Wednesday, April 23, 2025
HomeBackdoorA Sophisticated Backdoor Called "Stantinko" Infected More Than 500,000 Computers

A Sophisticated Backdoor Called “Stantinko” Infected More Than 500,000 Computers

Published on

SIEM as a Service

Follow Us on Google News

An Advance Backdoor called “Stantinko” Installed  More than half Million Computer Around the World which Automatically injects Malicious ads Through Browser Extension while surfing on the internet and Create a Backdoor in Victims Computer.

Stantinko has Capable of highly obfuscated and initially it Doesn’t Look Malicious and  it looks pretty benign.

A trick used to avoid detection is to hide the malicious code in the Windows Registry.Again, the file itself looks legitimate if you do not have access to the content of that Registry key.

- Advertisement - Google News

Malware Authors used this Backdoor for performing searches on Google and a tool that brute-forces Joomla and WordPress administrative login pages.

It used Encrypted communication to Communicate with C&C Server and component names Similar to the Domain name. Ex, abc.com similar as abc.dll.

According to ESET Report, Stantinko botnet activity since 2012 and last five years it has increased its Sophisticated level and they are still really active as they released new versions of their main services in March, 2017.

Timeline of the Stantinko services

After completing the Further investigations,requests received from 140,000 unique IP addresses and it is clear from the statistics that the countries mainly targeted are Russia, Ukraine, Belaru, and Kazakhstan.

Also Read  Record Audio and Video Silently with Obfuscated Android Backdoor – GhostCtrl

Browser Extensions Installation

Stantinko‘s one of the main activities is installed the malicious browser extensions which is performing to inject Backdoor in Victims Machine.

Mostly it seems a legitimate Extension and most of the installations were achieved without user consent.

The two browser extensions that installed by Stantinko are The Safe Surfing and Teddy Protection. At the time of writing, both extensions have around 500,000 users.

Number of users of The Safe Surfing &  Teddy Protection

In terms of Obfuscation ,Stantinko’s recent components, the code is highly obfuscated with what seems to be a custom obfuscator. Not everything in Stantinko’s toolset is obfuscated, but all PE files that are written to the disk are subject to obfuscation.

According to ESET Research, some of the key findings from our research:

•Installation statistics show that about half a million computers are compromised
with Stantinko.
•This threat targets mainly Russia (46%) and Ukraine (33%).
•The botnet is monetized by installing browser extensions that inject ads while surfing
the web.
•Components that are left on disk employ a custom code obfuscator that mangles strings
and applies control flow flattening.
•In most of the Stantinko components, the malicious code is concealed inside legitimate
free and open source software that has been modified and recompiled.
•Stantinko installs multiple persistent services that install one another to resist cleaning
attempts.
•Although its most common use is to install adware, Stantinko can actually download
and execute anything. We saw additional modules being deployed on subsets of the botnet
such as a fully-featured remote administration backdoor, a bot performing searches
on Google and a tool that brute-forces Joomla and WordPress administrative login pages.

Also Read   A Powerful .NET Spyware Creating Backdoor and Records Full videos, Spying on User Activities

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...