Skip to main content

FTCODE Ransomware Now Steals Chrome, Firefox Credentials

Image result for FTCODE Ransomware

New versions of the ransomware now sniff out saved credentials for Internet Explorer, Mozilla Firefox, Mozilla Thunderbird, Google Chrome and Microsoft Outlook.
FTCODE, a PowerShell-based ransomware that targets Italian-language users, has added new capabilities, including the ability to swipe saved web browser and email client credentials from victims.
Samples of the ransomware, which has been around since 2013, were recently observed in September 2019. After further analysis, researchers say new versions of the ransomware now aim to steal credentials from Internet Explorer and Mozilla Firefox, as well as email clients Mozilla Thunderbird, Google Chrome and Microsoft Outlook.
“The FTCODE ransomware campaign is rapidly changing,” said researchers Rajdeepsinh Dodia, Amandeep Kumar and Atinderpal Singh with Zscaler, in an analysis last week. “Due to the scripting language it was written in, it offers multiple advantages to threat actors, enabling them to easily add or remove features or make tweaks much more easily than is possible with traditionally compiled malware.”
It’s unclear how many victims have been targeted as part of FTCODE’s recent campaign; Threatpost has reached out to researchers for more details.
The attack chain for FTCODE previously started with spam emails being sent to victims containing malicious macro documents, which when clicked downloaded the ransomware. However, in more recent campaigns, the bad actor has been sending victims links to VBScripts, which then download FTCODE. Once a user executes the VBScript, it in turn executes a PowerShell script, which then downloads and opens up a decoy image (saved into the %temp%folder).
This image, which purports to be an outline of prices (the image is titled “Dettaglio dei costi” in Italian, translated to “cost details”), attempts to convince users that they simply received an image. However, in the background, the ransomware is downloaded (saved in %Public%\Libraries\WindowsIndexingService.vbs) and executed.
The ransomware then searches for all drives with at least 50 KB of free space and starts encrypting the files with various extensions (see picture below for a full list of the extensions).
Once downloaded, FTCODE takes history details from Internet Explorer and decrypts the stored credentials from information in the registry (HKCU:\Software\Microsoft\Internet Explorer\IntelliForms\Storage2).
For Mozilla Firefox and Thunderbird, the script checks four paths and steals any credentials in them (SystemDrive\Program Files\Mozilla Firefox, SystemDrive\Program Files\Mozilla Thunderbird, SystemDrive\Program Files (x86)\Mozilla Firefox, SystemDrive\Program Files (x86)\Mozilla Thunderbird). For Google Chrome, the ransomware steals files from the file \%UserProfile%\AppData\Local\Google\Chrome\User Data\*\Login Data.
And, in Microsoft Outlook, the ransomware accesses the registry key below to steal the credentials:
  • HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\*\9375CFF0413111d3B88A00104B2A6676\*
  • HKCU:\Software\Microsoft\Office\1[56].0\Outlook\Profiles\*\9375CFF0413111d3B88A00104B2A6676\*
After encryption, the ransomware drops the ransom note “READ_ME_NOW.htm” in the directory that contains the encrypted files. The ransom note gives instructions to download a Tor browser and follow the instructions on the browser for next steps.
As ransomware attacks can be extremely damaging to businesses, more ransomware strains are continuously evolving to update their targeting and capabilities.
“This trend toward more creative ways to exploit… is a compelling reason to focus on stronger preventative measures and not just the ability to quickly restore files after the infection occurs,” Erich Kron, security awareness advocate at KnowBe4, said in an email.

Originally published at https://threatpost.com 

Comments

Popular posts from this blog

Facebook updates iOS app to fix issues that let the camera open in the background

The issues were first reported this month This month, some users of Facebook’s iOS app  found that  that, in at least two situations, the app appeared to be activating the camera in the background without a user’s knowledge. Facebook said yesterday that it was submitting fixes for the issues to Apple, and the company tells us that, as of this morning, the updated app is now available for download on the App Store. I’ve downloaded the update to my iPhone 11 Pro, and I can’t get the camera to accidentally activate in either of the scenarios that were reported — but I also couldn’t get it to activate yesterday, so I can’t personally confirm that the issues are fixed. But if we take Facebook at its word that everything is resolved, it’s nice to see that the company acted quickly. Article reference:  https://www.theverge.com/2019/11/13/20963791/facebook-issue-fix-camera-open-background-update-ios-app-store

WhatsApp Users Exchanged Over 100 Billion Messages on New Year’s Eve, A New Record

WhatsApp is one of the most widely used communication apps on the planet and as such, clocks an insane number of messages and media exchanges on a daily basis. But the New Year's Eve broke a record that has been standing since WhatsApp's debut a decade ago. WhatsApp has revealed that users exchanged over 100 billion messages on New Year's eve. And out of that number, more than 20 billion messages were shared by Indian users alone. Moreover, around 12 billion out of the 100 billion+ messages shared on the platform were images. WhatsApp wrote in a press release that over 100 billion messages were shared globally on December 31 in the 24-hour duration leading up to the midnight of New Year's Eve. This is a record-breaking volume and is the highest number of messages exchanged in a single day ever since WhatsApp kicked off its services ten years ago. Out of those 100 billion+ messages shared on New Year's eve, WhatsApp says over 12 billion were images. Meanwhile...

Lebanese Protesters Are Using This ‘Bridgefy’ Messaging App - What is it?

Bridgefy is an offline messaging app that lets you communicate with friends and family when you don't have access to the Internet, by simply turning on your Bluetooth antenna. Due to WhatsApp outage and the poor internet services, a new offline messaging app known as Bridgefy has started to gain traction among Lebanese protesters. The people are recommending using this app in case there is a shutdown of internet services. Did you know that: 1 billion people aren’t covered by 3G or 4G networks. 3.3 billion people live in areas where the mobile Internet can be accessed but remain without a mobile Internet subscription. 1 billion people own a smartphone but don’t own a data plan. 40% of the world population is forecast to remain unconnected by 2025. These numbers represent huge amounts of potential users that aren’t being reached by mobile apps. Bridgefy keeps your app working even when people do not have access to the Internet. T...