{"id":1949,"date":"2021-04-08T11:35:17","date_gmt":"2021-04-08T15:35:17","guid":{"rendered":"https:\/\/cyburityllc.com\/?p=1949"},"modified":"2022-02-27T20:30:26","modified_gmt":"2022-02-28T01:30:26","slug":"what-is-bazarcall-malware","status":"publish","type":"post","link":"https:\/\/dialer.one\/index.php\/what-is-bazarcall-malware\/","title":{"rendered":"What is BazarCall malware?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is BazarCall malware?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Answer: Malware targeting VoIP servers. Read on.<\/h3>\n\n\n\n<p>For the past two months, security researchers have been waging an online battle against a new &#8216;BazarCall&#8217; malware that uses call centers to distribute some of the most damaging Windows malware.<\/p>\n\n\n\n<p>The new malware was discovered being distributed by call centers in late January and is&nbsp;named <a href=\"https:\/\/twitter.com\/ffforward\/status\/1356571665648537601\" target=\"_blank\" rel=\"noreferrer noopener\">BazarCall<\/a>, or BazarCall, as the threat actors initially used it to install the BazarLoader malware.<\/p>\n\n\n\n<p>While other malware is now being distributed, researchers continue to identify the distribution campaign as BazarCall.<\/p>\n\n\n\n<p>Like many malware campaigns, BazarCall&nbsp;starts with a phishing email&nbsp;but from there deviates to a novel distribution method &#8211; using phone call centers to distribute malicious Excel documents that install malware.<\/p>\n\n\n\n<p>Instead of bundling attachments with the email, BazarCall emails prompt users to call a phone number to cancel a subscription before they are automatically charged. These call centers would then direct users to a specially crafted website to download a &#8220;cancellation form&#8221; that installs the BazarCall malware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">BazarCall: From phishing emails to call centers<\/h2>\n\n\n\n<p>BazarCall attacks all start with a phishing email targeting corporate users that state&nbsp;the recipient&#8217;s free trial is about to run out. However, these emails do not provide any details regarding the alleged subscription.<\/p>\n\n\n\n<p>The&nbsp;emails then prompt the user to contact a listed phone number to cancel the subscription before they are charged $69.99 to $89.99 for a renewal, as shown in the example BazarCall phishing email below.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/malware\/b\/bazarcaller\/bazarcall-spam-example.jpg\" alt=\"Example BazarCall email\" title=\"\"><figcaption><strong>Example BazarCall email<\/strong><\/figcaption><\/figure>\n\n\n\n<p>While the bulk of the emails seen by BleepingComputer have been from a fictitious company named &#8220;Medical reminder service, Inc.&#8221;, the emails have also used other fake company names such as &#8216;iMed Service, Inc.&#8217;, &#8216;Blue Cart Service, Inc.&#8217;, and &#8216;iMers, Inc.&#8217;&nbsp;&nbsp;<\/p>\n\n\n\n<p>These emails all use similar subjects such as &#8220;Thank you for using your free trial&#8221; or &#8220;Your free trial period is almost over!&#8221; Security researcher&nbsp;<a href=\"http:\/\/twitter.com\/executemalware\/status\/1377043794374311946\" target=\"_blank\" rel=\"noreferrer noopener\">ExecuteMalware<\/a>&nbsp;has compiled a more extensive list of email subjects used by this attack.<\/p>\n\n\n\n<p>When a recipient calls the listed phone number, they will be placed on a short hold and then be greeted by a live person. When asked for more information or how to cancel the subscription, the call center agent asks the victim for a unique customer ID enclosed in the email.<\/p>\n\n\n\n<p><a href=\"https:\/\/twitter.com\/rpargman\" target=\"_blank\" rel=\"noreferrer noopener\">Randy Pargman<\/a>, Vice President of Threat Hunting &amp; Counterintelligence at Binary Defense, told BleepingComputer that this unique customer ID is a core component of the attack and is used by the call center to determine if the caller is a targeted victim.<\/p>\n\n\n\n<p>&#8220;They will be able to identify the company that got that email when you give them a valid customer number on the phone. But if you give them a wrong number they will just tell you that they canceled your order and it\u2019s all good without sending you to the website,&#8221; Pargman told BleepingComputer in a conversation about BazarCall.<\/p>\n\n\n\n<p>If a correct customer ID is given, the call center agent will direct the user to a fake website that pretends to be the associated medical services company. The phone agent will stay on the phone with the victim and guide them to a cancellation page where they are prompted to enter their customer ID, as shown below.