{"id":17271,"date":"2023-10-25T10:28:39","date_gmt":"2023-10-25T10:28:39","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=17271"},"modified":"2023-10-25T10:31:04","modified_gmt":"2023-10-25T10:31:04","slug":"skype-microsoft-teams-spam-darkgate-loader","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/skype-microsoft-teams-spam-darkgate-loader\/","title":{"rendered":"Skype &#038; Microsoft Teams Spam Spreads DarkGate Loader"},"content":{"rendered":"<p>Over the past few years, <strong>DarkGate has been relatively inactive<\/strong>. However, several campaign deployments have been detected this year across the Americas, Asia, the Middle East, and Africa. <strong>They started to aim at Microsoft apps<\/strong>, such as Skype and Teams, for spreading to target systems.<\/p>\n<h2>What is DarkGate Loader?<\/h2>\n<p><a href=\"https:\/\/gridinsoft.com\/blogs\/darkgate-loader-delivers-ransomware\/\">DarkGate Loader is a type of malware<\/a> that is capable of downloading and <strong>running other types of malware<\/strong>, including ransomware, trojans, and cryptocurrency miners. Additionally, it can be used to <strong>extract sensitive data<\/strong> from the victim&#8217;s computer, such as passwords, credit card numbers, and personal information.<\/p>\n<p>This malware is typically distributed <a href=\"https:\/\/gridinsoft.com\/phishing\">via phishing emails<\/a> or malicious attachments. Once it is installed on the victim&#8217;s computer, it can <strong>communicate with a remote command<\/strong> and control (C2) server to receive instructions and download additional malware.<\/p>\n<figure id=\"attachment_17280\" aria-describedby=\"caption-attachment-17280\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_BLOG_Distribution-of-DarkGate-campaign-from-August-to-September-2023_790x400px.webp\" alt=\"Distribution of DarkGate \" width=\"790\" height=\"400\" class=\"size-full wp-image-17280\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_BLOG_Distribution-of-DarkGate-campaign-from-August-to-September-2023_790x400px.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_BLOG_Distribution-of-DarkGate-campaign-from-August-to-September-2023_790x400px-300x152.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_BLOG_Distribution-of-DarkGate-campaign-from-August-to-September-2023_790x400px-768x389.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><figcaption id=\"caption-attachment-17280\" class=\"wp-caption-text\">Distribution of DarkGate campaign (August -September 2023)<\/figcaption><\/figure>\n<p><strong>DarkGate Loader has been gaining popularity<\/strong> among cybercriminals since its creator advertised it as a Malware-as-a-Service offering on popular forums in June 2023. Previously, DarkGate Loader was <strong>distributed using traditional email-based malspam<\/strong> campaigns, similar to those used by Emotet. However, an operator started <strong>using Microsoft Teams to deliver the malware<\/strong> in August via HR-themed social engineering chat messages. This new tactic has led to an increase in the number of DarkGate Loader infections.<\/p>\n<h2>DarkGate Spreads Via Microsoft Teams And Skype Spam<\/h2>\n<p>A company has been facing a targeted phishing attack since late September. The attackers have been <strong>using Microsoft Teams functionality<\/strong> to deliver the <a href=\"https:\/\/github.security.telekom.com\/2023\/08\/darkgate-loader.html\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">DarkGate Loader malware<\/a>. Fortunately, all the employees were regularly trained to identify phishing attempts, and they promptly intervened. As a result, no employees, customers, or company resources were harmed during this incident. The malicious message was blocked before it could reach any of the employees.<\/p>\n<figure id=\"attachment_17293\" aria-describedby=\"caption-attachment-17293\" style=\"width: 1019px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/the-darkgate.png\" alt=\"Phishing message \" width=\"1019\" height=\"656\" class=\"size-full wp-image-17293\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/the-darkgate.png 1019w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/the-darkgate-300x193.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/the-darkgate-768x494.png 768w\" sizes=\"auto, (max-width: 1019px) 100vw, 1019px\" \/><figcaption id=\"caption-attachment-17293\" class=\"wp-caption-text\">Teams message with a malicious attachment<\/figcaption><\/figure>\n<p>After analyzing a recent case, we discovered that the <strong>DarkGate Loader malware was delivered in the payload of a ZIP archive<\/strong>. The image below illustrates the entire attack process, from the moment the Microsoft Teams message is sent to the execution of the DarkGate Loader:<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_BLOG_Attack-chain-from-the-Microsoft-Teams-message_790x510px.webp\" alt=\"Microsoft Teams Attack chain\" width=\"790\" height=\"510\" class=\"aligncenter size-full wp-image-17302\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_BLOG_Attack-chain-from-the-Microsoft-Teams-message_790x510px.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_BLOG_Attack-chain-from-the-Microsoft-Teams-message_790x510px-300x194.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_BLOG_Attack-chain-from-the-Microsoft-Teams-message_790x510px-768x496.