Multiple RATs Distributed in Phishing Campaign Leveraging Fake Meeting Invitations

New phishing campaign is leveraging fake meeting invitations for popular video conference tools to spread remote access trojans (RATs).
cellphone with calendar

On March 5, 2023, Zscaler researchers reported details of a sophisticated phishing campaign they attribute to a single threat actor, leveraging fake meeting invitations for popular video conference tools to spread remote access trojans (RATs).

Community Impact

The RH-ISAC intelligence team assesses that this and similar campaigns constitute a moderate threat to the RH-ISAC community. Phishing and spearphishing campaigns remain among the top threat vectors reported by members. Additionally, members have specifically reported an influx in campaigns leveraging fake video call invites. Thus, members are advised to take appropriate defensive measures, such as strengthening security awareness training among staff and tightening controls on email gateways.

Technical Details

According to the report, the campaign has been active since late 2023 and the RATs spread in the campaign include SpyNote RAT for Android platforms, and NjRAT and DCRat for Windows systems. The campaign specifically leverages fake invitations for Skype, Zoom, and Google Meets calls.

Researchers also noted that the attacker utilized shared web hosting, hosting fake online meeting sites on a single IP address, with all of the fake sites were in Russian. In addition, the report noted that the attackers hosted these fake sites using URLs that heavily resembled the actual websites.

IOCs

Researchers provided the following file names as indicators of compromise (IOCs):

  • Win32.Backdoor.DCRat
  • Win32.Backdoor.NjRat   

TTPs

Researchers provided the following MITRE ATT&CK tactics, techniques, and procedures (TTPs):

Enterprise Matrix

TACTIC

TECHNIQUE ID

TECHNIQUE NAME

Execution

T1064

T1059.001

Scripting

PowerShell

Persistence

T1547.001

Registry Run Keys / Startup Folder

Privilege Escalation

T1547 

Boot or Logon Autostart Execution

Defense Evasion

T1140

T1064

T1027

T1027.002

T1070.004

T1036

Deobfuscate/Decode Files or Information

Scripting

Obfuscated Files or Information

Software Packing

File Deletion

Masquerading

Credential Access

T1056 

T1555 

Input Capture

Credentials from Password Stores

Discovery

T1124

T1083

T1082

T1518.001

T1057

T1010

T1018

T1016

T1120 

System Time Discovery

File and Directory Discovery

System Information Discovery

Security Software Discovery

Process Discovery

Application Window Discovery

Remote System Discovery

System Network Configuration Discovery

Peripheral Device Discovery

Collection

T1123 

T1115 

T1056

T1113 

T1125  

Audio Capture

Clipboard Data

Input Capture

Screen Capture

Video Capture

Command and Control

T1219

T1573

T1571

T1095

T1071

Remote Access Software

Encrypted Channel

Non-Standard Port

Non-Application Layer Protocol

Application Layer Protocol

Impact

T1498 

T1529 

Network Denial of Service

System Shutdown/Reboot


Mobile Matrix

TACTIC

TECHNIQUE ID

TECHNIQUE NAME

Persistence

T1624

T1444

Event Triggered Execution: Broadcast Receivers

Masquerade as Legitimate Application

Privilege Escalation, Persistence

T1626

T1546

Abuse Elevation Control Mechanism 
Event Triggered Execution

Collection

T1533 
T1429 
T1430 
T1636

Data from Local System

Audio Capture

Location Tracking

Contact and SMS data

More Recent Blog Posts