Hackers use fake captcha to bypass browser warnings

Tomcat

Professional
Messages
2,686
Reputation
10
Reaction score
721
Points
113
3e350398888f0736310a0.png


The researcher noticed that attackers are using a fake captcha to trick users into bypassing browser warnings and downloading the banking Trojan Gozi (aka Ursnif).

The problem was discovered by information security researcher MalwareHunterTeam, who shared his findings with journalists at Bleeping Computer. It all started when an expert found a suspicious URL on the Internet, where, when trying to watch an embedded YouTube video about a women's prison in New Jersey, the file console-play.exe was downloaded, and the site displayed a fake version of reCaptcha on the screen.

embedded-youtube-video.jpg


Since the file is executable, Google Chrome automatically warns that the file may be malicious and asks if the user wants to “Save” it or “Cancel” the download. To bypass this warning, attackers show the victim a fake reCAPTCHA, where the user is asked to press the B, S, Tab, A, F, and Enter keys on the keyboard, as shown in the screenshot below.

fake-captcha.jpg


If nothing happens when you press the "B", "S", "A" and "F" keys, then pressing "Tab" will move the focus to the "Save" button, and then pressing the "Enter" key will work as a click on this button, forcing the browser to download and save the file to your computer. Moreover, the video will eventually start playing automatically, that is, the user will decide that he entered the captcha successfully.

If the victim launches the mentioned executable file, it will create a folder in% AppData% \ Bouncy for .NET Helper and install many files into it. All of these files are fake, with the exception of the executable file BouncyDotNet.exe.

bouncydotnet-folder.jpg


BouncyDotNet.exe will read various lines from the Windows registry used to run PowerShell commands. These commands will eventually compile the .NET application using the built-in compiler CSC.exe, which will run the Ursnif banking trojan DLL. Once launched, the banker will steal the victim's credentials, download additional malware to the computer, and execute any commands sent to it by remote attackers.

A source
 
Top