OfflRouter Malware Evades Detection in Ukraine for Almost a Decade

OfflRouter Malware Evades Detection in Ukraine for Almost a Decade

April 18, 2024 at 11:03AM

Summary: Ukrainian government networks have been infected with OfflRouter malware since 2015, spreading through infected documents and USB media. The malware targets .DOC files and can modify Windows Registry. Its unusual propagation mechanism and coding mistakes indicate an inventive but inexperienced creator. The malware has been relatively contained within Ukraine.

Key Takeaways from the Meeting Notes:

1. Ukrainian government networks have been infected with the OfflRouter malware since 2015, which spreads through infected documents and removable media.
2. OfflRouter is designed to target .DOC files and contains a VBA macro embedded in Microsoft Word documents that drops a .NET executable named “ctrlpanel.exe.”
3. The malware is adept at making Windows Registry modifications to ensure the executable runs each time the system boots.
4. Notably, OfflRouter can search for potential plugins on removable drives and execute them on the host machine.
5. The malware’s initial vector of infection remains unclear, as it can spread as a standalone executable or as an infected document.
6. It is uncertain who is responsible for the malware, and its developers have been described as inventive yet inexperienced.
7. Microsoft has been blocking macros by default in Office documents downloaded from the internet since July 2022, prompting threat actors to find other initial access pathways.

These key points summarize the significant details discussed regarding the OfflRouter malware and its impact, as well as the ongoing efforts to address its propagation and potential risk factors.

Full Article