The Register: Swiss cheesed off as postal service used to spread malware

Source URL: https://www.theregister.com/2024/11/16/swiss_malware_qr/
Source: The Register
Title: Swiss cheesed off as postal service used to spread malware

Feedly Summary: QR codes arrive via an age-old delivery system
Switzerland’s National Cyber Security Centre (NCSC) has issued an alert about malware being spread via the country’s postal service.…

AI Summary and Description: Yes

Summary: The National Cyber Security Centre of Switzerland has cautioned citizens about a novel malware distribution method using postal mail. The counterfeit letters mimic an official government communication and prompt recipients to download a malicious app resembling a legitimate weather service application. This incident highlights new phishing tactics that utilize QR codes and physical mail, emphasizing the importance of vigilance against diverse cybersecurity threats.

Detailed Description: The alert from Switzerland’s National Cyber Security Centre (NCSC) points out a significant and troubling development in cybersecurity—malware is now being disseminated through traditional postal services rather than solely digital channels. Here are the key takeaways from this incident:

– **Malware Delivery Method**: This case marks the first instance noted by the NCSC of malware being spread using physical mail, particularly letters designed to look authentic by utilizing the Federal Office of Meteorology’s branding.
– **Fraudulent App**: The letter encourages people to scan a QR code leading to a fraudulent application called “AlertSwiss,” which appears as an official app but is actually designed to harvest sensitive information. This app is hosted on a third-party site rather than official platforms like Google Play Store.
– **Functionality of Malware**: The app is a variant of the Coper trojan, capable of:
– Keylogging (capturing keystrokes)
– Intercepting SMS messages and push notifications related to two-factor authentication
– Targeting banking applications and exfiltrating user credentials
– Displaying phishing interfaces to deceive users
– Following commands from external command-and-control servers for further attacks
– **Psychological Manipulation**: The letters create urgency and pressure, potentially causing recipients to act without adequate caution, which is a classic tactic in social engineering so that victims are more likely to fall prey to the malware.
– **Spear Phishing Insight**: The operational cost of sending these letters (approximately $1.35 each) hints at a targeted strategy, indicating that the attackers might be focusing on high-value targets rather than mass dissemination, a shift in tactics that elevates the threat level.
– **Broader Context**: The NCSC’s observation aligns this incident within a broader trend where traditional methods such as QR codes and physical letters are combined with digital threats to increase the success rate of attacks.

Implications for security and compliance professionals include the necessity to adapt awareness and training programs to cover emerging threats that leverage both online and offline methodologies. It also underlines the importance of QR code security as part of a comprehensive cybersecurity strategy, alongside adherence to best practices in identifying and verifying official communications.