Saturday, January 25, 2025
HomeBackdoorA Sophisticated Backdoor Called "Stantinko" Infected More Than 500,000 Computers

A Sophisticated Backdoor Called “Stantinko” Infected More Than 500,000 Computers

Published on

SIEM as a Service

Follow Us on Google News

An Advance Backdoor called “Stantinko” Installed  More than half Million Computer Around the World which Automatically injects Malicious ads Through Browser Extension while surfing on the internet and Create a Backdoor in Victims Computer.

Stantinko has Capable of highly obfuscated and initially it Doesn’t Look Malicious and  it looks pretty benign.

A trick used to avoid detection is to hide the malicious code in the Windows Registry.Again, the file itself looks legitimate if you do not have access to the content of that Registry key.

Malware Authors used this Backdoor for performing searches on Google and a tool that brute-forces Joomla and WordPress administrative login pages.

It used Encrypted communication to Communicate with C&C Server and component names Similar to the Domain name. Ex, abc.com similar as abc.dll.

According to ESET Report, Stantinko botnet activity since 2012 and last five years it has increased its Sophisticated level and they are still really active as they released new versions of their main services in March, 2017.

Timeline of the Stantinko services

After completing the Further investigations,requests received from 140,000 unique IP addresses and it is clear from the statistics that the countries mainly targeted are Russia, Ukraine, Belaru, and Kazakhstan.

Also Read  Record Audio and Video Silently with Obfuscated Android Backdoor – GhostCtrl

Browser Extensions Installation

Stantinko‘s one of the main activities is installed the malicious browser extensions which is performing to inject Backdoor in Victims Machine.

Mostly it seems a legitimate Extension and most of the installations were achieved without user consent.

The two browser extensions that installed by Stantinko are The Safe Surfing and Teddy Protection. At the time of writing, both extensions have around 500,000 users.

Number of users of The Safe Surfing &  Teddy Protection

In terms of Obfuscation ,Stantinko’s recent components, the code is highly obfuscated with what seems to be a custom obfuscator. Not everything in Stantinko’s toolset is obfuscated, but all PE files that are written to the disk are subject to obfuscation.

According to ESET Research, some of the key findings from our research:

•Installation statistics show that about half a million computers are compromised
with Stantinko.
•This threat targets mainly Russia (46%) and Ukraine (33%).
•The botnet is monetized by installing browser extensions that inject ads while surfing
the web.
•Components that are left on disk employ a custom code obfuscator that mangles strings
and applies control flow flattening.
•In most of the Stantinko components, the malicious code is concealed inside legitimate
free and open source software that has been modified and recompiled.
•Stantinko installs multiple persistent services that install one another to resist cleaning
attempts.
•Although its most common use is to install adware, Stantinko can actually download
and execute anything. We saw additional modules being deployed on subsets of the botnet
such as a fully-featured remote administration backdoor, a bot performing searches
on Google and a tool that brute-forces Joomla and WordPress administrative login pages.

Also Read   A Powerful .NET Spyware Creating Backdoor and Records Full videos, Spying on User Activities

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Stealthy Steganography Backdoor Attacks Target Android Apps

BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on...