Italian Organizations Under Attack by Sophisticated Banking Trojan as Cybercriminals Turn to WikiLoader

SIDDARDA GOWTHAM JAGABATHINA
3 min readAug 1, 2023

--

Hey MCK’s, Today we are going to talk about a concerning development, Italian organizations have become the prime target of a new phishing campaign orchestrated by cybercriminals. The attackers are employing a highly advanced malware strain called WikiLoader, with the ultimate goal of installing a dangerous banking trojan, stealer, and spyware known as Ursnif (also referred to as Gozi).

Security researchers at Proofpoint recently unveiled their findings in a technical report, highlighting the sophisticated capabilities of WikiLoader. The malware operates as a downloader with the sole purpose of delivering a second, more harmful payload. What sets WikiLoader apart is its ability to evade detection through multiple mechanisms, indicating that it may have been designed to be leased out to a select group of cybercriminal threat actors.

The name “WikiLoader” is derived from the malware’s peculiar behavior of making a request to Wikipedia and verifying the presence of the string “The Free” in the response. This serves as a part of its evasive tactics to avoid raising suspicion.

Proofpoint’s investigation revealed that WikiLoader was initially spotted in the wild on December 27, 2022, in association with a hacking group known as TA544 or Bamboo Spider and Zeus Panda. This group is recognized for its involvement in mounting intrusion attacks.

The phishing campaigns orchestrated by these cybercriminals rely on deceptive emails containing malicious attachments, such as Microsoft Excel, Microsoft OneNote, or PDF files, luring unsuspecting victims into downloading the WikiLoader. Once installed, this downloader then proceeds to deliver and execute Ursnif, a banking trojan notorious for its ability to steal sensitive financial information.

What’s alarming is that multiple cybercrime groups seem to have access to WikiLoader, with another threat actor known as TA551 (also referred to as Shathak) being observed using the malware as of late March 2023. This suggests that WikiLoader may have fallen into the hands of other malicious entities, escalating the risk to organizations across Italy.

Notably, the recent TA544 campaigns detected in mid-July 2023 showcased a shift towards using accounting themes as bait. The attackers propagated PDF attachments containing URLs that, once clicked, initiated the delivery of a ZIP archive file housing a JavaScript file responsible for downloading and executing WikiLoader.

Proofpoint’s researchers discovered that WikiLoader is heavily obfuscated, making it extremely difficult for endpoint security software to detect and analyze the malware. Additionally, it utilizes evasive techniques to avoid detonation in automated analysis environments. To further complicate matters, the malware retrieves and executes a shellcode payload hosted on Discord, a popular communication platform.

Selena Larson, a senior threat intelligence analyst at Proofpoint, warned that WikiLoader is an actively evolving malware. Its creators regularly modify the code to evade detection and remain under the radar of security measures.

Experts fear that this potent malware may be increasingly adopted by criminal threat actors, particularly those known as initial access brokers (IABs), who facilitate illegal activities leading to ransomware attacks. Organizations must be vigilant and take proactive steps to protect themselves against such exploitation.

In conclusion, the emergence of WikiLoader as a means to deliver the Ursnif banking trojan and spyware poses a severe threat to Italian organizations. As cybercriminals continue to develop and adapt their tactics, it becomes crucial for enterprises to stay informed and fortified against such advanced attacks. Heightened security measures, employee awareness, and timely updates are essential in safeguarding against potential data breaches and financial losses.

#Cybersecurity #MalwareThreat #WikiLoader #Ursnif #BankingTrojan #PhishingCampaign #ItalianOrganizations #Cybercrime #TA544 #TA551 #BambooSpider #ZeusPanda #Proofpoint #DataSecurity #RansomwareThreat #ITSecurity #CyberAttack #DigitalThreats #EndpointSecurity #CyberAwareness #FinancialSecurity #DataProtection

--

--

SIDDARDA GOWTHAM JAGABATHINA

Passionate about cybersecurity and eager to share the knowledge I have gained and continue to acquire to educate the world.