Viry a Červi

Zoll Medical says intruders had 1M+ patient, staff records at their fingertips

The Register - Anti-Virus - 13 Březen, 2023 - 23:30
Names, addresses, SSNs all up for grabs

Medical device and software maker Zoll Medical says the personal and health information of more than a million people, including patients and employees, may have been stolen by crooks in January.…

Kategorie: Viry a Červi

Linux gets double-quick double-update to fix kernel Oops!

Sophos Naked Security - 13 Březen, 2023 - 21:59
Linux doesn't BSoD. It has oopses and panics instead. (We show you how to make a kernel module to explore further.)

CISA joins forces with Women in CyberSecurity to break up the boy's club

The Register - Anti-Virus - 13 Březen, 2023 - 14:32
Also, the FBI just admitted to bypassing warrants by buying cellphone location data, and this week's actionable items

in brief  Cybersecurity and Infrastructure Security Agency's director Jen Easterly has been outspoken in her drive to bring more women into the security industry, and this year for International Women's Day her agency formalized that pledge by announcing a partnership with nonprofit Women in CyberSecurity (WiCyS).…

Kategorie: Viry a Červi

The UK's bad encryption law can't withstand global contempt

The Register - Anti-Virus - 13 Březen, 2023 - 12:32
Any sufficiently stupid technology is indistinguishable from magical thinking

Opinion  Around the world, a vital technology is failing. Just as massive solar flares fry satellites and climate-change superstorms overwhelm flood defences, so a new surge of ridiculous IT-related events is burning out irony meters across the globe.…

Kategorie: Viry a Červi

Cutting complexity

The Register - Anti-Virus - 13 Březen, 2023 - 10:52
Ensuring cybersecurity defences do more with less

Webinar  It's like living in a fever dream out there in the world of cybersecurity. More and more sophisticated attacks, a tsunami of solutions offering a gilt-edged escape from the need to constantly reconfigure your defences, and relentless pressure to always stay one step ahead of the hackers.…

Kategorie: Viry a Červi

India floats idea of dedicated tribunal to handle online offences

The Register - Anti-Virus - 13 Březen, 2023 - 09:58
Consultation for the long-awaited Digital India Act is finally under way although the draft law's still not been revealed

India's government has started to consult some proposed details of its long-awaited Digital India Act, including a declaration that the bill needed a dedicated adjudicatory tool for offenses committed online.…

Kategorie: Viry a Červi

Google euthanizes Chrome Cleanup Tool because it no longer has a purpose

The Register - Anti-Virus - 11 Březen, 2023 - 02:28
Times have changed and unwanted software on Windows is a rarity (unless you count Windows itself)

Google is bidding adieu to an application that enabled Chrome users on Windows systems to get rid of unwanted software.…

Kategorie: Viry a Červi

What happens if you 'cover up' a ransomware infection? For Blackbaud, a $3m charge

The Register - Anti-Virus - 11 Březen, 2023 - 00:05
File under cost of doing business

Blackbaud has agreed to pay $3 million to settle charges that it made misleading disclosures about a 2020 ransomware infection in which crooks stole more than a million files on around 13,000 of the cloud software slinger's customers.…

Kategorie: Viry a Červi

SHEIN shopping app goes rogue, grabs price and URL data from your clipboard

Sophos Naked Security - 10 Březen, 2023 - 21:58
It's not exactly data theft, but it's worryingly close to "unintentional treachery" - apparently because it's great for marketing purposes

Electronics market shows US-China decoupling will hike inflation and slow growth

The Register - Anti-Virus - 10 Březen, 2023 - 20:00
Singapore's central bank has a gloomy vision of the future

According to the Monetary Authority of Singapore (MAS), trade barriers between US and China have resulted in geoeconomic fragmentation and will likely result in slower global growth and higher inflation.…

Kategorie: Viry a Červi

Acronis downplays intrusion after 12GB trove leaks online

The Register - Anti-Virus - 10 Březen, 2023 - 05:45
Cyber-thief said goal was to 'humiliate' data-protection biz

The CISO of Acronis has downplayed what appeared to be an intrusion into its systems, insisting only one customer was affected, using stolen credentials, and that all other data remains safe.…

Kategorie: Viry a Červi

Catholic clergy surveillance org 'outs gay priests'