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/malware\/b\/bazarcaller\/distribution-site.jpg\" alt=\"BazarCall distribution site\" title=\"\"><figcaption><strong>BazarCall distribution site<\/strong><br><em>Source: Brad Duncan<\/em><\/figcaption><\/figure>\n\n\n\n<p>When the user enters their customer ID number, the website will automatically prompt the browser to download an Excel document (xls or xlsb). The call center agent will then help the victim open the file and clicking on the &#8216;Enable Content&#8217; button to enable malicious macros.<\/p>\n\n\n\n<p>In some calls conducted by Pargman, the threat actors instructed him to disable antivirus to prevent the malicious documents from being detected.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/malware\/b\/bazarcaller\/malicious-excel-document.jpg\" alt=\"Malicious BazarCall Excel document\" title=\"\"><figcaption><strong>Malicious BazarCall Excel document<\/strong><\/figcaption><\/figure>\n\n\n\n<p>When the Excel macros are enabled, the BazarCall malware will be downloaded and executed on the victim&#8217;s computer.<\/p>\n\n\n\n<p>When the BazarCall campaign first started, it was used to distribute the BazarLoader malware but has also begun distributing TrickBot, IcedID, Gozi IFSB, and other malware.&nbsp;<\/p>\n\n\n\n<p>These Windows infections are particularly dangerous as they provide remote access to compromised corporate networks where the threat actors spread laterally through the network to steal data or deploy ransomware.<\/p>\n\n\n\n<p>Threat actors use BazarLoader and Trickbot to\u00a0<a href=\"https:\/\/dialer.one\/bazarloader-used-to-deploy-ryuk-ransomware-on-high-value-targets\/\" target=\"_blank\" rel=\"noreferrer noopener\">deploy the Ryuk or Conti ransomware<\/a>, while IcedID has been used in the past to\u00a0<a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2021\/02\/melting-unc2198-icedid-to-ransomware-operations.html\" target=\"_blank\" rel=\"noreferrer noopener\">deploy the now-defunct Maze and Egregor ransomware infections<\/a>.<\/p>\n\n\n\n<p>Security researcher&nbsp;<a href=\"https:\/\/twitter.com\/malware_traffic\" target=\"_blank\" rel=\"noreferrer noopener\">Brad Duncan<\/a>&nbsp;has shared a video illustrating a call into the threat actor&#8217;s call center and its distribution of malicious documents to unsuspecting victims.&nbsp;https:\/\/www.youtube.com\/embed\/uAkeXCYcl4Y<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">BazarCall: Deployed via a Distribution-as-a-Service<\/h2>\n\n\n\n<p>While BazarLoader and the TrickBot infections are believed to be created by the same &#8216;TrickBot&#8217; hacking group, the other distributed infections are not related to these threat actors.<\/p>\n\n\n\n<p>Due to this,&nbsp;Pargman has told BleepingComputer that he believes that another threat actor group is running the call centers and renting out distribution as a Distribution-as-a-Service.<\/p>\n\n\n\n<p>&#8220;My belief is that this is a distro as a service and&nbsp;that UNC1878 is probably a customer of theirs,&#8221; Pargman explained.<\/p>\n\n\n\n<p>This belief is echoed by Cryptolaemus security researcher&nbsp;<a href=\"https:\/\/twitter.com\/JRoosen\" target=\"_blank\" rel=\"noreferrer noopener\">Joseph Roosen<\/a>&nbsp;who told BleepingComputer that the distribution service is run like a regular&nbsp;company, keeping strict Monday through Friday business hours.<\/p>\n\n\n\n<p>BleepingComputer&#8217;s efforts to contact the call center over the past four days have been unsuccessful due to the constantly changing infrastructure used by the threat actors.<\/p>\n\n\n\n<p>Due to the efforts of researchers such as Pargman, Roosen, Duncan,&nbsp;<a href=\"https:\/\/twitter.com\/bushidotoken?lang=en\" target=\"_blank\" rel=\"noreferrer noopener\">William Thomas<\/a>&nbsp;of Cyjax,&nbsp;<a href=\"https:\/\/twitter.com\/ffforward\" target=\"_blank\" rel=\"noreferrer noopener\">TheAnalyst<\/a>, and&nbsp;<a href=\"https:\/\/twitter.com\/executemalware\" target=\"_blank\" rel=\"noreferrer noopener\">ExecuteMalware<\/a>, and many others, the distribution service has been forced to constantly change their phone numbers and hosting sites as the researchers take them down.&nbsp;<\/p>\n\n\n\n<p>Unfortunately, even with the cybersecurity community&#8217;s combined efforts, this distribution method has been very successful.<\/p>\n\n\n\n<p>Due to their distribution method, malware samples commonly have very low detection rates on VirusTotal as they are not publicly distributed and detected by antivirus vendors.