2021
DOI: 10.48550/arxiv.2103.16143
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents

Abstract: Many malware campaigns use Microsoft (MS) Office documents as droppers to download and execute their malicious payload. Such campaigns often use these documents because MS Office is installed in billions of devices and that these files allow the execution of arbitrary VBA code. Recent versions of MS Office prevent the automatic execution of VBA macros, so malware authors try to convince users into enabling the content via images that, e.g. forge system or technical errors.In this work, we leverage these visual… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The aim of this paper is to look at how similar the behaviours of this particular set of malware (Casino et al, 2021) are, despite the fact that they all have distinct and somewhat unknown roots. This higher-level abstraction of malware functionality is represented by the automated categorization of the behaviours present in a malware illustration.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The aim of this paper is to look at how similar the behaviours of this particular set of malware (Casino et al, 2021) are, despite the fact that they all have distinct and somewhat unknown roots. This higher-level abstraction of malware functionality is represented by the automated categorization of the behaviours present in a malware illustration.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As the hacker industry becomes more fully professionalized, it is becoming much more adaptive and flexible, making it harder for intelligence and law enforcement to confront. Hacking organizations such as Russia's Strontium (also commonly known as APT28 or Fancy Bear) 9 and China's APT31 (or Zirconium) 10 continue to perform malicious attacks against IoT devices. As with other kinds of illicit industries that have professionalized -drug dealing and human trafficking, for instance -hacking is and will increasingly be dominated by sophisticated actors who understand themselves as 'businessmen', and who regard law enforcement less as a deterrent than as a regulatory force, that is, as a cost of doing business.…”
Section: Implications Of the Hacker Professionalizationmentioning
confidence: 99%
“…Some MaaS sites have become so easy to use customers can use simple Web forms to indicate, for example, which site they wish run a denial-of-service (DoS) attack against, or how many spam emails they wish to send [21]. As security researchers have noted malware authors rent or pass the control of the compromised devices to their peers [9]. Moreover, for many malware families, the attribution of malware to an actor is not straightforward, and due to the malware evolution and code exchange in groups, it becomes a very challenging task.…”
Section: The Evolving Hacker Threat: Hacking-as-a-servicementioning
confidence: 99%