#malware

fefebot@diasp.org

[l] Google hat eine tolle Idee: Wieso nicht noch eine Abofalle drauflegen? Von Jamba lernen heißt siegen lernen!

Add advanced security protections on top of the streamlined management benefits of Chrome Enterprise Core, all with the expertise and scale of Google.

Mit anderen Worten: Google sagt uns gerade ins Gesicht, dass der reguläre Chrome-Browser unsicher ist. Setzt den jemand von euch ein? Ich hoffe nicht! Wenn nicht mal der Hersteller den für sicher hält!?

Was kriegt man denn für das Geld? "Malware deep scanning"! Auf der anderen Seite ist Idioten von ihrem Geld zu trennen das älteste Geschäftsmodell der Welt.

#fefebot #malware #google

tresronours@parlote.facil.services

Beware of New Mighty Stealer That Takes Webcam Pictures & Capture Cookies

A new menace has emerged that targets personal information with alarming precision.

Dubbed the “Mighty Stealer,” this malicious software is designed to infiltrate devices and extract a wide range of sensitive data.

The Mighty Stealer is a sophisticated malware that boasts an easy-to-use graphical user interface (GUI), allowing cybercriminals to deploy it with minimal effort.

The software’s capabilities are extensive, including the theft of cookies, passwords, and wallet information.

It can also capture Discord tokens, Telegram profiles, and webcam pictures without the user’s consent.

The interface of the Mighty Stealer, as seen in the provided images, is sleek and user-friendly, disguising its nefarious purposes behind a facade of legitimacy.

The software’s logo, featuring a stylized bird, is a deceptive symbol of the power and control it grants to its unauthorized users.

Run Free ThreatScan on Your Mailbox

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Run Free Threat Scan

According to a recent tweet by TweetMon, a threat actor has announced the release of a new tool called Mighty Stealer.

🚨 Mighty Stealer Announced

A threat actor announces Mighty Stealer. Stealer captures cookies, passwords, wallets, discord tokens, telegram profiles, webcam pictures, games, user/pc information, desktop snaps, etc.

[

#MightyStealer

](https://twitter.com/hashtag/MightyStealer?src=hash&ref_src=twsrc%5Etfw)

[

#Malware

](https://twitter.com/hashtag/Malware?src=hash&ref_src=twsrc%5Etfw)

[

#Darkweb

](https://twitter.com/hashtag/Darkweb?src=hash&ref_src=twsrc%5Etfw)

[

#ThreatIntelligence

](https://twitter.com/hashtag/ThreatIntelligence?src=hash&ref_src=twsrc%5Etfw)

[

pic.twitter.com/1qVdhMO0UF

](https://t.co/1qVdhMO0UF)

— ThreatMon (@MonThreat)

[

April 2, 2024

](https://twitter.com/MonThreat/status/1775149045767385371?ref_src=twsrc%5Etfw)

Stealth and Evasion Techniques

One of the most concerning aspects of the Mighty Stealer is its ability to evade detection.

It includes features that prevent it from being discovered by antivirus programs and can operate undetected in virtual machine environments.

The malware can also hide its presence on the infected device, making it even harder for users to realize they’ve been compromised.

The Risks of Mighty Stealer

The risks associated with the Mighty Stealer are significant.

The malware can bypass login procedures and access online accounts by capturing cookies. Striking passwords and wallet information can lead to financial loss and identity theft.

The unauthorized access to webcam feeds poses a severe privacy violation, potentially leading to blackmail and other forms of exploitation.

To safeguard against threats like the Mighty Stealer, it is crucial to maintain up-to-date antivirus software and to be cautious when downloading and installing new programs.

Users should also regularly change their passwords and enable two-factor authentication where possible to add an extra layer of security.

The emergence of the Mighty Stealer malware is a stark reminder of the importance of cybersecurity vigilance.

With its array of stealthy data theft capabilities, it represents a significant threat to personal privacy and security.

