Rietspoof malware strain spreads via Facebook Messenger and Skype

Rietspoof Malware graphic

Security researchers at Avast have discovered a malware strain they are calling Rietspoof that is spreading via Facebook Messenger and Skype.

The team has been tracking the malware since August 2018 and up until January 2019, the strain had been updated once a month and was largely ignored.

Last month, though, the team saw a noticeable uptick in the number of times it was updated, suggesting that the malware's operator could be planning a more widespread attack.

Avast says it seems to have been designed as a 'dropper' which means the malware will infect systems and once embedded, and then download other potentially more harmful malware strains from its central command and control (C&C) server.

The strain infects computers using various file formats. Firstly it was delivered through instant messaging clients such as Facebook Messenger and Skype. It then delivered a highly obfuscated Visual Basic Script with a hard-coded and encrypted second stage - a CAB file which expanded into an executable which then installed a downloader.

Rietspoof is itself installed in the third stage, the executable, and has limited capability akin to a bot. It can read and write files, start processes and also self-destruct in cases of emergency.

The C&C server had also implemented a geofence based on the infected system's IP address. Researchers didn't receive any 'interesting' commands when testing it from their own lab but when they moved their approach to a US IP, the next stage was initialised and stronger malware was called to be installed.

Avast's researchers said that they have a wealth of data on Rietspoof but know little of the operator's motives or targets. They also explained that the files infected with the malware are largely going undetected by most antivirus software.

Reitspoof is the second 'dropper' to have been found picking up in activity in recent months, the other being Vidar, a malware helping cyber criminals distribute ransomware and password stealers.

Connor Jones
Contributor

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.