August 24, 2018 By David Bisson 2 min read

Spammers are targeting financial institutions using Excel Web Query (IQY) files that conceal a new downloader malware.

On Aug. 10, researchers at Proofpoint observed four large spam email campaigns. One of the campaigns carried undisguised IQY attachments with names such as “sales” and “major bank” to prey upon financial organizations. Two of the other operations passed around IQY files hidden within ZIP archives or embedded in PDF documents, while the other campaign used Microsoft Word documents containing malicious macros.

All of these attachments led to the same payload: Marap, a downloader malware that uses a custom application programming interface (API) hashing algorithm, timing checks and media access control (MAC) address comparisons to avoid analysis by security professionals. Marap has the ability to download other modules and payloads, including a fingerprinting plugin that steals and exfiltrates key system information.

Attackers Shift Focus to IQY Files

Marap isn’t the first malware to rely on IQY attachments for distribution. Trend Micro recently discovered a campaign in which Necurs, a botnet that has a history with malicious spam, used IQY file attachments to begin a PowerShell process and thereby download the backdoor FlawedAMMYY. Soon after making that observation, researchers at the Japanese security firm detected the Cutwail botnet leveraging IQY files to target Japanese users with BEBLOH or URSNIF malware.

Security researchers at Barkly noted that malware actors are increasingly turning to IQY files. These attachments appeal to digital attackers because they are capable of bypassing most filters and antivirus software, since Microsoft Excel can legitimately use this type of file format to download web data directly into a spreadsheet.

How Can Financial Companies Defend Against Malicious IQY Files?

Given the growing preference for IQY files among digital attackers, security professionals should update their firewalls and email filtering tools to block these attachments outright. Information security professionals should also use real-time threat intelligence sharing to stay informed of advanced threats like Marap.

Sources: Proofpoint, Trend Micro, Trend Micro(1), Barkly

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today