Users must proactively protect their devices and personal information from such invasive software.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

The post Beware of New Mighty Stealer That Takes Webcam Pictures & Capture Cookies appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder

tresronours@parlote.facil.services

Beware of New Mighty Stealer That Takes Webcam Pictures & Capture Cookies

A new menace has emerged that targets personal information with alarming precision.

Dubbed the “Mighty Stealer,” this malicious software is designed to infiltrate devices and extract a wide range of sensitive data.

The Mighty Stealer is a sophisticated malware that boasts an easy-to-use graphical user interface (GUI), allowing cybercriminals to deploy it with minimal effort.

The software’s capabilities are extensive, including the theft of cookies, passwords, and wallet information.

It can also capture Discord tokens, Telegram profiles, and webcam pictures without the user’s consent.

The interface of the Mighty Stealer, as seen in the provided images, is sleek and user-friendly, disguising its nefarious purposes behind a facade of legitimacy.

The software’s logo, featuring a stylized bird, is a deceptive symbol of the power and control it grants to its unauthorized users.

Run Free ThreatScan on Your Mailbox

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Run Free Threat Scan

According to a recent tweet by TweetMon, a threat actor has announced the release of a new tool called Mighty Stealer.

🚨 Mighty Stealer Announced

A threat actor announces Mighty Stealer. Stealer captures cookies, passwords, wallets, discord tokens, telegram profiles, webcam pictures, games, user/pc information, desktop snaps, etc.

[

#MightyStealer

](https://twitter.com/hashtag/MightyStealer?src=hash&ref_src=twsrc%5Etfw)

[

#Malware

](https://twitter.com/hashtag/Malware?src=hash&ref_src=twsrc%5Etfw)

[

#Darkweb

](https://twitter.com/hashtag/Darkweb?src=hash&ref_src=twsrc%5Etfw)

[

#ThreatIntelligence

](https://twitter.com/hashtag/ThreatIntelligence?src=hash&ref_src=twsrc%5Etfw)

[

pic.twitter.com/1qVdhMO0UF

](https://t.co/1qVdhMO0UF)

— ThreatMon (@MonThreat)

[

April 2, 2024

](https://twitter.com/MonThreat/status/1775149045767385371?ref_src=twsrc%5Etfw)

Stealth and Evasion Techniques

One of the most concerning aspects of the Mighty Stealer is its ability to evade detection.

It includes features that prevent it from being discovered by antivirus programs and can operate undetected in virtual machine environments.

The malware can also hide its presence on the infected device, making it even harder for users to realize they’ve been compromised.

The Risks of Mighty Stealer

The risks associated with the Mighty Stealer are significant.

The malware can bypass login procedures and access online accounts by capturing cookies. Striking passwords and wallet information can lead to financial loss and identity theft.

The unauthorized access to webcam feeds poses a severe privacy violation, potentially leading to blackmail and other forms of exploitation.

To safeguard against threats like the Mighty Stealer, it is crucial to maintain up-to-date antivirus software and to be cautious when downloading and installing new programs.

Users should also regularly change their passwords and enable two-factor authentication where possible to add an extra layer of security.

The emergence of the Mighty Stealer malware is a stark reminder of the importance of cybersecurity vigilance.

With its array of stealthy data theft capabilities, it represents a significant threat to personal privacy and security.

Users must proactively protect their devices and personal information from such invasive software.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

The post Beware of New Mighty Stealer That Takes Webcam Pictures & Capture Cookies appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder

tresronours@parlote.facil.services

RedLine Malware Tops Charts by Hijacking 170M+ Passwords in the Last 6 Months

The cybersecurity landscape has been shaken by the discovery that a single piece of malware, known as RedLine, has stolen over 170 million passwords in the past six months.

This alarming statistic has placed RedLine at the forefront of cyber threats, accounting for nearly half of all stolen credentials analyzed during this period.

Darren James, the Senior Product Manager at Specops, commented on the research outcomes, stating:

“It’s quite remarkable that a single strain of malware has been implicated in the theft of almost 50% of the passwords we’ve examined.

