{"id":7002,"date":"2023-09-18T10:28:18","date_gmt":"2023-09-18T10:28:18","guid":{"rendered":"https:\/\/fortgale.com\/blog\/?p=7002"},"modified":"2023-09-22T08:02:22","modified_gmt":"2023-09-22T08:02:22","slug":"html-smuggling-and-iceid-trojans-a-guide-to-corporate-defense","status":"publish","type":"post","link":"https:\/\/fortgale.com\/blog\/defence\/html-smuggling-and-iceid-trojans-a-guide-to-corporate-defense\/","title":{"rendered":"HTML Smuggling and IceID Trojan: A Guide to Corporate Defense"},"content":{"rendered":"\n<p>In March, Fortgale detected a significant increase in malicious activity targeting Italian companies associated with the spread of the <strong>Trojan IceID<\/strong> malware. The most relevant activity was identified in the March 16 campaign in which the criminal actor manipulated previous conversations of the victims by inserting a malicious attachment with the<strong>HTML Smuggling technique<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-code has-colibri-color-1-color has-colibri-color-5-background-color has-text-color has-background has-medium-font-size\"><code><strong>HTML Smuggling (T1219.002)\n<\/strong>HTML Smuggling, on the other hand, is a more refined method, used to push the victim to execute the final payload, which consists of the malware.<\/code><\/pre>\n\n\n\n<p>A company that is the victim of an attack like the one described can be exposed to various risks, including:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Data Loss<\/strong>: Compromise by malware, such as the IceID Trojan, can lead to the loss or theft of sensitive data, which can include customer information, financial data, intellectual property, employee personal data, and more .<\/li>\n\n\n\n<li><strong>Legal and Compliance Risks<\/strong>: If sensitive data is compromised in an attack, a company can face legal and compliance penalties. This is especially true if the company operates in highly regulated industries such as healthcare or finance.<\/li>\n\n\n\n<li><strong>Reputational Damage<\/strong>: A malware attack can seriously damage a company&#8217;s reputation, leading to a loss of trust from customers, partners and the public. Repairing this damage can require significant time and resources.<\/li>\n\n\n\n<li><strong>Ransomware<\/strong>: The IceID Trojan has also been used as a dropper for Ransomware. If a company becomes the victim of a ransomware attack, criminals can encrypt the company&#8217;s files and demand a ransom for their decryption. This can lead to direct financial costs and irreversible data loss if the ransom is not paid or if decryption fails <\/li>\n<\/ol>\n\n\n\n<p>It is therefore essential for companies to implement strong cybersecurity measures to prevent such attacks.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-1-malicious-email-overview\" style=\"font-style:normal;font-weight:600;text-transform:uppercase\">1. Malicious email overview<\/h3>\n\n\n\n<p>The compromised email contains an HTML file attachment, designed to simulate the download of a compressed file, called Attach#3400.zip. When the user opens such a file, the malware is activated and downloaded from a remote server. This execution sequence is part of the HTML Smuggling technique, which allows you to bypass traditional security controls and infiltrate malware without the user being aware.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-7.png\" alt=\"Fig. 1 - Malicious email\" class=\"wp-image-5970\" style=\"width:840px;height:549px\" width=\"840\" height=\"549\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-7.png 979w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-7-300x196.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-7-768x502.png 768w\" sizes=\"(max-width: 840px) 100vw, 840px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-2-the-malicious-attachment-and-html-smuggling\" style=\"font-style:normal;font-weight:600;text-transform:uppercase\">2. The Malicious Attachment and HTML Smuggling<\/h3>\n\n\n\n<p>The malicious attachment is an <em>HTML file <\/em>(<strong>INV#22_Payment_03_15.html<\/strong>) within which there is a portion of code that automatically downloads a ZIP archive contained within of the same <em>file <\/em>and encoded in Base64:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"921\" height=\"134\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-8.png\" alt=\"Fig. 2 - Dettaglio dello script che scarica automaticamente l'archivio malevolo\" class=\"wp-image-5971\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-8.png 921w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-8-300x44.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-8-768x112.png 768w\" sizes=\"(max-width: 921px) 100vw, 921px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n<p>Opening the HTML <em>file <\/em>via the Browser shows the victim an error page which pushes the victim to open the downloaded <em>file<\/em> (a ZIP archive) protected by the password indicated in the message . The password is inserted into the web page as an image as a form of anti-analysis, in fact by doing so, it is impossible for automated systems to extract the contents of the ZIP file.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"752\" height=\"424\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-9.png\" alt=\"Fig. 3 - Malicious page contained in the attachment\" class=\"wp-image-5972\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-9.png 752w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-9-300x169.png 300w\" sizes=\"(max-width: 752px) 100vw, 752px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left has-medium-font-size\" id=\"h-3-starting-the-chain-of-compromise\" style=\"font-style:normal;font-weight:600;text-transform:uppercase\">3. Starting the chain of compromise<\/h3>\n\n\n\n<p>Inside the archive there is the file <strong>Document#27_March_15.js<\/strong> containing <em>JavaScript<\/em> code: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"320\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-10-1024x320.png\" alt=\"Fig. 4 - JS Content\" class=\"wp-image-6125\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-10-1024x320.