A social engineering-based malvertising campaign has been discovered targeting Japanese crypto users. The campaign spreads via malicious applications by taking advantage of sideloading vulnerabilities in them. The exploited vulnerabilities are being used to load and start the Cinobi banking trojan.
What has happened
According to researchers, the new campaign from the Water Kappa actor is targeting Japanese users with malicious applications marketed as reward-points applications, free porn games, or video streaming applications.
The sideloading vulnerabilities—CVE-2020-1380 and CVE-2021-26411—exist in Internet Explorer, which has been exploited to spread the Cinobi banking trojan.
Researchers have observed five different themes of malvertisements, all of which try to fool unsuspecting users into downloading the same malware.
The group is using Cinobi to steal the credentials of its victims’ cryptocurrency accounts.
The overall functionality spotted in the new Cinobi sample is still the same as used during the previous attack by the same threat actor in March 2020.
An extension of the previous campaign
Experts further revealed that the recent malvertising campaign is just an extension of the earlier campaign discovered in March 2020.
The earlier campaign was named Operation Overtrap when Water Kappa was seen delivering Cinobi via spam. Additionally, the trojan was spreading via a Bottle exploit kit abusing Internet Explorer exploits.
From 2020 to H1 2021, limited activity from the Bottle exploit kit was observed with decreasing traffic in the middle of June. It is surmised that the threat actor was preparing for updated tools or techniques.
The recent campaign shows that Water Kappa is still active and is investing in updating its Cinobi malware to attack cryptocurrencies. In addition to this, it apparently decreased its activities to enhance its tools, indicating that this financially motivated actor has a planned strategy.