<\/p>\n\n\n\n<p>Furthermore, from emails seen by BleepingComputer, people are falling for this scam as they believe they are legitimate subscriptions that need to be canceled.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>For this reason, we here at Cyburity would like to offer our services free of charge to anyone effected by this malware, BazarCall so we can track down their command centers and disable them as well as remediate any threat actors from your server. If you have been affected  or would like to have a free security audit to see if you have been, please <a href=\"https:\/\/dialer.one\/penetration-testing-services-overview\/\" target=\"_blank\" rel=\"noreferrer noopener\">schedule a FREE security audit<\/a>. By working together, we can break down these hacking groups to make it where they move on from this scam to something else&#8230;..because they will. <\/p>\n\n\n\n<p>-Nox<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is BazarCall malware? Answer: Malware targeting VoIP servers. Read on. For the past two months, security researchers have been waging an online battle against a new &#8216;BazarCall&#8217; malware that uses call centers to distribute some of the most damaging Windows malware. The new malware was discovered being distributed by call centers in late January [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1950,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[],"tags":[],"class_list":["post-1949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/dialer.one\/wp-content\/uploads\/2021\/04\/bazarcall-spam-example.jpg","jetpack-related-posts":[{"id":1958,"url":"https:\/\/dialer.one\/index.php\/bazarloader-used-to-deploy-ryuk-ransomware-on-high-value-targets\/","url_meta":{"origin":1949,"position":0},"title":"BazarLoader used to deploy Ryuk ransomware on high-value targets","author":"carpenox","date":"April 8, 2021","format":false,"excerpt":"BazarLoader used to deploy Ryuk ransomware on high-value targets The TrickBot gang operators are increasingly targeting high-value targets with the new stealthy BazarLoader trojan before deploying the Ryuk ransomware. For years, the TrickBot gang has been using their trojan to compromise enterprise networks by downloading different software modules used for\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"BazarLoader","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/04\/trojan-horse-chip.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/04\/trojan-horse-chip.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/04\/trojan-horse-chip.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/04\/trojan-horse-chip.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/04\/trojan-horse-chip.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/04\/trojan-horse-chip.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1714,"url":"https:\/\/dialer.one\/index.php\/cyburity-llc-brings-you-cyburdial-a-cloud-based-zero-trust-predictive-dialer\/","url_meta":{"origin":1949,"position":1},"title":"CyburDial -:- A Cloud Based &#8216;Zero Trust&#8217; Predictive Dialer","author":"carpenox","date":"March 22, 2021","format":false,"excerpt":"CyburDial -:- A Cloud Based 'Zero Trust' Predictive Dialer In this emerging world of ransomware, malware, and hacks such as SolarWinds becoming our everyday reality, how concerned are you with data security? How important is your privacy and sense of security? WCW I(World Cyber War) is right around the corner\u2026","rel":"","context":"In &quot;CyburDial&quot;","block_context":{"text":"CyburDial","link":"https:\/\/dialer.one\/index.php\/category\/cyburdial\/"},"img":{"alt_text":"CyburDial","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/03\/newwelcome.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/03\/newwelcome.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/03\/newwelcome.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/03\/newwelcome.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/03\/newwelcome.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":1977,"url":"https:\/\/dialer.one\/index.php\/how-to-secure-vicidial-correctly-part-1\/","url_meta":{"origin":1949,"position":2},"title":"How to &#8211; Secure Vicidial, correctly. Part 1","author":"carpenox","date":"April 10, 2021","format":false,"excerpt":"How to - Secure Vicidial, correctly. Part 1 This article will show you how to secure Vicidial server correctly. This is definitely one of the topics, that I am asked about the most, so with that being said, this will be a multipart series with different \"layers\" of security from\u2026","rel":"","context":"In &quot;Vicidial&quot;","block_context":{"text":"Vicidial","link":"https:\/\/dialer.one\/index.php\/category\/vicidial\/"},"img":{"alt_text":"secure vicidial","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/04\/image-13.