• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

EITest HoeflerText potential Scam Spreading Netsupport Manager and GandCrab

March 1, 2018Simeon Georgiev

Although Bitdefender already sent ahead a GandCrab decryptor, the GandCrab affiliates are already adopting new techniques to continue spreading the ransomware. The malware traffic analysis entity, nano_sec, found out that GandCrab was being distributed through the use of EITest, as a part of the scam labeled HoeflerText Font Update.

This scam, which has its basis in social engineering, scrambles a hacked site’s text, after a user has accessed it through a search engine. The JavaScript decrypting the text does not recognize the text which is on the site, after which it prompts the user that the browser failed to recognize the script which has been used on the site, and that the user should install a Font Pack, to remedy the issue.

Should the browser show the pop-up, and the user clicks on it, it will begin to download a file named Font_Update.exe. This is the file which contains the GandCrab Ransomware. Any.Run, which is a malware analysis sandbox-based site, has a video on it which shows the effects of the ransomware, when it is installed by a user.

Netsupport Manager Remote Access Utility also pushed by EITest

When nano_sec provided the site, which I then tested; instead of facing the GandCrab scam, I had the Netsupport Manager remote access utility downloaded and installed on to my system. It is the belief of nano_sec that depending on the visitor’s location, the sort of payloads which are distributed can differ.

As I experienced, when Font_Update.exe gets executed, it extracts and runs an obfuscated g.js file. The g.js script then connects to a remote site and starts to download any number and type of files on to the computer, which has now been fully infected.

These files are for the aforementioned Netsupport Manager remote access utility. They are downloaded in a folder named tokipp, by the name %AppData%. One very important point to note is that the Netsupport Manager remote access utility is not actually maliscious. In fact, it is legitimate in its purpose, however, it is currently being used in a negative light by hackers.

Once all of the files are downloaded, the client32.exe program will be executed and the attackers will be able to gain access to the infected computer.

In conclusion, it is vital for the users to not download any such data or font pack that pops up randomly, in order to avoid the ransomware. Be it any browser, it is advised to immediately close all windows and not to visit the questionable site again.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Have a Machine Infected by Ransomware? Here’s What You Should Do Next post Facebook has Just Launched a Career Section because Why Not!

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware Removal Tools that Ensure You Keep Your System after an Attack

January 24, 2018Simeon Georgiev
Ransomware Removal Tools that Ensure You Keep Your System after an Attack

Experts Discover a Variant of Cryptomix Ransomware

February 20, 2018Simeon Georgiev

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.