In light of the extended tax deadline due to the coronavirus pandemic, tax fraud remains a viable avenue for the criminal group behind the IcedId banking malware.
By Joshua Platt, Jason Reaves, Vitali Kremez
- IcedID is actively harvesting tax-related information.
- IcedID also actively seeks to procure important documents.
- The gang utilizes custom PowerShell uploaders to exfiltrate specific tax data.
- IcedID continues to evolve and operate in obscurity, but the group is well-known for their banking operation. The operators use sophisticated custom scripting designed to locate and upload tax files.
The Neverquest operation suffered a major arrest in 2017 (Stanislav Lisov) and subsequently disappeared for a short time. Shortly thereafter, the operation picked up in the form of IcedID, which continues to operate relatively quietly although they remain an active and elite operation.
Stanislav Vitalievich Lisov (aka “Black”, “Blackf”) was responsible for the administration and fraud operations portion of the Neverquest operation. The botnet itself was routinely referred to by members of the operation as “Catch,” “Porsche,” and “Smile.”
The history behind the Neverquest project dates back to the infamous crimeware-as-a-service business model called “76service” operated by the Russian national Nikita Kuzmin.
Since the arrest of Nikita Kuzmin and years later, Neverquest operation also adopted a similar business crimeware-as-a-service model splitting the backend into projects and profiting from project-based affiliate operations.
Recent research has revealed the group has been targeting tax software and using custom kits to solicit important documentation from unsuspecting users. Recovered PowerShell scripts show they have been targeting tax returns and are actively harvesting the data. In the image below, specific tax software is targeted. It is worth noting the tax information appears to be for a prior year, which is usually necessary for filing current taxes. While the software is clearly defined, it is possible others have also been targeted in the past.
Next, the identified processes are killed and system drives are enumerated.
Finally, if the software is found the data is uploaded to the attackers’ servers using the PUT method to upload the file.
Along with stealing Tax documents, the IcedID gang uses social engineering to gain access to victims’ identity documents. In the images below, the IcedID actors masquerade as the Jumbio service Netverify and engineer users to upload their identification documents.
A secondary target for the IcedID gang is Ultimate software’s utilipro services.
IcedID continues to evolve and operate in obscurity. However, IcedID is well-known for their banking operation; the operators demonstrate a more sophisticated side in the custom scripting, which is designed to locate and upload tax files. Couple this with a renewed interest by actors in targeting the tax season, in part due to the Covid-19 pandemic which has caused tax day to be extended to July 15.