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-10-300x94.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-10-768x240.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-10.png 1176w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>The script is responsible for initiating PowerShell commands to download and execute further malicious code from the <em><strong>momidor[.]top<\/strong><\/em> domain (RU &#8211; 80[.]66[. ]64[.]199):<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1196\" height=\"107\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-11.png\" alt=\"Fig. 5 - Malicious Powershell process\" class=\"wp-image-6126\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-11.png 1196w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-11-300x27.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-11-1024x92.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-11-768x69.png 768w\" sizes=\"(max-width: 1196px) 100vw, 1196px\" loading=\"lazy\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-12.png\" alt=\"Fig. 6 - Decoded Powershell\" class=\"wp-image-6127\" style=\"width:840px;height:126px\" width=\"840\" height=\"126\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-12.png 809w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-12-300x45.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-12-768x115.png 768w\" sizes=\"(max-width: 840px) 100vw, 840px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" style=\"font-style:normal;font-weight:600;text-transform:uppercase\">4. Malware communication and indicators<\/h3>\n\n\n\n<p>The code turns out to be a malicious dll associated with the <strong>IdiceD Trojan<\/strong> (fig. 7) which contacts the Command and Control servers (fig. 8):<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-13-1024x374.png\" alt=\"Fig. 7 - Information about the IcedID sample\" class=\"wp-image-6128\" style=\"width:840px;height:306px\" width=\"840\" height=\"306\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-13-1024x374.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-13-300x109.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-13-768x280.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-13.png 1077w\" sizes=\"(max-width: 840px) 100vw, 840px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"246\" height=\"116\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/05\/image-14.png\" alt=\"Fig. 8 - Command and control server IP and domains\" class=\"wp-image-6129\" loading=\"lazy\" \/><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" style=\"font-style:normal;font-weight:600;text-transform:uppercase\">5. Conclusions<\/h3>\n\n\n\n<p>The detection of these malicious activities, orchestrated using sophisticated techniques such as <strong>HTML Smuggling<\/strong> and the use of malware such as the IceID Trojan, highlights the urgent need for companies to invest in security measures. robust and cutting-edge cybersecurity. These attacks, in fact, can expose organizations to significant risks ranging from the loss of sensitive and valuable data, to possible legal and compliance sanctions, up to the reputational damage and direct economic consequences of a ransomware attack.<\/p>\n\n\n\n<p>In analyzing the attack in question, it is clear how cybercriminals are continually adapting and improving their offensive methods. The use of social engineering, such as manipulating previous conversations and tricking the user into executing the final payload, demonstrates the level of sophistication of today&#8217;s attacks.<\/p>\n\n\n\n<p>The recent use of HTML Smuggling to bypass traditional security controls demonstrates how important it is for businesses to maintain an up-to-date understanding of emerging threats. An effective defense strategy must include training staff on cybersecurity and phishing techniques, regularly updating software, and implementing advanced security tools, such as behavioral analysis and artificial intelligence, to identify and block intrusion attempts.<\/p>\n\n\n\n<p>Finally, given the potential severity of the consequences of a successful attack, the deployment of a team of specialists who can intervene quickly to contain, investigate and resolve a cyber incident should it occur is highly recommended. <\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>In March, Fortgale detected a significant increase in malicious activity targeting Italian companies associated with the spread of the Trojan IceID malware. The most relevant activity was identified in the March 16 campaign in which the criminal actor manipulated previous conversations of the victims by inserting a malicious attachment with theHTML Smuggling technique: A company [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":6146,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1497],"tags":[2497],"class_list":["post-7002","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defence","tag-iced"],"_links":{"self":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/7002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/comments?post=7002"}],"version-history":[{"count":15,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/7002\/revisions"}],"predecessor-version":[{"id":7040,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/7002\/revisions\/7040"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media\/6146"}],"wp:attachment":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media?parent=7002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/categories?post=7002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/tags?post=7002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}