Ducktail
Ductail Stealer
Name: Ducktail
- Type: Information Stealer
- Origin: Presumably Vietnam
- Active Since: Mid-2021, with origins traced back to 2018
- Primary Target: Facebook Business Accounts
- Method of Attack:
- Delivery: Phishing emails containing malicious archives (T1566.001: Phishing: Spearphishing Attachment) with images/videos as bait and executable files disguised as PDFs.
- Execution: Alters shortcuts to Chromium-based browsers to install a malicious browser extension (T1176: Browser Extensions), using PowerShell (T1059.001: Command and Scripting Interpreter: PowerShell).
- Capabilities:
- Steals Facebook account details and cookies, including hijacking Ads and Business accounts (T1539: Steal Web Session Cookie).
- Bypasses two-factor authentication.
- Geographical Impact: India, Kazakhstan, Ukraine, Germany, Portugal, Ireland, Greece, Jordan, Pakistan, Vietnam, UAE, USA, Peru, Chile.
- Motivation: Hijacking Facebook accounts for unauthorized advertising or sale on the black market.
- MITRE ATT&CK Techniques:
- T1566.001: Phishing: Spearphishing Attachment
- T1176: Browser Extensions
- T1059.001: Command and Scripting Interpreter: PowerShell
- T1129: Shared Modules
- T1204.002: User Execution: Malicious File
- T1539: Steal Web Session Cookie
- T1583.001: Acquire Infrastructure: Domains
- T1589: Gather Victim Identity Information
- T1598.002: Phishing for Information: Spearphishing Attachment
- T1027: Obfuscated Files or Information
- T1071.001: Application Layer Protocol: Web Protocols
- T1132.001: Data Encoding: Standard Encoding
- T1041: Exfiltration Over C2 Channel
Comments
Post a Comment