Jump to content
  • Fake Microsoft Office add-in tools push malware via SourceForge


    Karlston

    • 144 views
    • 3 minutes
     Share


    • 144 views
    • 3 minutes

    Threat actors are abusing SourceForge to distribute fake Microsoft add-ins that install malware on victims' computers to both mine and steal cryptocurrency.

     

    SourceForge.net is a legitimate software hosting and distribution platform that also supports version control, bug tracking, and dedicated forums/wikis, making it very popular among open-source project communities.

     

    Although its open project submission model gives plenty of margin for abuse, actually seeing malware distributed through it is a rare occurrence.

     

    The new campaign spotted by Kaspersky has impacted over 4,604 systems, most of which are in Russia.

     

    While the malicious project is no longer available on SourceForge, Kaspersky says the project had been indexed by search engines, bringing traffic from users searching for "office add-ins" or similar.

     

    SourceForge page hosting the malware on search results
    SourceForge page hosting the malware on search results
    Source: Kaspersky

    Fake Office add-ins

    The "officepackage" project presents itself as a collection of Office Add-in development tools, with its description and files being a copy of the legitimate Microsoft project 'Office-Addin-Scripts,' available on GitHub.

     

    Malicious project (left) and legitimate tool (right)
    Malicious project (left) and legitimate tool (right)
    Source: Kaspersky

    However, when users search for office add-ins on Google Search (and other engines), they get results pointing to "officepackage.sourceforge.io," powered by a separate web hosting feature SourceForge gives to project owners.

     

    That page mimics a legit developer tool page, showing the "Office Add-ins" and "Download" buttons. If any are clicked, the victim receives a ZIP containing a password-protected archive (installer.zip) and a text file with the password.

     

    The malware-distributing website
    The malware-distributing site
    Source: BleepingComputer

    The archive contains an MSI file (installer.msi) inflated to 700MB in size to evade AV scans. Running it drops 'UnRAR.exe' and '51654.rar,' and executes a Visual Basic script that fetches a batch script (confvk.bat) from GitHub.

     

    The script performs checks to determine whether it runs on a simulated environment and what antivirus products are active, and then downloads another batch script (confvz.bat) and unpacks the RAR archive.

     

    The confvz.bat script establishes persistence via Registry modifications and the addition of Windows services.

     

    The RAR file contains an AutoIT interpreter (Input.exe), the Netcat reverse shell tool (ShellExperienceHost.exe), and two payloads (Icon.dll and Kape.dll).

     

    The complete infection chain
    The complete infection chain
    Source: Kaspersky

    The DLL files are a cryptocurrency miner and a clipper. The former hijacks the machine's computational power to mine cryptocurrency for the attacker's account, and the latter monitors the clipboard for copied cryptocurrency addresses and replaces them with attacker-controlled ones.

     

    The attacker also receives the infected system's information via Telegram API calls and can use the same channel to introduce additional payloads to the compromised machine.

     

    This campaign is another example of threat actors exploiting any legitimate platform to gain false legitimacy and bypass protections.

     

    Users are recommended to only download software from trusted publishers who they can verify, prefer the official project channels (in this case GitHub), and scan all downloaded files with an up-to-date AV tool before execution.

     

    Source


    Hope you enjoyed this news post.

    Thank you for appreciating my time and effort posting news every day for many years.

    News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of March): 1,357

    RIP Matrix | Farewell my friend  :sadbye:


    User Feedback

    Recommended Comments

    There are no comments to display.



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...