
Hackers Abuse DOCX, RTF, JS, and Python in Stealthy Boeing RFQ Malware Campaign
A disturbing trend has emerged in the cybersecurity landscape: sophisticated multi-stage malware campaigns leveraging seemingly innocuous document formats. Recently, a stealthy operation targeting industrial suppliers and procurement teams has come to light, cleverly disguised as a Boeing Request for Quotation (RFQ). This campaign, identified as NKFZ5966PURCHASE, highlights the evolving tactics of threat actors who are increasingly abusing common file types like DOCX, RTF, JS, and Python to deliver their payloads. Understanding the intricacies of this attack is crucial for anyone involved in supply chain security or corporate procurement.
The Deceptive Lure: Boeing RFQ Impersonation
The campaign initiates with a highly deceptive email, crafted to appear as a legitimate procurement request. Posing as a Boeing RFQ from a person named “Joyce Malave,” these emails leverage social engineering to exploit trust and urgency. The primary objective is to entice recipients to open an attached malicious Microsoft Word document. This initial interaction is the linchpin of the entire attack chain, demonstrating the continued effectiveness of well-crafted phishing attempts against even savvy targets.
Six Stages of Stealth: Unpacking the Malware Campaign
This particular campaign is notable for its intricate, six-stage infection process, designed to evade detection and establish持久性. It’s not a smash-and-grab; it’s a meticulously planned infiltration. The use of multiple file types and scripting languages across these stages showcases a sophisticated attacker’s toolkit. The progression from seemingly harmless document formats to executable payloads is a masterclass in obfuscation.
- Stage 1: Initial Compromise (Malicious DOCX/RTF): The attack begins with a malicious Word document, either DOCX or RTF. While the specific exploit isn’t detailed, such documents often contain embedded macros or leverage vulnerabilities like those associated with OLE objects to trigger the next stage.
- Stage 2: Payload Delivery (JavaScript): Once the document is opened, it silently executes a concealed JavaScript file. This JS file acts as a downloader, fetching additional malicious components from a remote server.
- Stage 3: Obfuscation and Persistence (Python Script): The JavaScript then retrieves and executes an obfuscated Python script. Python’s versatility makes it an attractive tool for attackers, allowing them to perform various tasks, including system reconnaissance and further payload delivery, often evading traditional antivirus solutions.
- Stage 4-6: Subsequent Stages (Further Details Not Provided in Source): While the source doesn’t detail stages 4-6, it’s highly probable these involve establishing persistence mechanisms, escalating privileges, deploying final malware payloads (such as ransomware, infostealers, or backdoors), and exfiltrating data. The multi-stage nature suggests a deliberate effort to compartmentalize and diversify the attack.
Why Common File Formats are a Hacker’s Haven
The choice to abuse DOCX, RTF, JS, and Python is not accidental. These file types are ubiquitous in corporate environments, making them ideal camouflage for malicious activity. Users are accustomed to opening these files daily, lowering their guard. Furthermore:
- DOCX and RTF: These document formats can embed macros or objects that execute code, bypassing basic security checks.
- JavaScript (JS): A powerful scripting language, often whitelisted for web content, JS can be used for downloading, executing, and manipulating system resources.
- Python: With its cross-platform compatibility and extensive libraries, Python scripts can be highly effective for various malicious tasks, from system enumeration to C2 communication, often going undetected by signature-based antivirus.
Remediation Actions and Proactive Defense
Protecting against multi-stage campaigns like NKFZ5966PURCHASE requires a layered cybersecurity approach. Organizations, particularly those in industrial sectors and procurement, must be hyper-vigilant.
- Enhanced Email Security: Implement advanced email filtering solutions that can detect and block malicious attachments, spear-phishing attempts, and impersonation. Educate users to scrutinize sender details, even if they appear legitimate.
- Macro Security Policies: Configure Microsoft Office applications to disable macros by default or to prompt users before enabling them. Educate employees on the dangers of enabling macros from untrusted sources.
- Endpoint Detection and Response (EDR): Deploy robust EDR solutions that offer behavioral analysis to detect suspicious activities, even from legitimate-looking scripts like Python or JavaScript.
- Network Segmentation: Segment networks to limit the lateral movement of malware if an endpoint is compromised.
- Regular Software Updates and Patching: Ensure all operating systems, applications, and security software are routinely updated to patch known vulnerabilities. While specific CVEs for this campaign were not provided, adhering to patching best practices is foundational.
- Security Awareness Training: Conduct ongoing, relevant security awareness training that includes recognizing phishing emails, identifying suspicious attachments, and understanding the risks associated with opening unsolicited files.
- Principle of Least Privilege: Enforce the principle of least privilege for all users and systems, limiting the potential impact of a successful compromise.
Conclusion
The NKFZ5966PURCHASE campaign serves as a stark reminder that threat actors are continually evolving their tactics, leveraging social engineering and common file types to bypass traditional defenses. The sophisticated, multi-stage nature of this attack, masquerading as a Boeing RFQ, underscores the critical need for robust, multi-layered security strategies. By focusing on enhanced email security, strict document handling policies, advanced endpoint protection, and continuous employee training, organizations can significantly bolster their defenses against such stealthy and destructive campaigns.