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities. :

  • The problem of vulnerability fatigue today

  • Difference between CVSS-specific vulnerability vs risk-based vulnerability

  • Evaluating vulnerabilities based on the business impact/risk

  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, that helps you to quantify risk accurately:

Book Your spot Our analysis reveals that Redline malware has emerged as the preferred tool among hackers for password theft, amassing an astonishing 170 million compromised credentials within six months.”

Specopssoft has released a report outlining the most commonly used malware techniques hackers employ to steal user passwords.

Most Popular Credential Thieves Among Hackers:

most popular credential thievesmost popular credential thieves

Top three password-stealing malware:

Redline: The Premier Password Pilferer

Overview and Discovery

Redline, identified in March 2020, has quickly become a highly favored tool among cybercriminals for its proficiency in extracting personal information.

Its primary objective is to siphon off credentials, cryptocurrency wallets, and financial data and subsequently upload this stolen information to the malware’s command-and-control (C2) infrastructure.

Redline often comes bundled with a cryptocurrency miner, targeting gamers with high-performance GPUs for deployment.

According to a recent tweet by ImmuniWeb, Redline malware has been identified as the primary credential stealer over the past six months.

RedLine

[

#malware

](https://twitter.com/hashtag/malware?src=hash&ref_src=twsrc%5Etfw)

top credential stealer of last 6 months:

[

https://t.co/lz3mHaWkzY

](https://t.co/lz3mHaWkzY)

[

#darkweb

](https://twitter.com/hashtag/darkweb?src=hash&ref_src=twsrc%5Etfw)

— ImmuniWeb (@immuniweb)

[

March 14, 2024

](https://twitter.com/immuniweb/status/1768299391993933901?ref_src=twsrc%5Etfw)

Distribution Techniques

The malware employs diverse distribution methods, with phishing campaigns taking the lead.

Cybercriminals have adeptly utilized global events, such as the COVID-19 pandemic, as bait to entice unsuspecting individuals into downloading Redline.

From mid-2021, an innovative approach involving YouTube has been observed:

  • Initially, a Google/YouTube account is compromised by the threat actor.

  • The attacker creates various channels or uses existing ones to post videos.

  • These videos, often promoting gaming cheats and cracks, include malicious links in their descriptions, cleverly tied to the video’s theme.

  • Unsuspecting users clicking these links inadvertently download Redline, leading to the theft of their passwords and other sensitive information.

Vidar: The Evolving Threat

Genesis and Operation

Vidar, a sophisticated evolution of the Arkei Stealer, scrutinizes the language settings of infected machines to selectively target or exclude specific countries.

It initializes necessary strings and generates a Mutex for its operation.

Vidar is available in two versions: the original, Vidar Pro, and a cracked version known as Anti-Vidar, distributed through underground forums.

Distribution Channels

In early 2022, Vidar was detected in phishing campaigns disguised as Microsoft Compiled HTML Help (CHM) files.

It has also been distributed via various malware services and loaders, including PrivateLoader, the Fallout Exploit Kit, and the Colibri loader.

By late 2023, the GHOSTPULSE malware loader was observed as a new distribution method for Vidar.

Raccoon Stealer: Malware-as-a-Service

Introduction and Sales Model

Raccoon Stealer, first seen on the cybercriminal market in April 2019, operates on a malware-as-a-service model.

This allows cybercriminals to rent the stealer every month.

It debuted on the prominent Russian-language forum Exploit, boasting the slogan “We steal, You deal!”

Market Presence

The malware has been primarily marketed on Russian-language underground forums, including Exploit and WWH-Club.

In October 2019, it expanded its reach to the English-speaking segment of the cybercriminal underworld via Hack Forums.

The promoters of Raccoon Stealer occasionally offer “test weeks,” suggesting that potential customers can try the product before making a purchase.

The research underscores the risks associated with password reuse, a familiar yet dangerous practice.

Even with robust password policies, reused passwords can be compromised on insecure sites and devices, posing a significant threat to organizational security.

Studies by Bitwarden and LastPass have highlighted the prevalence of password reuse despite widespread awareness of its risks.

