Threat Signal Report
VBA-based RAT Distributed via Double Attack Vectors
FortiGuard Labs is aware of a report that a VBA-based Remote Access Trojan (RAT) was distributed in a fake statement document about the Crimean Peninsula that uses both social engineering and exploitation of a Internet Explorer vulneraility (CVE-2021-26411) to compromise the victim. The VBA RAT is capable of collecting information from the compromised machine, executing shell codes, uploading, downloading and deleting files.
When was the Attack Reported?
Malwarebytes report states they identified the attack on July 21st, 2021.
What is Significant About the Attack?
Distributed malicious document file makes use of social engineering and a Internet Explorer Memory Corruption Vulnerability (CVE-2021-26411). While Microsoft released a patch for CVE-2021-26411 in March, 2021, the use of CVE-2021-26411 exploit gained popularity due to its Proof-of-Concept code being readily available online, the exploit code being incorporated into the popular Purple Fox exploit kit, reported distribution of Magniber ransomware using the exploit, and the use of the exploit by infamous Lazarus APT group in the past. In terms of social engineering, the document takes advantage of the ongoing situation on the Crimean Peninsula, which increases the chances of the victim opening the file.
Is any Vulnerability Exploited in this Attack?
Yes, Internet Explorer Memory Corruption Vulnerability (CVE-2021-26411) is exploited in the attack.
Has Microsoft Released an Advisory for CVE-2021-26411?
Yes. See the Appendix for a link to the advisory.
Has Microsoft Released a Patch for CVE-2021-26411?
Yes. Microsoft has released a patch as part of their Patch Tuesday in March, 2021.
How does the Attack Work?
While the delivery method is not known, the attack began with a malicious document file arriving on the victim's machine.
Upon opening the the malicious document, it downloads two separate remote templates: one has a macro code with VBA RAT, the other exploits CVE-2021-26411 in order to deliver the same VBA RAT. After loading the remote templates, the malicious document loads a decoy document that disguised as a statement issued from a group within Crimea criticizes Russia.
What does the VBA RAT do?
According to Malwarebytes, the VBA RAT is capable of performing the following actions:
- Collecting victim's info
- Identifying the AV product running on a victim's machine
- Executing shell-codes
- Deleting files
- Uploading and downloading files
- Reading disk and file systems information
What is the Status of Coverage?
FortiGuard Labs has the following AV coverage in place against this attack:
FortiGuard Labs has the following IPS coverage in place for CVE-2021-26411 that is exploited in the attack:
All known network IOC's are blocked by the FortiGuard WebFiltering client.
For FortiEDR protections, all related samples for this threat will be blocked if executed on customer systems.
Also - organizations are encouraged to conduct ongoing training sessions to educate and inform personnel about the latest phishing/spearphishing attacks. They also need to encourage employees to never open attachments from someone they don't know, and to always treat emails from unrecognized/untrusted senders with caution. Since it has been reported that various phishing and spearphishing attacks have been delivered via social engineering distribution mechanisms, it is crucial that end users within an organization be made aware of the various types of attacks being delivered. This can be accomplished through regular training sessions and impromptu tests using predetermined templates by an organizations' internal security department. Simple user awareness training on how to spot emails with malicious attachments or links could also help prevent initial access into the network.
Traffic Light Protocol
|Color||When Should it Be used?||How may it be shared?|
TLP: REDNot for disclosure, restricted to participants only.
|Sources may use TLP:RED when information cannot be effectively acted upon by additional parties, and could lead to impacts on a party's privacy, reputation, or operations if misused.||Recipients may not share TLP:RED information with any parties outside of the specific exchange, meeting, or conversation in which it was originally disclosed. In the context of a meeting, for example, TLP:RED information is limited to those present at the meeting. In most circumstances, TLP:RED should be exchanged verbally or in person.|
TLP: AMBERLimited disclosure, restricted to participants’ organizations.
|Sources may use TLP:AMBER when information requires support to be effectively acted upon, yet carries risks to privacy, reputation, or operations if shared outside of the organizations involved.||Recipients may only share TLP:AMBER information with members of their own organization, and with clients or customers who need to know the information to protect themselves or prevent further harm. Sources are at liberty to specify additional intended limits of the sharing: these must be adhered to.|
TLP: GREENLimited disclosure, restricted to the community.
|Sources may use TLP:GREEN when information is useful for the awareness of all participating organizations as well as with peers within the broader community or sector.||Recipients may share TLP:GREEN information with peers and partner organizations within their sector or community, but not via publicly accessible channels. Information in this category can be circulated widely within a particular community. TLP:GREEN information may not be released outside of the community.|
TLP: WHITEDisclosure is not limited.
|Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release.||Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction.|