Topline Takeaways
- Date: March 18, 2024
- Targeted Industry: Financials and Industrials
- Relevant attacker information:
- Relevant client systems:
- Blackpoint SOC actions:
- Proactive isolation of infected device before malicious downloads
- Client outreach with additional remediation advice
- Why this matters: Blackpoint APG predicts that fake QuickBooks instances will continue to be used to deploy second-stage malware – backdoors, trojans, ransomware – over the next 12 months.
- Recommended remediations and mitigations:
What happened?
Last Monday, the Blackpoint SOC alerted to the detection of a fake QuickBooks program with an end client in the Financials vertical.
Further analysis identified that a known malicious signer of the application’s associated artifacts. The signer has been observed in fake QuickBooks incidents since at least April 2023. Additionally, the SOC observed a malicious scheduled task, which involved an attempt to maintain persistence on the host.
That same day, the SOC separately alerted to another incident of a fake QuickBooks-related file – this time, with an end client in the Industrials vertical.
The fake QuickBooks file maintained the same signer of the application’s associated artifacts as the incident above.
The same signer and similar incident in two different verticals indicates that this threat actor does not have a specific target. Instead, they likely target a large pool of victims in the hopes that at least a few are vulnerable to attack.
In both instances, the SOC isolated the impacted devices before additional devices were compromised or any data exfiltrated, and reached out to the clients for additional remediation advice.
What is QuickBooks?
QuickBooks is a legitimate accounting software by Intuit for small- and medium-sized businesses to manage finances.
However, malicious installers pretending to be the authentic QuickBooks has been used by multiple threat groups to deploy malware for at least the previous 24 months. In multiple instances, unsuspecting end users will search for QuickBooks online and find what they believe to be a legitimate installer – only for it to be a threat actor’s instance, rather than Intuit.
Threat actors use the fake installer to deploy malware and gain persistent access to steal sensitive data, in addition to other activities.
How often will fake Quickbooks installers be used by threat actors in 2024?
In May 2024, security researchers with eSentire reported an incident involving a fake Quickbooks incident that included the use of a fake popup message that included a phone number for victims to call. Upon calling the number, victims were instructed to “repair” corrupted files.
The threat actors then used Zoho Assist, a remote access software, to achieve a remote session on the victim system.
The APG predicts that threat actors will continue to deploy fake QuickBooks installers across multiple industry verticals over the next 12 months.
Recommended Fake Quickbooks Installer Mitigations and Remediations
Thankfully, the security actions which help prevent fake software and installer deployments are similar to other malware mitigations.
Specifically, the APG recommends the following to help detect malicious activity related to fake QuickBooks installers:
- Implement application allow/block listing to help restrict unauthorized program execution.
- Conduct regular environment and endpoint audits to identify weak points, apply necessary patching requirements, and close potential infection paths.
- Provided a dedicated software center, which allows employees to download approved software from a safe and monitored location.