With Perimeter81 malware protection, you can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits. All are incredibly harmful and can wreak havoc on your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

The post RedLine Malware Tops Charts by Hijacking 170M+ Passwords in the Last 6 Months appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder

loposum@diaspora-fr.org

Pegasus, un espion dans votre proche

En 2021, un consortium international de médias révélait le scandale Pegasus : la surveillance illégale d’opposants, de journalistes ou de chefs d’État pratiquée par de nombreux pays via le logiciel israélien. Ce documentaire raconte les coulisses de l’enquête et expose les dérives mises au jour.

https://www.arte.tv/fr/videos/106169-001-A/pegasus-un-espion-dans-votre-poche/ (replay disponible jusqu'en février 2025)

Le site des primo enquêteurs : https://forbiddenstories.org
A noter la journaliste Sandrine Rigaud qui semble être souvent au cœur d’enquêtes explosives.

#documentaire #reportage #pegasus #surveillance #smartphone #malware #forbiddenstories #annepoiret #sandrinerigaud

anonymiss@despora.de

Hackers exploited #Windows 0-day for 6 months after #Microsoft knew of it

Source: https://arstechnica.com/security/2024/03/hackers-exploited-windows-0-day-for-6-months-after-microsoft-knew-of-it/

Even after Microsoft patched the #vulnerability last month, the company made no mention that the North Korean threat group #Lazarus had been using the vulnerability since at least August to install a stealthy #rootkit on vulnerable computers. The vulnerability provided an easy and stealthy means for #malware that had already gained administrative system rights to interact with the Windows #kernel. Lazarus used the vulnerability for just that. Even so, Microsoft has long said that such admin-to-kernel elevations don’t represent the crossing of a security boundary, a possible explanation for the time Microsoft took to fix the vulnerability.

#software #news #security #cybercrime #bug #exploit #0day #fail #economy #problem #politics #hack #Hackers #trust #risk

atarifrosch@piratenpartei.social

Spam des Tages: „Telekom-Rechnungen“

Besonders lustig:

Date: Wed, 30 Nov 2046 07:35:52 +0000

Ja nee is' klar.

Die angehängte ZIP-Datei enthält eine JavaScript-Datei mit sehr viel obfuscation.

Virustotal sagt:

  • BehavesLike.JS.Exploit.lm (Skyhigh SWG)
  • ISB.Downloader!gen48 (Symantec)

Alle anderen dort gelisteten Virenscanner erkennen die Schadsoftware gar nicht.

#Spam #Malware

fefebot@diasp.org

[l] Einmal mit Profis arbeiten: Die Sparkasse Bremen verschickt 15.000 USB-Sticks an ihre Kunden, weil sie Papier sparen wollten. Darauf sind ihre neuen AGBs.Ich beobachte ja dieses ganze Security-Theater seit Jahren belustigt und Popcorn mampfend von der Tribüne. Seit Jahrzehnten warnen jetzt Experten davor, USB-Sticks in den PC zu stecken.Der Hauptgrund war immer, dass man da ein Filesystem mit Autorun-Datei drauf haben konnte, und Windows würde das dann beim Reinstecken einfach ausführen und etwaige Malware installieren. Das ist seit Jahren nicht mehr so.Aber USB ist halt ein recht generisches Protokoll, und nur weil das wie ein Stick aussieht, heißt das nicht, dass es sich auch als USB-Stick anmeldet. Es kann sich auch als Tastatur und Maus anmelden und Eingaben tätigen, die einen Trojaner "von Hand" installieren.USB-Geräte reinstecken ist also immer noch grundsätzlich riskant, nicht nur unter Windows.Das ist leider ein grundsätzlicher Trend in der IT. USB 4 geht sogar noch weiter und kann PCI sprechen, d.h. ungefragt Speicher auslesen. Da kann sich der Host zwar gegen wehren, aber nicht komplett (die Granularität der Zugriffsrechte ist eine Speicher-Page).

Nichts davon musste sein. Das sind alles selbst zugefügte Wunden.

