Results 1 to 4 of 4

Thread: Extremely sneaky malicious file technique

  1. #1
    Senior Member
    Join Date
    Aug 2016
    Posts
    4,033
    Thanks
    943
    Thanked
    1,026 times in 738 posts

    Extremely sneaky malicious file technique

    I've just watched a ThioJoe file (good site, for those not familiar, BTW) outlining a VERY crafty method for getting you to run malicious files.

    It's based on "RTLO" characters (Right-To-Left-Override) characters designed, I think, for right to left languages but, combined with another common trick or two (like just changing a file icon), it can make an executable file look like something innocuous, like .... oh, ParyInvite.docx, complete with the relevant file icon.

    Now sure, the common advice of not running ANY file you're not confident of stands good, if you receive a file from family/friend (hacked email, perhaps) which LOOKS like a bland file (.txt, .png, whatever) with an innocent looking name. it would only take a moment's lack of concentration to click it and .... BAM. Executable exectured.


    I think everyone on this site is savvy enough to catch most of this stuff on the basis I mentioned above (if in ANY doubt, bin it), but I still recommend watching this video, because the technique used is VERY sneaky. Interesting, pretty simple IF you're aware of RTLOs, but very sneaky indeed.

    Like ThioJoe said, and I'm not as technical as he is, this one could have caught me out.

    https://www.youtube.com/watch?v=nIcRK4V_Zvc


    BTW .... one method that MIGHT help catch this out is a sructured approach to categorising your email accounts and aliases. There is one email account I have, fairly recently set up, that I don't give to ANYBODY except close family and very close friends. It's a pretty short list.

    Any mail at all on that account from ANYBODY else is automatically binned. Period.

    Similarly, if i get mail from that shortlist on any other account, I'm pretty suspicious about it. It MIGHT just be legit, and they forgot which account to use, or .....

    A similar but different approach could be used for banking, tax, medical etc. i.e. ONLY strictly necessary but sensitive stuff.

    It is not a complete email setup by any means, but it is the start of an approach to reduce risk.
    Last edited by Saracen999; 30-03-2023 at 05:17 AM. Reason: Tpyo
    A lesson learned from PeterB about dignity in adversity, so Peter, In Memorium, "Onwards and Upwards".

  2. Received thanks from:

    AGTDenton (29-03-2023),CAT-THE-FIFTH (29-03-2023),ik9000 (30-03-2023),Rob_B (28-03-2023)

  3. #2
    Senior Member Pob255's Avatar
    Join Date
    Apr 2007
    Location
    The land of Brum
    Posts
    10,143
    Thanks
    608
    Thanked
    1,226 times in 1,123 posts
    • Pob255's system
      • Motherboard:
      • Asus M5A99X EVO
      • CPU:
      • FX8350 & CM Hyper 212+
      • Memory:
      • 4 x 2gb Corsair Vengence 1600mhz cas9
      • Storage:
      • 512gb samsung SSD +1tb Samsung HDD
      • Graphics card(s):
      • EGVA GTX970
      • PSU:
      • Seasonic GX 650W
      • Case:
      • HAF 912+
      • Operating System:
      • W7 Pro
      • Monitor(s):
      • iiyama XB3270QS-B1 32" IPS 1440p

    Re: Extremely sneaky malicious file technique

    That's sneaky, although as he shows at the end if you don't have file extensions on then and only the single . then the file extension gets merged with the file name
    As most people have it as the default off the 2nd . will make it more obvious at a glance, so two . is probably going to be the common form

    Pay attention to things you get is still a solid defence

    Could you put in a mail rule to block any attachment with more than one . in it?

  4. #3
    Chaos Monkey Apex's Avatar
    Join Date
    Jul 2003
    Location
    Huddersfield
    Posts
    4,712
    Thanks
    1,154
    Thanked
    287 times in 206 posts
    • Apex's system
      • Motherboard:
      • Asus Z87M-PLUS
      • CPU:
      • Intel i5-4670K
      • Memory:
      • 32 GiB
      • Storage:
      • 20 TiB
      • Graphics card(s):
      • PowerColor Radeon RX 6700 Fighter 10GB OC
      • PSU:
      • 750
      • Case:
      • Core View 21
      • Operating System:
      • Windows 10 pro
      • Monitor(s):
      • Dell S2721DGFA
      • Internet:
      • 200Mb nTL Cable

    Re: Extremely sneaky malicious file technique

    am pretty sure this is what was used to hijack the LTT session cookie and allow it to be taken over....

  5. #4
    RIP Peterb ik9000's Avatar
    Join Date
    Nov 2009
    Posts
    7,743
    Thanks
    1,849
    Thanked
    1,442 times in 1,065 posts
    • ik9000's system
      • Motherboard:
      • Asus P7H55-M/USB3
      • CPU:
      • i7-870, Prolimatech Megahalems, 2x Akasa Apache 120mm
      • Memory:
      • 4x4GB Corsair Vengeance 2133 11-11-11-27
      • Storage:
      • 2x256GB Samsung 840-Pro, 1TB Seagate 7200.12, 1TB Seagate ES.2
      • Graphics card(s):
      • Gigabyte GTX 460 1GB SuperOverClocked
      • PSU:
      • NZXT Hale 90 750w
      • Case:
      • BitFenix Survivor + Bitfenix spectre LED fans, LG BluRay R/W optical drive
      • Operating System:
      • Windows 7 Professional
      • Monitor(s):
      • Dell U2414h, U2311h 1920x1080
      • Internet:
      • 200Mb/s Fibre and 4G wifi

    Re: Extremely sneaky malicious file technique

    oh crap. Now I have to find a way to get the various people I help to understand this. How hard is it to do some sort of script that adds a right-click menu option to test a file name for these dodgy characters, and file property class? It can't be that difficult can it?

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •