Malware

Retefe Banking Trojan resurfaces in the threat landscape with innovations

Security experts at Proofpoint warn of the resurfacing of the Retefe banking Trojan that implements new techniques to avoid detection.

The Retefe banking Trojan resurfaces in that threat landscape and implements new techniques to avoid detection.

The new variant resurfaced in April, it uses the stunnel encrypted tunneling mechanism and abuses a legitimate shareware app.

One of the major changes in the new variant is the abandon of Tor for its communications and the abuse of a legitimate shareware application.

Unlike other banking Trojan that leverages on injection mechanisms, Retefe routes online banking traffic intended for targeted banks through a proxy. Retefe campaigns observed in the past were focused on customers in Austria, Sweden, Switzerland, and the UK.

The attack chain starts with spam messages using zipped JavaScript and weaponized Microsoft Word documents. Below key findings of the analysis published by Proofpoint:

  • Using stunnel instead of TOR to secure its proxy redirection and command and control communications
  • The use of Smoke Loader rather than sLoad as an intermediate loader
  • The abuse of a shareware application known as “Convert PDF to Word Plus 1.0”; this is a Python script that has been packaged as an executable using PyInstaller and packed into an archive using the UPX packing engine.

Retefe remained quite dormant for more than a year (except for a few attacks in 2018), the last major campaign was observed in 2017, when threat actors added the NSA exploit EternalBlue exploit code to the malware to improve its spreading capabilities.

Since April the banking Trojan was involved in attacks on Swiss and German users with both a Windows and macOS version.

Threat actors included in the new variant an application called Stunnel, into the proceedings. Stunnel is a proxy designed to add TLS encryption functionality to existing clients and servers without any changes in the programs’ code.

“Retefe extracts stunnel via a compressed archive in place of the usual TOR Socat proxy. In addition to the use of the decoy abused shareware, this is the most significant observed change to Retefe’s behavior, along with the use of Smoke Loader.” reads the analysis published by Proofpoint. “We suspect that the use of a dedicated tunnel rather than Tor makes for a more secure connection because it eliminates the possibility of snooping on the hops between Tor nodes.”

Secure Tunneling (stunnel) replaces Tor because the latter is considered a noiser protocol that would be easier to detect in an enterprise environment than stunnel.

The latest variant of the Retefe banking Trojan also included the abuse of a legitimate shareware application known as “Convert PDF to Word Plus 1.0”. The application is a Python script that has been packaged as an executable using PyInstaller and packed into an archive using the UPX packing engine.

The malicious script uses a certificate issued by DigiCert.

In the spam campaigns observed by the experts, attackers trick users into installing the application in order to correctly view the attached document. When the victim launches the application, the Python script writes two files to the victim machine. One is a legitimate installer for the Convert PDF to Word Plus application and is executed as a decoy, while the other is a loader for the banking Trojan. The loader extracts the files using the 7-Zip file-compression utility and stunnel from its resources, then decrypts and executes the main Retefe JavaScript code.

In one campaign uncovered by Proofpoint in April, experts observed attackers sending spam emails to Swiss users and used an Object Linking and Embedding (OLE) package to deliver Smoke Loader.

Campaigns targeting macOS users leverage digitally signed versions of fake Adobe Installers used to deliver their malware,

“By using signed binaries, actors attempt to bypass the macOS internal Gatekeeper security application, which checks if applications are signed by a valid developer certificate before running,” continues Proofpoint.

“Developers appear to have updated key features of the Trojan and are employing new distribution mechanisms…after a fairly lengthy absence from the landscape. As with many types of malware, developers continue to innovate, identifying new, more effective ways to infect victims and steal personal information to better monetize their attacks.”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – Retefe banking Trojan, cybercrime)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

19 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

20 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.