May 7, 2019 By David Bisson 2 min read

The Retefe banking Trojan has resumed its activity with a new series of attack campaigns that leverage Smoke Loader as an intermediate loader.

Proofpoint observed that the malware returned to regular attacks against German and Swiss users in April 2019 after taking a hiatus in 2018. These campaigns helped reveal several new techniques now employed by the banking Trojan. One geographically targeted campaign against Switzerland, for instance, used an Object Linking and Embedding (OLE) package to deliver Smoke Loader. This threat, in turn, downloaded Retefe two hours after infection.

The banking malware incorporated other changes as well. One operation detected by Proofpoint abused a shareware application to run an executable and a Python script. This code, in turn, wrote two files: convert-pdf-to-word-plus.exe and convert-pdf-to-word-plus_driver.exe. The former was a legitimate installer for the Convert PDF to Word Plus application that’s executed as a decoy, while the latter acted as a Retefe loader.

In another campaign, the malware turned away from Tor toward a stunnel, most likely in a bid to cause less noise in an enterprise environment and thereby avoid detection.

Looking to the Past of Retefe

This resurgence of Retefe comes after a busy period several years ago. In June 2016, Avast observed the malware using fake certificates to target U.K. banking customers and steal their login credentials. More than a year later, Proofpoint discovered the banking Trojan leveraging EternalBlue, the same exploit used by WannaCry ransomware, to move laterally through a network following the initial infection of a victim.

How to Defend Against a Banking Trojan

Security professionals can defend against banking Trojans like Retefe by using ahead-of-threat detection to discover potentially malicious domains before threat actors take advantage of them in attacks. Security teams should also use tools such as VBA editor to inspect the macro code in Microsoft Office documents for signs of malicious functionality.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today