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/04\/image-13.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/04\/image-13.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/04\/image-13.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2021\/04\/image-13.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":2378,"url":"https:\/\/dialer.one\/index.php\/table-of-contents\/","url_meta":{"origin":1949,"position":3},"title":"Table of Contents &#8211; Knowledge Base","author":"carpenox","date":"March 7, 2022","format":false,"excerpt":"Welcome to my blog, some of you may know me from the ViciDial forums, I am carpenox and I am here to share my knowledge with everyone, for free!","rel":"","context":"In &quot;Vicidial&quot;","block_context":{"text":"Vicidial","link":"https:\/\/dialer.one\/index.php\/category\/vicidial\/"},"img":{"alt_text":"CyburDial","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2022\/02\/image.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2022\/02\/image.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2022\/02\/image.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2022\/02\/image.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2022\/02\/image.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":4205,"url":"https:\/\/dialer.one\/index.php\/how-to-use-the-full-functionality-of-the-vicidial-installer-by-carpenox\/","url_meta":{"origin":1949,"position":4},"title":"How to &#8211; Use the full functionality of the ViciDial installer by carpenox","author":"carpenox","date":"November 3, 2024","format":false,"excerpt":"How to - Use the full functionality of the ViciDial installer by carpenox Vicidial\u00a0administrators,\u00a0take\u00a0note:\u00a0the\u00a0Carpenox\u00a0Auto\u00a0Installer\u00a0is\u00a0about\u00a0to\u00a0change\u00a0the\u00a0game.\u00a0This\u00a0tool\u00a0transforms\u00a0the\u00a0usually\u00a0complex\u00a0setup\u00a0of\u00a0Vicidial\u00a0into\u00a0a\u00a0smooth,\u00a0hassle-free\u00a0experience. Let me go over some post installation steps and key things to take note of and changes I suggest you make after the fact of using the installer. I will give you a few steps to\u2026","rel":"","context":"In &quot;CyburDial&quot;","block_context":{"text":"CyburDial","link":"https:\/\/dialer.one\/index.php\/category\/cyburdial\/"},"img":{"alt_text":"CyburDial Installer","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2024\/11\/image.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3928,"url":"https:\/\/dialer.one\/index.php\/hipaa-compliance-a-must-for-health-insurance-call-centers-with-cyburdial\/","url_meta":{"origin":1949,"position":5},"title":"HIPAA Compliance: A Must for Health Insurance Call Centers with CyburDial","author":"carpenox","date":"November 16, 2023","format":false,"excerpt":"HIPAA Compliance: A Must for Health Insurance Call Centers with CyburDial In the dynamic landscape of health insurance call centers, the adherence to HIPAA (Health Insurance Portability and Accountability Act) compliance is not just a regulatory requirement; it's a cornerstone of maintaining trust and security in handling sensitive patient information.\u2026","rel":"","context":"In &quot;CyburDial&quot;","block_context":{"text":"CyburDial","link":"https:\/\/dialer.one\/index.php\/category\/cyburdial\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2023\/11\/pending-1700734817-OIG-29.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2023\/11\/pending-1700734817-OIG-29.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2023\/11\/pending-1700734817-OIG-29.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/dialer.one\/wp-content\/uploads\/2023\/11\/pending-1700734817-OIG-29.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/posts\/1949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/comments?post=1949"}],"version-history":[{"count":0,"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/posts\/1949\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/media\/1950"}],"wp:attachment":[{"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/media?parent=1949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/categories?post=1949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dialer.one\/index.php\/wp-json\/wp\/v2\/tags?post=1949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}