives and self-extracting RAR files to obfuscate and deliver malware.

8. **Persistence Mechanisms**: Both DCRat and PowerRAT establish persistence on victim machines through various Windows tasks, ensuring continued access and control.

9. **Evolution of Threats**: The threat landscape is evolving, with reports of phishing campaigns also utilizing virtual hard disk (VHD) files for malware distribution, potentially indicating a shift in tactics by threat actors.

10. **Recommendation for Vigilance**: Ongoing awareness and vigilance against such sophisticated phishing tactics are crucial for maintaining cybersecurity.

Follow us for more updates on cybersecurity threats and protective measures.

Full Article