The recent ransomware attack on Colonial Pipeline inspired a threat actor to create a new phishing lure to trick victims into downloading malicious files.

The emails are targeted and tailored as urgent notifications to download and install a system update that would defend against the latest ransomware strains.

Well-crafted emails

Threat actors did not lose much time after the Colonial Pipeline incident and used it as a theme in a new phishing campaign deployed a couple of weeks later.

Researchers at cloud-based email security platform INKY analyzed the attack which attempted to compromise computer systems using the Cobalt Strike penetration testing tool.

The fake emails use the Colonial Pipeline attack as an example of the devastating consequences a ransomware incident can have on an organization.

They urge recipients to install a system update from an external link to enable the system to “detect and prevent the latest strains of ransomware.” A deadline for applying the update is also provided, to increase urgency.

Ransomware attack on Colonial Pipeline used in phishing

Cobalt Strike inside

The threat actor used domains that are easy to mistake for legitimate ones (ms-sysupdate[.]com and selectivepatch[.]com), registered towards the end of May through Namecheap.

INKY researchers note that the two domains were used for sending the malicious emails as well as for hosting the fake “ransomware update” executables.

Furthermore, in both cases the download pages were customized with the target company’s logo and imagery, to make them appear trustworthy.

fake ransomware update

INKY researchers say in a blog post today that the payload was Cobalt Strike, a threat emulation software developed for penetration testing purposes but often used by malicious actors, too, especially in the ransomware business.

To make matters worse, the source code for Cobalt Strike was leaked in late 2020, which made it accessible to a wider variety of adversaries. Fortunately, the payload used in this phishing campaign is detected by a large number of antivirus solutions.

Cobalt Strike detections on Virus Total

Attackers in the phishing business are keeping an eye on the news to come up with relevant lures that would increase the success of their campaigns.

Typically, users are more receptive to messages containing familiar information. In this case, the highly publicized attack on Colonial Pipelines brought attention to the ransomware threat and its wider effect when hitting sensitive organizations.

“In this environment, phishers tried to exploit people’s anxiety, offering them a software update that would “fix” the problem via a highly targeted email that used design language that could plausibly be the recipient’s company’s own. All the recipient had to do was click the big blue button, and the malware would be injected” - INKY

Related Articles:

US Post Office phishing sites get as much traffic as the real one

LA County Health Services: Patients' data exposed in phishing attack

UnitedHealth confirms it paid ransomware gang to stop data leak

Synlab Italia suspends operations following ransomware attack

Ransomware payments drop to record low of 28% in Q1 2024