Attackers hide malware in James Webb telescope images

Securonix researchers have uncovered a malicious campaign called “GO # WEBBFUSCATOR,” which embeds malicious documents in space images from the Webb telescope.

After investigating a recent incident, researchers discover that the threat actor drops payloads onto the virus scanning platform that are not now marked as malicious.

The infection process begins with a phishing email with an attached malicious document, “Gens-Rates.docx,” which downloads a template file. The file contains an obfuscated VBS macro that auto-executes it macros are enabled in the Office suite.

The code then downloads a JPG image from a remote resource, decodes it into an executable program, and launches it. JPG shows the galaxy cluster SMACS 0723, which was released by NASA in July 2022 when it was launched with an image viewer. When opened with a text editor, the image displays additional content disguised as an accompanying certificate, which is a Base64-encoded payload that turns into the malicious 64-bit executable.

The malware achieves persistence by copying itself and adding a new registry key. Once executed, the malware establishes a DNS connection to the command and control (C2) server and sends encrypted queries.

The sources for this piece include an article in BleepingComputer.

IT World Canada Staff
IT World Canada Staff
The online resource for Canadian Information Technology professionals.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

ITW in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

More Best of The Web