www.rivitmedia.comwww.rivitmedia.comwww.rivitmedia.com
  • Home
  • Tech News
    Tech NewsShow More
    Microsoft’s May 2025 Patch Tuesday: Five Actively Exploited Zero-Day Vulnerabilities Addressed
    7 Min Read
    Malicious Go Modules Unleash Disk-Wiping Chaos in Linux Supply Chain Attack
    4 Min Read
    Agentic AI: Transforming Cybersecurity in 2025
    3 Min Read
    Cybersecurity CEO Accused of Planting Malware in Hospital Systems: A Breach of Trust That Shocks the Industry
    6 Min Read
    Cloud Convenience, Criminal Opportunity: How Google Sites Became a Launchpad for Elite Phishing
    6 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
    • Microsoft CVE Errors
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 rivitMedia.com. All Rights Reserved.
Reading: Urnsif Malware: What is it and how to Deal with it?
Share
Notification Show More
Font ResizerAa
www.rivitmedia.comwww.rivitmedia.com
Font ResizerAa
  • Online Scams
  • Tech News
  • Cyber Threats
  • Mac Malware
  • Cybersecurity for Business
  • FREE SCAN
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    • Cybersecurity for Business
  • FREE SCAN
  • Sitemap
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
www.rivitmedia.com > Blog > Cyber Threats > Malware > Urnsif Malware: What is it and how to Deal with it?
IT/Cybersecurity Best PracticesMalwareTech News

Urnsif Malware: What is it and how to Deal with it?

riviTMedia Research
Last updated: October 25, 2023 5:16 pm
riviTMedia Research
Share
Urnsif Malware: What is it and how to Deal with it?
SHARE

Security researchers have discovered a new Ursnif malware delivery campaign that leverages Excel 4.0 macro functionality

In an analysis of one delivery campaign involving Ursnif malware (also known as Gozi) that dated back to January 2020, IT services provider Morphisec discovered that many of the malicious files used .xlsm as their extension. They also seemed to have “3” as their detection score, a rating too low to have static heuristic-based approaches flag the files as suspicious. 

Contents
Security researchers have discovered a new Ursnif malware delivery campaign that leverages Excel 4.0 macro functionalityOther Attacks Involving UrsnifHow to Defend Against Malicious Macros

This caused many detection-based anti-malware products to miss the files. Once opened, these files leveraged text to ask that users enable editing and content capabilities. This technique helped the files evade OCR heuristic detection methods more easily than if the files used images to initiate the same request.

Enabling the content activated a defining capability of the widely used Excel 4.0: the use of macro worksheets to deploy XLM macros. In this particular case, the heavily obfuscated sheet was able to hide, and leverage “RUN” commands before ending with some “CALL” and “EXEC” instructions. Those instructions initiated a process that allowed the Excel 4.0 macros to download Ursnif via the Win32 API function.

Other Attacks Involving Ursnif

Security researchers have detected several Ursnif campaigns over the past year. For instance, in August 2019, threat researchers Fortinet spotted a campaign that used Microsoft Word documents to spread a different variant of the malware.

In early 2020, the SANS Internet Storm Center discovered a malspam campaign that targeted German users with password-protected ZIP archives delivering the payload. More recently, in April of 2020, corporate network security provider Zscaler, observed a campaign that embraced mshta, as opposed to PowerShell, for its second-stage payload before ultimately delivering the Gozi trojan.

How to Defend Against Malicious Macros

IT pros can help defend against malicious macros by implementing logging and reviewing logs for suspicious activity that could indicate a malware infection. Companies would also be wise to invest in continuous security training so that employees will be less likely to open email attachments that carry malicious macros.

You Might Also Like

The 5 Most Notorious Organized Hacking Groups
Trojan:HTML/Redirector.GPAY!MTB – Understanding and Eliminating the Threat
Remove Anubi Ransomware
LocalInfo Malware: Removal Guide and Prevention Tips
Remove Apkft.xyz
TAGGED:Best PracticesMalwareTech News

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article STOP and Zorab Ransomware: An Overview
Next Article An Overview of the Most Common Practices Employed by Ransomware
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Free

✅ Free Scan Available 

✅ 13M Scans/Month

✅ Instant Detection

Download SpyHunter 5
Download SpyHunter for Mac

//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

www.rivitmedia.comwww.rivitmedia.com
© 2023 • rivitmedia.com All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US