#fefebot #einmalmitprofisarbeiten #malware #trojaner

tresronours@parlote.facil.services

Heavily Obfuscated PIKABOT Evades EDR Protection

PIKABOT is a polymorphic malware that constantly modifies its code, making it hard to recognize and easily bypasses the Endpoint Detection and Response (EDR) systems.

Obfuscation, encryption, and anti-analysis techniques help the object avoid these traditional security measures.

PIKABOT is able to avoid signature-based detection by dynamically changing its structure, which makes it harder for EDR solutions to keep up with their ever-changing behaviors.

Cybersecurity researchers at Elastic Security Labs recently discovered new and upgraded PIKABOT campaigns on February 8th.

A popular loader used by malicious actors to disseminate extra payloads is called PIKABOT.

Technical Analysis

Elastic Security Labs detected a fresh instance of PIKABOT with the updated loader, new unpacking method, and heavy obfuscation for strings decryption as well as other obfuscation changes.

The update is an indication that a new code base has been laid down for future improvements.

However, these changes are expected to break signatures and previous tools like the previous versions.

PIKABOT execution flow (Source – Elastic)

PIKABOT has been quiet during the New Year but resurfaced in February, with a campaign launched on Feb 8.

ZIP archives in emails contained hyperlinks to download obfuscated Javascript.

The attacker altered grepWinNP3.exe, which is a legitimate tool, to appear real.

The call stack analysis traced back malicious code entering their Detonate sandbox and Elastic Defend’s call stack.

Executions begin before offset 0x81aa7 and jump towards memory allocation at offset 0x25d84 as indicated by this last part of the previous sentence.

There were no normal calls for process creation; instead, there were unbacked memory syscalls via shellcode evading EDR products and bypassing user-mode hooks on WOW64 modules.

In a hard-coded address for PIKABOT loader execution at offset 0x81aa7, researchers found. JMP instructions are used after each assembly line in the code to make analysis difficult because of heavy obfuscation.

This loader uses custom decryption by means of bitwise operations to recover its payload from the .text section.

However, this can lead to any PE file not being written into a disk and executed in memory.

By doing this, on the host system, the stealth is improved by reducing the digital footprint.

The PIKABOT core is initialized by the stage 2 loader using code and string obfuscation, NTDLL Zw APIs, and advanced anti-debugging.

Moreover, the PIKABOT core makes direct system calls, allowing it to bypass EDR user-land hooking and debugging.

Besides, malware utilizes ZwQuerySystemInformation, ZwQueryInformationProcess, PEB inspection, GetThreadContext methods, and many others as techniques that are undetected by forensic and debugging tools.

The current version of PIKABOT core functions similarly with its previous releases.

However, there are some differences, such as a new obfuscation style, different string decryption processes, use of plain text configuration, and network communication changes (RC4 instead of AES).

This binary is relatively less obfuscated but still remains familiar. The remaining in-line RC4 functions utilize legitimate strings as keys.

Obfuscation is done through junk code insertion to confuse an analyst. While the command execution, discovery, and process injection form part of core functionality.

The Twitter user reecDeep, who specializes in malware analysis, noticed that Pikabot malware is being distributed by TA577 through HTML files.

⚠️TA577 starts spreading

[

#Pikabot

](https://twitter.com/hashtag/Pikabot?src=hash&ref_src=twsrc%5Etfw)

[

#malware

](https://twitter.com/hashtag/malware?src=hash&ref_src=twsrc%5Etfw)

eml>.zip>.html(link)

html files with 0 detections on Virustotal and decoy latin words

🔥staging ip:

204.44.125.68

103.124.104.76

103.124.104.22

66.63.188.19

104.129.20.167

[

#infosecurity

](https://twitter.com/hashtag/infosecurity?src=hash&ref_src=twsrc%5Etfw)

[

#CyberAttack

](https://twitter.com/hashtag/CyberAttack?src=hash&ref_src=twsrc%5Etfw)

[

pic.twitter.com/0VXEGlqCjA

](https://t.co/0VXEGlqCjA)

— reecDeep (@reecdeep)

