Darktrace email finds: Rare file type used to evade gateway tools
Mariana Pereira, Director of Email Security Products | Thursday August 27, 2020
Darktrace has recently seen a string of email attacks that use some degree of social engineering to convince the recipient to open a misleading link and divulge their credentials. In this blog, we look at an email attack targeting a Spanish customer that involved hiding malicious content in an unusual file type that is not regularly checked by common email security tools.
An ISO file, often referred to as an ISO image, is an archive file that contains an identical copy of data found on an optical disc, like a CD or DVD. They are primarily used for backing up optical discs or distributing large file sets that are intended to be burned onto an optical disc. Since they are relatively unusual – and are typically extremely large files – most standard email controls don’t analyse them in any depth, if at all.
Darktrace detected one cyber-criminal using ISO files to inflict damage on a food distributor in Spain. The organization, which had adopted Antigena Email just two weeks earlier, received around 84 emails from the same sender, each containing a malicious ISO attachment. The emails were received from info@valeplaz[.]com, a clever and well-executed spoof of the email address info@valenplas[.]com, which is the contact email of a legitimate Spanish manufacturer – possibly even a supplier of the victim organisation.
Darktrace noticed that the sender had never been seen in any prior correspondences across the business. Additionally, the personal field does not correspond with the header in the email itself – which is what would be visible to the recipient. In the connection IP address and checks, Darktrace’s AI revealed that the true sender does not correspond with the domain valeplaz[.]com.
The subject line suggests that the email is about an order the client made. Analysing the attachments, Darktrace surfaced a file titled URGENTE_PO_120620.iso. The name of the file suggests the sender is attempting to use the social engineering tactic of urgency in order to alarm the recipients, leading them to jump into action and click a link or open attachments without carefully considering the details of the email.
Darktrace’s AI also recognized that the file extension .iso is highly anomalous for the group, user, and the organisation as a whole. Even more suspiciously, the size of the attachment is incredibly small (just 485.4 kB), which makes it highly unlikely that it was, in fact, a genuine invoice in the form of a PDF or Word attachment. These findings, in conjunction with the New Contact and Wide Distribution tags of the email, caused Antigena Email to strip the email of the attachment and hold it back from each recipient’s inbox. In addition, Darktrace’s AI revealed that the email contained an anomalous link which it deemed highly suspicious, and locked the link in all emails while the security team investigated the incident.
Stopping the attack without a Patient Zero
When the security team later checked the file hash on the attachment, they discovered that some anti-virus vendors, including Microsoft, had already labelled it as malware. The crucial challenge is to stop the malicious email in the first instance – before it lands in the first inbox. With a continuously updated understanding of ‘self’, Darktrace’s AI is able to do just that – stopping attacks without requiring a ‘Patient Zero’ be infected.
Moreover, many legacy solutions hadn’t yet recognized this file hash as malicious, suggesting that this was a relatively new attack. This exposes an increasingly obvious limitation of such tools – attackers are refreshing their attack infrastructure so often that no matter how frequently legacy tools or blacklists are updated, they are outdated almost immediately.
Antigena Email caught this attack without relying on any signatures and blacklists, but instead by learning whether or not the email, file, and behaviour was normal for the unique business. With Cyber AI protecting their inbox, this organisation was able to thwart this attack in the first instance – before any emails landed in an inbox or any employees clicked on the link.