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><\/p>\n<p>In the next sample, the threat actor exploited a trusted relationship between two organizations to <strong>trick the recipient into running the attached VBA script<\/strong>. By gaining access to the victim&#8217;s Skype account, the attacker could take control of an existing messaging thread and create file names related to the chat history&#8217;s context.<\/p>\n<figure id=\"attachment_17281\" aria-describedby=\"caption-attachment-17281\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_Blog_DarkGate-delivery-via-Skype_790x540px.webp\" alt=\"DarkGate chain\" width=\"790\" height=\"540\" class=\"size-full wp-image-17281\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_Blog_DarkGate-delivery-via-Skype_790x540px.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_Blog_DarkGate-delivery-via-Skype_790x540px-300x205.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_Blog_DarkGate-delivery-via-Skype_790x540px-768x525.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><figcaption id=\"caption-attachment-17281\" class=\"wp-caption-text\">DarkGate infection chain abusing Skype<\/figcaption><\/figure>\n<p>The victims were sent a message from a <strong>compromised Skype account<\/strong>. The message contained a deceptive VBS script with a file name that followed the format:  &#8220;<code><filename.pdf> www.skype[.]vbs<\/code>&#8220;. The spacing in the file name was <strong>deliberately designed to trick the user<\/strong> into thinking that the file was a .PDF document while actually hiding the real format, which was <code>www.skype[.]vbs<\/code>. In this sample, the recipient believed that the sender was someone from a trusted external supplier.<\/p>\n<h2>Installation Consequences<\/h2>\n<p>Experts noticed that the threat was functioning as a downloader of further payloads. Once <a href=\"https:\/\/howtofix.guide\/darkgate-malware\/\" rel=\"noopener nofollow\" target=\"_blank\">the DarkGate malware<\/a> was installed, it deposited files in both the <code><\u0421:\/Intel\/><\/code> and <code><%appdata%\/Adobe\/><\/code> directories, which aided in its attempt to disguise itself.<\/p>\n<p>The dropped files were identified as variations of either DarkGate or Remcos, most likely to <strong>enhance the attackers&#8217; hold on the infected system<\/strong>. Below are some of the sample file names we came across for these additional payloads:<\/p>\n<ul>\n<li>Folkevognsrugbrd.exe<\/li>\n<li>logbackup_0.exe<\/li>\n<li>sdvbs.exe<\/li>\n<li>Vaabenstyringssystem.exe<\/li>\n<li>Sdvaners.exe<\/li>\n<li>Dropper.exe<\/li>\n<\/ul>\n<h2>How to protect against DarkDate Loader?<\/h2>\n<p><strong>DarkGate Loader is a dangerous malware<\/strong> that can be used to steal sensitive data from your computer and install other malware, <a href=\"https:\/\/gridinsoft.com\/ransomware\">such as ransomware<\/a> and trojans. Whether you are an individual or an organization, it is important to be aware of the risks posed by DarkGate Loader and to take steps to protect yourself.<br \/>\nTo protect you and your organization against DarkGate Loader, you can take the following steps:<\/p>\n<ul>\n<li><strong>Using a reliable password manager<\/strong> to create and store strong, individual passwords for all your accounts is crucial. Strong passwords are complex to guess and can protect your accounts from brute force attacks.<\/li>\n<li><strong>Implement a web content filtering solution<\/strong> to block malicious websites. A web content filter prevents access to known malware and phishing sites.<\/li>\n<li><strong>Deploy a next-generation firewall (NGFW)<\/strong> to protect your network from malicious traffic. An NGFW can help to detect and block malware, phishing emails, and other types of cyberattacks.<\/li>\n<li><strong>Only download software and files from reputable sources<\/strong>. Avoid downloading files from suspicious websites or using unofficial app stores.<\/li>\n<li><strong>Use EDR\/XDR to provide real-time monitoring<\/strong>, threat detection, and incident response capabilities across your network and endpoints. These tools can identify unusual or suspicious activities that could indicate loader malware.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Over the past few years, DarkGate has been relatively inactive. However, several campaign deployments have been detected this year across the Americas, Asia, the Middle East, and Africa. They started to aim at Microsoft apps, such as Skype and Teams, for spreading to target systems. What is DarkGate Loader? DarkGate Loader is a type of [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":17303,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[619,1197,28,10,670],"class_list":{"0":"post-17271","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-cybersecurity","9":"tag-dropper","10":"tag-malware","11":"tag-spam","12":"tag-threats"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_Blog_banner_Skype-Microsoft-Teams-Spam-Spreads-DarkGate-Loader_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/17271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=17271"}],"version-history":[{"count":11,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/17271\/revisions"}],"predecessor-version":[{"id":17305,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/17271\/revisions\/17305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/17303"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=17271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=17271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=17271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}