<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p style="margin:0;margin-bottom:.0001pt;"><img class="alignnone size-full wp-image-2047" src="http://cdn2.hubspot.net/hubfs/2548414/Imported_Blog_Media/shadow.jpg" alt="Shadow" width="1701" height="1129"></p> <p style="margin:0;margin-bottom:.0001pt;"><span style="font-size:10pt;font-family:'Arial', sans-serif;color:black;">Over the last decade, the Infy malware family has been out and about and <a href="http://researchcenter.paloaltonetworks.com/2016/05/prince-of-persia-infy-malware-active-in-decade-of-targeted-attacks/">successfully operating</a> mostly under the radar. It was first discovered in 2015 while used in attacks on an Israeli industrial target, as well as a U.S. government target. These attacks led to the detection of a whole malware campaign and infrastructure that includes over 40 variants of malware. </span></p> <!--more--><p style="margin:0;margin-bottom:.0001pt;"><span style="font-size:10pt;font-family:'Arial', sans-serif;color:black;">&nbsp;</span></p> <p style="margin:0;margin-bottom:.0001pt;"><span style="font-size:10pt;font-family:'Arial', sans-serif;color:black;">The Infy malware family uses spear-phishing emails with Word or Powerpoint attachments as the infection vector. Hidden within these legitimate-looking documents are self-extracting executable (SFX) archives. The threat actors then use social engineering techniques to lure the victim into running the SFX, in which a malicious .exe waits to pull a payload DLL. </span></p> <p style="margin:0;margin-bottom:.0001pt;"><span style="font-size:10pt;font-family:'Arial', sans-serif;color:black;">&nbsp;</span></p> <p style="margin:0;margin-bottom:.0001pt;"><span style="font-size:10pt;font-family:'Arial', sans-serif;color:black;">The malware waits until reboot, and then checks for antivirus software on the victim’s machine using a list of several common AV installation directories. If the AV found poses a threat to the Infy installation, the malware will either abort, or connect to the C&amp;C, pull the malicious Infy DLL, and install it using a different technique than initially planned. The malware's main functionality is data exfiltration - collection of environment data, keylogger function, password stealer, and cookie collection - which is sent back to the C&amp;C servers.</span></p> <p style="margin:0;margin-bottom:.0001pt;"><span style="font-size:10pt;font-family:'Arial', sans-serif;color:black;">&nbsp;</span></p> <p style="margin:0;margin-bottom:.0001pt;"><span style="font-size:10pt;font-family:'Arial', sans-serif;color:black;">The name "Infy" comes from a pattern that researchers noticed in various strings. Examples include filenames (“infy74f1.exe"), C2 strings (“subject=INFY M 7.8”), and C2 folder names.</span></p> <p style="margin:0;margin-bottom:.0001pt;"><span style="font-size:10pt;font-family:'Arial', sans-serif;color:black;">&nbsp;</span></p> <p style="margin:0;margin-bottom:.0001pt;"><span style="font-size:10pt;font-family:'Arial', sans-serif;color:black;">ThreatSTOP customers are protected from Infy.</span></p></span>