[

February 26, 2024

](https://twitter.com/reecdeep/status/1762081212124827948?ref_src=twsrc%5Etfw)

Surprisingly, these files have not been detected by any of the antivirus programs on VirusTotal.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

*Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.*

The post Heavily Obfuscated PIKABOT Evades EDR Protection appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder

anonymiss@despora.de

#Justice Department Conducts Court-Authorized Disruption of #Botnet Controlled by the Russian Federation’s Main #Intelligence Directorate of the General Staff (GRU)

source: https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian

“Operation #DyingEmber was an international effort led by #FBI #Boston to remediate over a thousand compromised routers belonging to unsuspecting victims here in the United States, and around the world that were targeted by malicious, nation state actors in #Russia to facilitate their strategic intelligence collection,” said Special Agent in Charge Jodi Cohen of the FBI Boston Field Office. “The FBI’s strong partnerships with the private sector were critical to identifying and addressing this threat which targeted our national security interests here and abroad. This #operation should make it crystal clear to our adversaries that we will not allow anyone to exploit our #technology and networks.”

#router #news #internet #malware #security #cybercrime #usa

anonymiss@despora.de

Cybercriminals crave cookies, not passwords

source: https://cybernews.com/security/cybercriminals-crave-cookies-not-passwords/

Authentication #cookies establish an expiration time for your sessions with services. The token expires after some time, which may take minutes to months, and the user needs to re-authenticate. Malicious actors, having access to cookies and device information, no longer need to know passwords and security passphrases or have access to account recovery options.

#password #cooky #security #web #internet #browser #cybercrime #news #malware

tresronours@parlote.facil.services

macOS Infostealers That Actively Involve in Attacks Evade XProtect Detection

Ever since the beginning of 2023, infostealers targeting macOS have been on the rise with many threat actors actively targeting Apple devices. As of last year, many variants of Atomic Stealer, macOS meta stealer, RealStealer, and many others were discovered.

However, Apple updated their built-in antivirus “XProtect” signature databases in macOS which denotes that Apple is completely aware of these info stealers and has been taking necessary measures to prevent them. On the other side, threat actors have been constantly evolving and evading known signatures.

Free Webinar

Fastrack Compliance: The Path to ZERO-Vulnerability

Compounding the problem are zero-day vulnerabilities like the MOVEit SQLi, Zimbra XSS, and 300+ such vulnerabilities that get discovered each month. Delays in fixing these vulnerabilities lead to compliance issues, these delay can be minimized with a unique feature on AppTrana that helps you to get “Zero vulnerability report” within 72 hours.

Register for Free

Technical Analysis – The Three Active Infostealers

According to the reports shared with Cyber Security News, Keysteal, Atomic InfoStealer, and CherryPie were three active infostealers that presently evade many static signature detection engines including XProtect.

KeySteal

This stealer was first discovered in 2021 and has been constantly evolving with evasion techniques. Some of the distributions of this malware were under the binary name “ChatGPT”. Apple added a signature for this malware in 2023 inside XProtect which no longer works.

Recent sample of KeyStealRecent sample of KeySteal (Source: [*SentinelOne](https://www.sentinelone.com/blog/the-many-faces-of-undetected-macos-infostealers-keysteal-atomic-cherrypie-continue-to-adapt/))*

During the initial stages of this Keysteal, it was distributed with a .pkg format embedded inside the “ReSignTool” macOS utility. It is coded in such a way to steal Keychain information which holds a lot of sensitive password information and establish persistence on the affected device.

The latest version of KeySteal replaces “ReSignTool” with multi-architecture Mach-O binaries under the names “UnixProject” and “ChatGPT”. The malware is written in Objective C and current distribution methods are unclear.

Atomic Infostealer

Apple updated their XProtect Signature databases for detecting this malware earlier this month. But it seems like threat actors have up-to-date information about the signature detection and have modified the malware with a Go language version shortly after the signature update.

In addition to this, this malware has been seen with completely different development chains, unlike other infostealers which update only the core version. There have been several variations of this malware currently in the wild attacking macOS devices.

