Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Dorifel Malware Actively Spreading Despite Mass Detection

The malware responsible for attacks on at least 30 local governments, universities, and businesses in the Netherlands, Dorifel (XDocCrypt), is still actively spreading and causing new infections, despite a wide net of detection within the anti-Virus market.

The malware responsible for attacks on at least 30 local governments, universities, and businesses in the Netherlands, Dorifel (XDocCrypt), is still actively spreading and causing new infections, despite a wide net of detection within the anti-Virus market.

Dorifel is interesting, as it has many capabilities including Web injection, logging financial information, and file encryption. It’s not ransomware, but the files are encrypted simply because it’s possible it seems. Word of the malware family started to spread last week, and by the weekend, most AV circles were discussing it. Unfortunately, the hype surrounding it has caused some enterprising scammers to use it for their own gain.

Malware“Martijn Grooten, of Virus Bulletin, tells me that it has attracted the attention of telephone support scammers, who are using it to convince potential victims in the Netherlands that they need to let the scammer ‘clean’ or ‘protect’ their systems. For a price, as always…There’s no indication that these scammers have any connection at all with the gang behind [Dorifel],” commented ESET’s David Harley.

According to Kaspersky Lab, more than 3,000 systems were hit last week, 90% of them in the Netherlands.

“We have seen government departments and hospitals being victims. The other countries with a large amount of infections were detected in Denmark, the Philippines, Germany, the United States and Spain,” noted Kaspersky Labs’ David Jacoby.

“The malware is initially distributed via email to victims. [It] then downloads another malware, which encrypts documents and executes them on the infected computer. Dorifel also attempts to encrypt files found on network shares.”

Investigating further, Jacoby discovered log files with financial records taken from compromised hosts (credit card details, CVV, name, etc.), as well as a collection of Java exploits, Rogue-AV agents, additional malware, infection stats (which is how the security world knows Dorifel is still active), and WebInjects used for Phishing sites.

“As mentioned before, we did find some interesting financial information, which could be an indication that this malware scam is related to for example ZeuS / Citadel, but since we have not yet identified any malware related to ZeuS/Citadel we cannot confirm it. All we can confirm is that the same server does store stolen financial information. We are still investigating this,” Jacoby wrote.

For now, the malware remains active, and because it spreads via targeted email and can attach itself to common document formats (*.doc, *.docx, *.xls, *.xlsx, etc.), and targets mapped network drives and removable storage, it’s spreading rather quickly.

Advertisement. Scroll to continue reading.

Additional information can be found on Fox-IT’s blog, the company is credited for the initial discovery and research on Dorifel. 

McAfee has additional information as well, though they call the malware XDocCrypt

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.