July 1, 2021 By David Bisson 2 min read

Living-off-the-land attacks aren’t new. They’re tactics in which attackers misuse tools native to an infected device. They do this in an effort to not install any foreign files or tools as a means. That way, most security tech won’t notice something odd going on. We’ve taken a look at one of these, misuse of AutoHotkey, and how to prevent it.

Several attackers involving living-off-the-land methods have made headlines in recent years. For example, a threat actor known as Gallmaker used the Microsoft Office Dynamic Data Exchange protocol back in 2018 to spy on its victims. A year later, attackers misused the Windows Management Instrumentation Command tool to distribute Astaroth.

What Is AutoHotkey?

What is new is attackers’ decision to misuse AutoHotkey. This is a Microsoft product, an open-source scripting language designed for machines running Microsoft Windows. AutoHotkey scripts can automate repetitive tasks in a Windows app by creating macros, shortcuts or hotkeys.

How Are Malware Actors Using AutoHotkey Scripts?

One of the first publicly reported attacks involving AutoHotkey was a credential stealer written in AutoHotkey found in March 2018. It disguised itself as Kaspersky Antivirus and spread via infected USB devices. The threat, dubbed Fauxpersky, dropped four files into the affected environment. Together, those files launched a keylogger. This sent the stolen user input to the attackers and then distributed the threat to other removable media.

Fast forward to December 2020, when Trend Micro discovered a malicious Excel file concealing an AutoHotkey script compiler executable, a malicious AutoHotkey script file and a VBA AutoOpen macro. The operation used the script file to profile victims and perform different tasks. Those included harvesting credentials from a victim’s browser and sending them to the attackers.

A few months later, Cofense came across two phishing emails targeting Spanish users. One of the emails instructed the recipient to download a file protected by a password. Meanwhile, the other prompted recipients with the lure of pending legal documents. These payloads used either the Microsoft Service Identity service or a malicious Finger command to create a second .zip file. This archive contained three items: a real AutoHotkey compiler executable, a malicious AutoHotkey script and the Mekotio banking Trojan as a .dll. Once loaded, Mekotio attempted to load fake webpages for targeted banks. It also watched for bitcoin addresses that were copied to the clipboard.

Which brings us to a recent attack: in mid-May 2021, a remote access Trojan delivery campaign began with an AutoHotkey-compiled script. This script loaded an executable that, when it ran, branched into one of four versions. These involved different VBScripts and malware payloads including VjW0rm, Houdini and HCrypt.

How to Defend Against These New Attacks

The campaigns above highlight the need for employers to defend themselves against attacks via AutoHotkey scripts. One of the ways they can do that is by restricting phishing emails and other attacks that could deliver malicious AutoHotkey compiler executables. They can do this by investing in a security awareness training program that uses phishing tests to make employees familiar with email-based attacks. You can balance these human controls with technical measures, as well. Think email banners that signal when a message has come from outside of the group.

Beyond awareness training, you can also take steps to defend against fileless attacks. This involves carefully reviewing the native apps and tools that your employees need for their normal work. With that knowledge, security personnel can then disable whichever are not needed.

More from News

Insights from CISA’s red team findings and the evolution of EDR

3 min read - A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity. Among the most pressing issues was a heavy reliance on endpoint detection and response (EDR) solutions, paired with a lack of network-level protections. These findings underscore a familiar challenge: Why do organizations place so much trust in EDR alone, and what must change to address its shortcomings? EDR’s double-edged sword A cornerstone of cyber resilience strategy, EDR solutions are prized for…

DHS: Guidance for AI in critical infrastructure

4 min read - At the end of 2024, we've reached a moment in artificial intelligence (AI) development where government involvement can help shape the trajectory of this extremely pervasive technology. In the most recent example, the Department of Homeland Security (DHS) has released what it calls a "first-of-its-kind" framework designed to ensure the safe and secure deployment of AI across critical infrastructure sectors. The framework could be the catalyst for what could become a comprehensive set of regulatory measures, as it brings into…

Apple Intelligence raises stakes in privacy and security

3 min read - Apple’s latest innovation, Apple Intelligence, is redefining what’s possible in consumer technology. Integrated into iOS 18.1, iPadOS 18.1 and macOS Sequoia 15.1, this milestone puts advanced artificial intelligence (AI) tools directly in the hands of millions. Beyond being a breakthrough for personal convenience, it represents an enormous economic opportunity. But the bold step into accessible AI comes with critical questions about security, privacy and the risks of real-time decision-making in users’ most private digital spaces. AI in every pocket Having…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today