Another bunch of

[

#Amos

](https://twitter.com/hashtag/Amos?src=hash&ref_src=twsrc%5Etfw)

[

#AtomicStealer

](https://twitter.com/hashtag/AtomicStealer?src=hash&ref_src=twsrc%5Etfw)

samples that evade the recent

[

#XProtect

](https://twitter.com/hashtag/XProtect?src=hash&ref_src=twsrc%5Etfw)

v2178 SOMA_E signature.

[

#apple

](https://twitter.com/hashtag/apple?src=hash&ref_src=twsrc%5Etfw)

[

#security

](https://twitter.com/hashtag/security?src=hash&ref_src=twsrc%5Etfw)

[

#malware

](https://twitter.com/hashtag/malware?src=hash&ref_src=twsrc%5Etfw)[

https://t.co/m3ubSlopDU

](https://t.co/m3ubSlopDU)

[

pic.twitter.com/MPhMavJM3S

](https://t.co/MPhMavJM3S)

— Phil Stokes ⫍🐠⫎ (@philofishal)

[

January 12, 2024

](https://twitter.com/philofishal/status/1745807753531011096?ref_src=twsrc%5Etfw)

The malware is written in C++ and consists of logic to prevent victims, analysts, or malware sandboxes from running the terminal in parallel with the stealer. Furthermore, it also checks if the malware is being tested inside a virtual machine.

The distributions of this malware were through torrents or gaming-focused social media platforms appearing as a “CrackInstaller” with the .dmg format.

GateKeeper Override by Atomic Stealer GateKeeper Override by Atomic Stealer (Source: [*SentinelOne](https://www.sentinelone.com/blog/the-many-faces-of-undetected-macos-infostealers-keysteal-atomic-cherrypie-continue-to-adapt/))*

CherryPie

This infostealer malware is also known as Gary Stealer or “JaskaGo” which is a cross-platform malware written in Go with extensive logic for anti-analysis and VM detection. However, the malware developers seem too confident that they left extremely obvious strings which indicate the core intent and purpose of this malware.

CherryPie attempts to disable GateKeeper CherryPie attempts to disable GateKeeper (Source: [*SentinelOne](https://www.sentinelone.com/blog/the-many-faces-of-undetected-macos-infostealers-keysteal-atomic-cherrypie-continue-to-adapt/))*

In some samples, there were traces of using the Wails project for bundling their malicious application. During the execution of this malware, the application calls the spctl utility with the –master-disable argument for disabling the Gatekeeper and runs with administrative privileges.

Furthermore, a complete report about this malware has been published which provides detailed information about the source code, behavior, intent, and other information.

Indicators of Compromise

KeySteal

  • 95d775b68f841f82521d516b67ccd4541b221d17

  • f75a06398811bfbcb46bad8ab8600f98df4b38d4

  • usa[.]4jrb7xn8rxsn8o4lghk7lx6vnvnvazva[.]com

Atomic InfoStealer

  • 1b90ea41611cf41dbfb2b2912958ccca13421364

  • 2387336aab3dd21597ad343f7a1dd5aab237f3ae

  • 8119336341be98fd340644e039de1b8e39211254

  • 973cab796a4ebcfb0f6e884025f6e57c1c98b901

  • b30b01d5743b1b9d96b84ef322469c487c6011c5

  • df3dec7cddca02e626ab20228f267ff6caf138ae

CherryPie

  • 04cbfa61f2cb8daffd0b2fa58fd980b868f0f951

  • 09de6c864737a9999c0e39c1391be81420158877

  • 6a5b603119bf0679c7ce1007acf7815ff2267c9e

  • 72dfb718d90e8316135912023ab933faf522e78a

  • 85dd9a80feab6f47ebe08cb3725dea7e3727e58f

  • 104[.]243[.]38[.]177

Looking for cost-effective penetration testing services? Try Kelltron’s to assess and evaluate the security posture of digital systems – Free Demo

The post macOS Infostealers That Actively Involve in Attacks Evade XProtect Detection appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder