Critical Infrastructure Security, Malware

LookBack malware targeting utility sector

Share

Three U.S. firms in the utility sector were hit with a spear phishing campaign in mid-July with the emails containing a malicious Word document that can contain and can install the new remote access trojan LookBack.

The Proofpoint Threat Insight Team’s initial take is the attack was the work of a nation-state sponsored actor based on the macro used and comparing it to other previous attacks conducted by such groups.

The social engineering behind the emails, which were sent between July 19-25 makes it appear as if the correspondence comes from a domain owned by the U.S. National Council of Examiners for Engineering and Surveying and includes that organization’s logo. The email itself pretends to contain a failed examination result from the National Council of Examiners for Engineering and Surveying, a subject likely to pique someone’s interest and be opened, Proofpoint said.

“The email sender address and reply-to fields contained the impersonation domain nceess[.]com. Like the phishing domain, the email bodies impersonated member ID numbers and the signature block of a fictitious employee at NCEES. The Microsoft Word document attachment included in the email also invoked the failed examination pretense with the file name ‘Result Notice.doc,’” Proofpoint wrote.

Once installed on a machine LookBack, which is written in C++ is able to conduct several tasks. This includes listing of services; viewing of process, system, and file data; deleting files; executing commands; taking screenshots; moving and clicking the mouse; rebooting the machine and deleting itself from an infected host.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.