Friday, December 27, 2024
HomeCyber Security NewsDarkGate Malware opens RaaS For Financially Motivated Hackers

DarkGate Malware opens RaaS For Financially Motivated Hackers

Published on

SIEM as a Service

Following the FBI’s shutdown of Qakbot infrastructure in August 2023, security analysts at EclecticIQ observed a surge in the use of the DarkGate loader.

EclecticIQ believes DarkGate is primarily in the hands of financially motivated groups like TA577 and Ducktail and RaaS operators like BianLian and Black Basta.

These groups focus on European and American financial institutions, employing double extortion ransomware attacks to squeeze maximum profit

- Advertisement - SIEM as a Service
Overview of DarkGate version 5 activity
Overview of DarkGate version 5 activity

They exploit legitimate services like Google’s DoubleClick advertising network and cloud storage to trick victims into downloading the malware.

Document
Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks.

DarkGate offered on Forums

On June 16, 2023, a cybercriminal known as RastaFarEye advertised a dangerous service on online forums: DarkGate Malware-as-a-Service (MaaS). 

This service gave hackers tools to control victims’ devices and steal their data remotely.

Persona RastaFarEye advertising DarkGate on a cybercrime forum.
Persona RastaFarEye advertising DarkGate on a cybercrime forum.

Phishing Scam

Security researchers at EclecticIQ believe cybercriminals behind DarkGate malware primarily target financial institutions. 

One example involves a phishing attempt against Bank Deutsches Kraftfahrzeuggewerbe (BDK), the second-largest independent bank in Germany’s automotive sector.

The attackers sent an email with a malicious PDF attachment using an automotive-themed lure, likely to exploit BDK’s industry focus.

Clicking the “Open” button in the PDF redirected victims to a phishing website designed to download DarkGate.

The phishing site delivered the malware disguised within a ZIP compressed file, a common tactic to bypass security measures.

Automotive-themed lure in PDF document
Automotive-themed lure in PDF document

Recommendations Suggested

Look for activity where wscript.exe or cscript.exe are used to run .vbs files, especially from temporary folders. 

Tools like the SIGMA rule “Suspicious Script Execution from Temp Folder” or an Elasticsearch KQL query can help detect this.

Monitor network traffic for unusual patterns, such as redirects to strange domains like “adclick.g.doubleclick.net” with suspicious parameters or downloads of .CAB files.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...