The Register - Anti-Virus - 10 Březen, 2023 - 04:30
Religious non-profit allegedly hoovered up location data from dating apps to ID clerics

A Catholic clergy conformance organization has reportedly been buying up tracking data from mobile apps to identify gay priests, and providing that information to bishops around America.…

Kategorie: Viry a Červi

FBI and international cops catch a NetWire RAT

The Register - Anti-Virus - 10 Březen, 2023 - 03:33
Malware-seekers were diverted to the Feds, severing a Croatian connection

International law enforcement agencies have claimed another victory over cyber criminals, after seizing the website, and taking down the infrastructure operated by crims linked to the NetWire remote access trojan (RAT).…

Kategorie: Viry a Červi

AT&T blames marketing bods for exposing 9M accounts

The Register - Anti-Virus - 10 Březen, 2023 - 00:30
Says it was old and boring data, so that's OK, then ...

AT&T has confirmed that miscreants had access to nine million of its wireless customers' account details after a vendor's network was broken into in January.…

Kategorie: Viry a Červi

US House reps, staff health data swiped in cyber-heist

The Register - Anti-Virus - 9 Březen, 2023 - 23:27
Data for sale via dark web, Senate in line of fire, too

Health data and other personal information of members of Congress and staff were stolen during a breach of servers run by DC Health Care Link and are now up for sale on the dark web.…

Kategorie: Viry a Červi

S3 Ep125: When security hardware has security holes [Audio + Text]

Sophos Naked Security - 9 Březen, 2023 - 22:58
Lastest episode - listen now! (Full transcript inside.)

Refreshed from its holiday, Emotet has gone phishing

The Register - Anti-Virus - 9 Březen, 2023 - 20:27
Notorious botnet starts spamming again after a three-month pause

Emotet is back. After another months-long lull since a spate of attacks in November 2022, the notorious malware operation that has already survived a law enforcement takedown and various periods of inactivity began sending out malicious emails on Tuesday morning.…

Kategorie: Viry a Červi

Malvertising through search engines

Kaspersky Securelist - 9 Březen, 2023 - 12:00

In recent months, we observed an increase in the number of malicious campaigns that use Google Advertising as a means of distributing and delivering malware. At least two different stealers, Rhadamanthys and RedLine, were abusing the search engine promotion plan in order to deliver malicious payloads to victims’ machines. They seem to use the same technique of mimicking a website associated with well-known software like Notepad++ and Blender 3D.

The treat actors create copies of legit software websites while employing typosquatting (exploiting incorrectly spelled popular brands and company names as URLs) or combosquatting (using popular brands and company names combined with arbitrary words as URLs) to make the sites look like the real thing to the end user—the domain names allude to the original software or vendor. The design and the content of the fake web pages look the same as those of the original ones. Threat actors then pay to promote the website in the search engine in order to push it to the top search results. The technique is called “malvertising”.

Our observations

In the following snapshots, we can see Google ads promoting fake pages for AMD drivers and the Blender 3D software. If we take a closer look at the URLs, we will see that the domain names incorporate the software name but are in fact unrelated to the real AMD or Blender 3D vendors. In most cases, the top-level domains are different from those of the official sites as well. The use of less common TLDs enables the threat actors to register second-level domains that are similar to the real ones. These domains lure victims to click on the link and access the fake website more often than random domains registered in a more common domain zone, such as COM, because they may look more like a legitimate website.

Fake AMD and Blender 3D websites in search results

We visited some of the promoted sites and obtained the malicious payloads they were distributing. In this article, we will focus mainly on the “Blender 3D” fake websites.

Fake Blender 3D web pages

The size of the downloaded file (ZIP archive) is 269 MB, which is close to the original Blender installer size. The size of 257 MB stated on the fake web page matches that of the original Blender 3D installer, but it does not match the size of the fake download.

When the user clicks the “Download” button, the archive blender-3.4.1-windows-x64.zip (E0BDF36E4A7CF1B332DC42FD8914BA8B) is downloaded.

The size of the file (BBA8AA93FCDDA5AC7663E90C0EEFA2E7) extracted from the archive is 657 MB. When launched, it drops two files into the temp directory:

  • The original Blender 3D MSI installer (marked green on the screenshot below), whose size is also 657 MB;
  • A PE file that acts as a next-stage loader for a malicious PE file (marked red), which also has the same size as the original installer: 657 MB.

