Microsoft alerts crypto users to a malicious Excel attack comparing OKX, Binance and Huobi fees


  • Microsoft recently investigated a malicious Excel attack where the exploiter targeted crypto investors in Telegram chat groups. 
  • The bad actor weaponized an excel file with the name ‘OKX Binance & Huobi VIP fee comparison.xls’ and shared it with target users. 
  • The threat actor was identified as DEV-0139 and the weaponized excel gave the hacker a back door to the user’s system. 

Microsoft investigated an exploit on crypto users by DEV-0139. The exploiter infiltrated Telegram chat groups to identify targets before sharing a malicious Excel file to gain backdoor access to their system. 

Also read: Goldman Sachs to increase crypto stake after FTX exchange collapse

Microsoft investigates Excel attack targeted at crypto traders

Microsoft, an American multinational tech company recently investigated an attack that targeted crypto users. The bad actor DEV-0139 shared a malicious Excel file titled OKX Binance & Huobi VIP fee comparison.xls with crypto traders in messaging app Telegram groups. The intent was to gain back door access to their system through the Excel file. 

The malicious user infiltrated chat groups on Telegram and masqueraded as a representative of a crypto investment firm. The attacker pretended to discuss trading fees with VIP clients of major exchanges Binance, OKX and Huobi. 

According to investigators at Microsoft, the attacker would gain the trust of targeted victims,  get them to share  in-depth information, and then share a malicious file to gain access to their systems. The weaponized Excel file claimed to compare VIP tier fees across exchanges like OKX, Binance and Huobi. The file was well crafted and contained legitimate information about the current fees used by some crypto exchanges

The metadata extracted showed that the file was created by a user called “Wolf”. 

The information shared in the weaponized Excel file

The information shared in the weaponized Excel file

Two of three files extracted from the malicious download opened a back door

Microsoft’s investigation revealed that two out of three files extracted from the original download, logagent.exe and wsock32.dll, were responsible for loading an encrypted backdoor. The following sections present Microsoft’s in-depth analysis of both files.

Once the file was loaded into the victim computer’s memory, it gave remote access to DEV-0139. At the time of analysis, Microsoft’s security intelligence team identified another variant of the attack and retrieved the payload. The identified malicious implants connected back to the same command-and-control C2 server that opens a backdoor in the user’s system. 

Microsoft recommends fighting malicious Excel attacks in this manner 

In the report published by the American software giant, the attack is classified as one targeted at crypto investment fund startups. Such companies are relatively new, but manage hundreds of millions of dollars and, therefore, are a magnet for cyber criminals. 

DEV-0139 had broad knowledge of the cryptocurrency industry as well as the challenges that targeted victims may face, increasing the sophistication of the attack and its chances of success. The threat actor used Telegram, an app used by many in the crypto ecosystem and identified the profile of interested parties, before gaining the target’s trust by discussing relevant topics. 

The exploiter then sent a weaponized document that delivered a backdoor through multiple mechanisms. Additionally, a second attack used a fake crypto dashboard application, to lure target users. 

Microsoft recommends:

  • Educating end users about protecting personal and business information in social media, filtering unsolicited communication (in this case, Telegram chat groups), identifying lures in spear-phishing email and watering holes, and reporting reconnaissance attempts and other suspicious activity.
  • Educating end users about preventing malware infections, such as ignoring or deleting unsolicited and unexpected emails or attachments sent via instant messaging applications or social networks. 
  • Encouraging end users to practice good credential hygiene and make sure the Microsoft Defender Firewall (which is enabled by default) is always on to prevent malware infection and stifle propagation.
  • Changing Excel macro security settings to control which macros run and under what circumstances when a workbook is opened. 
  • Stopping malicious XLM or VBA macros by ensuring runtime macro scanning by Antimalware Scan Interfaces (AMSI) is on. 
  • Turning-on attack surface reduction rules to prevent common attack techniques observed in this threat, by doing the following:
    • Blocking Office applications from creating executable content.
    • Blocking Office communication application from creating child processes.
    • Blocking Win32 API calls from Office macros.
  • Ensuring that Microsoft Defender Antivirus is up to date and that real-time behavior monitoring is enabled.

Information on these pages contains forward-looking statements that involve risks and uncertainties. Markets and instruments profiled on this page are for informational purposes only and should not in any way come across as a recommendation to buy or sell in these assets. You should do your own thorough research before making any investment decisions. FXStreet does not in any way guarantee that this information is free from mistakes, errors, or material misstatements. It also does not guarantee that this information is of a timely nature. Investing in Open Markets involves a great deal of risk, including the loss of all or a portion of your investment, as well as emotional distress. All risks, losses and costs associated with investing, including total loss of principal, are your responsibility. The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official policy or position of FXStreet nor its advertisers. The author will not be held responsible for information that is found at the end of links posted on this page.

If not otherwise explicitly mentioned in the body of the article, at the time of writing, the author has no position in any stock mentioned in this article and no business relationship with any company mentioned. The author has not received compensation for writing this article, other than from FXStreet.

FXStreet and the author do not provide personalized recommendations. The author makes no representations as to the accuracy, completeness, or suitability of this information. FXStreet and the author will not be liable for any errors, omissions or any losses, injuries or damages arising from this information and its display or use. Errors and omissions excepted.

The author and FXStreet are not registered investment advisors and nothing in this article is intended to be investment advice.

Join Telegram

Recommended content


Recommended Content

Editors’ Picks

Ripple wipes out weekly gains, experts comment on role of Ripple stablecoin

Ripple wipes out weekly gains, experts comment on role of Ripple stablecoin

Ripple declined to $0.52 on Thursday, erasing all gains registered earlier this week. Ripple SVP Eric van Miltenburg’s comments on the firm’s stablecoin, and how it is expected to benefit the XRP Ledger and native token XRP have raised concerns among crypto experts. 

More Ripple News

Hedera HBAR slips nearly 10% after air is cleared on mistaken link with giant BlackRock

Hedera HBAR slips nearly 10% after air is cleared on mistaken link with giant BlackRock

HBAR price is down nearly 10% on Thursday, partly erasing gains inspired by the misinterpreted link with BlackRock. Despite the recent correction, Hedera’s price is up 44% in the past seven days.

More Hedera News

The reason behind Bonk’s 105% rise and if you should buy now Premium

The reason behind Bonk’s 105% rise and if you should buy now

Bonk price has shot up 105% in the past five weeks. A retracement into $0.0000216 or the $0.0000152 to $0.0000186 imbalance would be a good buying opportunity. Patient investors can expect double-digit gains from BONK that could extend up to 70%.

More Cryptocurrencies News

Injective price weakness persists despite over 5.9 million INJ tokens burned

Injective price weakness persists despite over 5.9 million INJ tokens burned

Injective price is trading with a bearish bias, stuck in the lower section of the market range. The bearish outlook abounds despite the network's deflationary efforts to pump the price. Coupled with broader market gloom, INJ token’s doomed days may not be over yet.

More Injective News

Bitcoin: BTC post-halving rally could be partially priced in Premium

Bitcoin: BTC post-halving rally could be partially priced in

Bitcoin (BTC) price briefly slipped below the $60,000 level for the last three days, attracting buyers in this area as the fourth BTC halving is due in a few hours. Is the halving priced in for Bitcoin? Or will the pioneer crypto note more gains in the coming days? 

Read full analysis

BTC

ETH

XRP