What is SquirrelWaffle malware? How to avoid?

A malware threat called SquirrelWaffle has emerged. Distributed primarily through spam email campaigns, this malware infiltrates corporate networks by injecting malicious programs into compromised systems.

Let's learn how this malware spreads and its attack vectors. At the end of the article, TipsMake will also give 5 tips to help you stay protected from malware attacks.

How is SquirelWaffle spread?

Called dropper malware, the developers of SquirrelWaffle have gone to great lengths to keep it hard to detect and analyze.

SquirrelWaffle is mainly spread through attachments of Microsoft Office documents in spam emails. At the time of writing (November 2021), two sources, a Microsoft Word document and a Microsoft Excel spreadsheet, have been found to be the source of this malware.

The infection vector begins when the victim opens a ZIP file containing a malicious Office document. The VBA macros in that file download the SquirrelWaffle DLL, which then distributes the vector to another threat known as Cobalt Strike.

It has also been observed that attackers can use the DocuSign signing platform as bait to trick recipients into enabling macros on their Microsoft Office toolkit.

How does SquirrelWaffle exploit Cobalt Strike?

What is SquirrelWaffle malware? How to avoid? Picture 1

Cobalt Strike is a legitimate penetration testing tool used by white hat hackers and security groups to test an organization's infrastructure for vulnerabilities and security issues.

Unfortunately, hackers got hold of Cobalt Strike and started exploiting this tool using it as a second stage payload for a variety of malware.

And the SquirrelWaffle malware exploits Cobalt Strike in a similar way. By providing the Cobalt Strike framework that contains post-infection malware, SquirrelWaffle renders exploits, such as persistent remote access to compromised devices.

5 tips to stay protected against malware attacks

What is SquirrelWaffle malware? How to avoid? Picture 2

Here are 5 tips that will help you stay protected against SquirrelWaffle and other potential malware attacks:

1. Be careful with attachments

The number one defense against any type of malware is caution with opening suspicious attachments.

Most well-prepared malware, such as phishing attacks, are very easy to fool victims and can take a lot of technical expertise to identify them. A phishing attack tricks people into opening a link or email that may come from a legitimate source. Once opened, the link can take victims to a fake website, prompt them to enter personal login information, or take them to a website that infects them with malware directly onto their device.

So take precautions when opening attachments and don't click on them - unless you're absolutely sure of their provenance.

2. Install anti-virus software

Investing in robust antivirus software and endpoint security is critical in mitigating malware attacks. Certain antivirus solutions can detect dangerous malware and prevent it from downloading.

These tools can also provide the ability to view compromised devices and even send alert notifications when a user stumbles upon a dangerous website. Most antivirus software these days also offer automatic updates to provide enhanced protection against newly created viruses.

3. Pay attention to IoC

Sometimes anti-virus software isn't equipped with malware detection, or the malware may be too new and difficult to detect, as is the case with SquirrelWaffle.

If you find yourself in this situation, it's best to keep an eye on the Indicators of Compromise (IoC).

IoC is your clue that your device has been infected with malware. For example, you may notice unusual behavior such as geographical differences on devices, an increase in database reads, or higher authentication rates on the network, etc.

4. Regular software updates

Software updates are released to address any security concerns, fix software bugs, remove security holes from old and outdated systems, improve hardware functionality, and provide support for newer device models.

So, in addition to installing anti-virus software, you should also update it regularly. This will prevent hackers from accessing your computer and infecting the system with malware.

5. Beware of Free Apps and Unknown Sources

Always buy and download apps from trusted sources as it reduces the risk of malware infection. Reputable brands take extra measures to ensure they don't distribute malware-infected apps.

Also, the paid versions of apps are generally more secure than the free ones.

Note: Confirm the authenticity of the source by checking the full name, list of published apps, and contact details in the app description in Google Play or the Apple App Store.

3.5 ★ | 2 Vote

May be interested

  • Can a VPN Fight Malware?Can a VPN Fight Malware?
    sure, a vpn can help you maintain your privacy and security online. but can it protect you from malicious programs? can a vpn keep you safe from malware and viruses like antivirus vendors do?
  • How to avoid being fooled by fake Android system notifications?How to avoid being fooled by fake Android system notifications?
    when using a mobile device, you often see system messages randomly popping up, but be cautious because there are lots of malware generated spam phones to display such a message, this is a new types of attacks appear recently.
  • Why is Infostealer malware the biggest new malware concern?Why is Infostealer malware the biggest new malware concern?
    often distributed in a malware-as-a-service model, infostealer malware is often used to steal data, remaining hidden for as long as possible.
  • What is Malware? What kind of attack is Malware?What is Malware? What kind of attack is Malware?
    guide you how to recognize malware, how to prevent malware and as well as what to do when you encounter a malware infected website.
  • The 4 most common ways to spread malware todayThe 4 most common ways to spread malware today
    if there's one thing that poses a threat to all users of technology, it's malware. this malware can be extremely dangerous, harmful, and comes in many different forms.
  • Learn about polymorphic malware and super polymorphismLearn about polymorphic malware and super polymorphism
    as mentioned in previous articles, malware (malware) has become a big problem. unrighteous people are taking advantage of ransomware, keyloggers, bank trojans and cryptojacker to redeem themselves from the victims.
  • What is Goldoson Malware? How can you protect yourself?What is Goldoson Malware? How can you protect yourself?
    an example of malware is goldoson. the malware has infected more than 60 legitimate google play apps, which have been downloaded more than 100 million times in total.
  • Some simple tricks to deal with MalwareSome simple tricks to deal with Malware
    malware seems to become more and more intelligent and causes more incalculable consequences than before. installing malware detection tools (malwarebytes, hijackthis, combofix ...) on the computer is not a redundant task. but in some cases, for many reasons (blocked by malware itself) these tools are
  • What is Malware Joker? How to fight Malware Joker?What is Malware Joker? How to fight Malware Joker?
    joker malware is another threat to your privacy and sensitive information. recently, it attacked android mobile devices globally, resulting in the need to remove some applications from the google play store.
  • 5 types of malware on Android5 types of malware on Android
    malware or malware can affect mobile devices as well as computers. a little bit of knowledge and proper precautions can protect you from threats like ransomware and sextortion scam.