Dropped files: the original Blender 3D MSI installer and the malicious loader

The size of the dropped malicious loader is this big because it is inflated with junk bytes when the PE file is created. The deflated malicious loader size is about 330 KB, and the rest is junk.

Junk bytes inflating the loader

After the initial installer (extracted from the archive) drops these two files, it runs the malicious PE file using the CMD method (cmd.exe /c [Filename] command) to hide it from the user. Additionally, the initial installer also runs the original Blender 3D MSI to make the victim believe that the desired software is running.

Thus, the threat actors disguise their malicious payload through the installation of another software product by creating a “pre-installer” for the legitimate software, which will put both the malware and the desired genuine software on the victim’s machine.

Blender 3D installer launched by the “pre-installer”

The screenshot above shows the actual software installer running, but if we take a closer look at the processes, we will notice a short-lived sub-process (cmd.exe /c -> “SetupFileProgram”) run by the “pre-installer”. This short-lived process is the loader for the malware.

The loader

The loader is a .NET file protected by an unregistered version of .NET Reactor. It seems to use an anti-debugging technique in order to prevent a debugger from executing and dynamically analyzing the binary. In a nutshell, the loader runs a new powershell.exe process and manipulates it to execute numerous PowerShell commands, which instruct it to access a third-party URL in order to get the payload. The payload is a base64-encoded, AES-encrypted fileless binary. Further commands are related to decoding and decrypting that binary, then running it in memory, within a newly created aspnet_compiler.exe process, a legitimate Windows .NET framework compilation tool.

In this case, we observed two detection evasion tricks during the runtime:

  • The fileless technique, which involves getting a payload from an online source and loading it directly into the memory of a process;
  • LOLBAS (living-off-the-land binaries and scripts), which, in this case, is the use of a .NET compilation tool to run the malicious binary.

Below, we provide a more detailed analysis of the loader execution chain. After passing the loader anti-debugger, we can see that it starts a PowerShell process, so we will put a breakpoint at the CreateProcessW WinAPI call to observe the behavior.

Call of CreateProcessW to spawn a PowerShell process

Since we did not see any command passed to the PowerShell process when initializing it via the CreateProcessW call, we can conclude that it will be passed at some point later, so we can observe the passing of the PowerShell command(s) by putting a breakpoint at WinAPI WriteFile in order to see the command lines for the powershell.exe process.

So, after letting it run and reach the breakpoint, we will check the result in the return of the function call, and we can see in the stack that the first command pushed to the powershell.exe process was #Start-Sleep -seconds 30;.

Observing the pushed command(s)

We can try checking the memory section where the command is stored and searching for other commands that are being kept in the memory for later use by the loader.

Memory address of the pushed PowerShell commands

After taking all the data from this memory section, we will see all the commands passed to the powershell.exe process via the WriteFile WinAPI call.

PowerShell commands

If we read the commands, we will see exactly what the powershell.exe process is about to do. The commands instruct it to perform the following actions:

  1. Download string data, which is part of the following URL, namely the name of the file: http[:]//45.93.201[.]114/docs/[RandomChars].txt. The downloaded data is a Base64-encoded string that is decoded into encrypted data.
  2. Prepare the decryption method, AES-CBC, as can be seen in the screenshot above. We can also easily see and decode the Base64-encoded key and IV (initialization vector) used for decryption in the PowerShell command.
  3. Decrypt the data into a Gzip-compressed binary.
  4. Decompress the binary.
  5. Invoke the binary to run it.

Decrypted binary

The extracted binary (RedLine stealer)

The binary that we obtained is the dropper of known malware, the RedLine stealer. The version of the stealer at hand uses an interesting technique to hide its malicious payload: it is encoded in the least significant bit of images stored in the resource section of the dropper, as well as the key and the IV bytes for its AES decryption.

Embedded images with a malicious payload

Payload decryption routine

After decrypting the payload, the dropper starts a legitimate process named “aspnet_compiler.exe”, which is part of the Microsoft .NET framework, and injects the payload into it.

Injecting a payload routine

Infrastructure

To deploy decoy pages, the malefactors register deceptive domain names, such as blender3d-software[.]net or blender3d-software[.]org. We have found more than fifty similar domains hosted at the same IP address: 91.229.23[.]200. These domain names mimic other software distribution sites as well, for example, afterburner-software[.]org, tradingviews-software[.]org, and unity-download[.]com.

The malicious payload could be stored on the same site (for example, hxxps[://]blahder3dsoft[.]store/Blender[.]rar) as the landing page or on a public service that can be used as the file hosting service (MediaFire or GitHub).

Conclusion

We are seeing an increase in the spread of malware families through Google Ads campaigns, specifically through search ads. Threat actors use fake websites to mimic legitimate software vendor websites to lure victims, and pay for ads to promote these. They use typosquatting and combosquatting for their malicious website domains, which have become common techniques in recent months. In some cases, such as the one described in this article, the threat actors also make sure to install the desired software alongside their malicious payload.

In recent campaigns, we observed mainly stealer-type malware, such as RedLine or the notorious Rhadamanthys, which is also known to use malvertising techniques to reach victims and steal data from their compromised machines.

This kind of distribution suggests that the threat actors are targeting victims, both individual and corporate, all around the world.

Indicators of Compromise IoC Description E0BDF36E4A7CF1B332DC42FD8914BA8B blender-3.4.1-windows-x64.zip BBA8AA93FCDDA5AC7663E90C0EEFA2E7 blender-3.4.1-windows-x64.exe 4b6249bea60eec2d9e6890162a7fca5f Blender.rar 8d709a5ce84504f83303afda88649b24 RedlLine stealer d0915b6057eb60c3878ce88d71efc351 RedlLine stealer hxxps[:]//download2392.mediafire.com/bb289kqoibyg/
1udjwornnpwxlua/blender-3.4.1-windows-x64.zip/
Link to malicious file hxxps[:]//github.com/sup6724/blender3d13/releases/
download/updates/blender-3.4.1-windows-x64.zip
Link to malicious file hxxps[://]blahder3dsoft[.]store/Blender[.]rar Link to malicious file http[:]//45.93.201[.]114/docs/[RandomChars].txt URL with malware data string 91.229.23[.]200 IP address common for some malicious landing pages blahder3dsoft[.]store Fake Blender websites blender3d-download[.]com blender3d-download[.]net blender3d-download[.]org blender3ds-download[.]com blender3ds-download[.]net blender3ds-download[.]org blender3d-software[.]com blender3d-software[.]net blender3d-software[.]org blender3ds-software[.]com blender3ds-software[.]net blender3ds-software[.]org blender-download[.]com blender-download[.]net blender-download[.]org blenders3d-download[.]com blenders3d-download[.]net blenders3d-download[.]org afterburnermsi-download[.]com Other suspicious software-themed domains related through the same IP address afterburner-software[.]net afterburner-software[.]org desktop-tradingview[.]net desktop-tradingview[.]org download-tradingview[.]net download-tradingview[.]org overclock-msi[.]com overclock-msi[.]net overclock-msi[.]org project-obs[.]com project-obs[.]net project-obs[.]org studio-obs[.]com studio-obs[.]net studio-obs[.]org tradingview-software[.]com tradingview-software[.]net tradingview-software[.]org tradingviews-software[.]com tradingviews-software[.]net tradingviews-software[.]org unity-download[.]com unity-download[.]net unity-download[.]org unityhub-download[.]com unityhub-download[.]net unityhub-download[.]org unity-software[.]net unity-software[.]org webull-download[.]com webull-download[.]net webull-download[.]org

Suspected Chinese cyber spies target unpatched SonicWall devices

The Register - Anti-Virus - 9 Březen, 2023 - 04:26
They've been lurking in networks since at least 2021

Suspected Chinese cyber criminals have zeroed in on unpatched SonicWall gateways and are infecting the devices with credential-stealing malware that persists through firmware upgrades, according to Mandiant.…

Kategorie: Viry a Červi

Dems, Repubs eye up ban on chat apps they don't like

The Register - Anti-Virus - 9 Březen, 2023 - 03:28
Clock is ticking for TikTok and other foreign natter-ware

On Tuesday a bipartisan group of a dozen US senators introduced a bill to authorize the Commerce Department to ban information and communications technology products and services deemed threats to national security.…

Kategorie: Viry a Červi
Syndikovat obsah