Thursday, January 23, 2025
HomeBackdoorA Backdoor Called "BackDoor.Dande" Infected Drugstores and Pharmaceutical Companies Computers

A Backdoor Called “BackDoor.Dande” Infected Drugstores and Pharmaceutical Companies Computers

Published on

SIEM as a Service

Follow Us on Google News

The new investigation revealed that “Backdoor.Dande” Trojan Attack Drugstores and pharmaceutical companies computer systems and open a Backdoor with Eprica applications Components.

This Trojan Loaded as an Eprica Applications Components but it’s not limited the infection and also embedded with earlier versions that installed on that Programs.

According to DR.Web Recent Reseach, EpricaĀ Components was Downloaded and launchĀ its Backdoor into the Target Computer systems and thisĀ is software component to analyze drug prices and choose the best suppliers.

This Trojan was FIrst Reported on 2011 By Dr.web  and it was Developed to steal the medication procurement information from users of online drug ordering systems.

Past several years Researchers Following this Trojan and identified its infection method which made a huge impact on pharmaceutical industries.

Also Read  CowerSnail Trojan from the Developers of SambaCry Targeting Windows Machine

How Does “BackDoor.Dande” Works

Initially, this Backdoor is Download the Malicious components from the server that Belongs to ā€œSpargo Tekhnologiiā€  and launch its infection to the Targeting computer systems.

Earlier Version of the ePrica pharmaceutical software installer Infected withĀ BackDoor.Dande components were embedded directly with in it.

According to Dr, Web, The ePrica application has NLB and EMD plugins that are dynamic DLL libraries encrypted with a private key. Among them are the backdoor installer and modules used to collect medication procurement information.

Once Successfully Backdoor Launched, then its Automatically Retrieve the data from the databases of drugstore programs and also used to copy pharmaceutical product procurement information from 1C databases.

A module called runmod.exe helps to execute and launch this Malicious plugin. once it launched into the Target Machine, it waits for the command from the C&C server for Decrypt and launches into the Memory.BackDoor

Protek Digital Signature information “Source: DR.Web”

The indicated application component is signed with the certificate ā€œProtekā€ā€”a group of companies that includes ā€œSpargo Tekhnologiiā€, ePricaā€™s developer.

Once All the data copied from the database then later it will be sent to the remote server.

Even after ePrica is removed, the backdoor stays in the system and continues to spy on users. It is possible that “BackDoor.Dande” is still present on the computers of users who have removed ePrica. Researchers said.

Also Read    A Banking Trojan Called ā€œUrsnifā€ Using Mouse Moments for Evasion and Decryption From Virtual Machine

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Deliver Ransomware on Windows Via Microsoft Teams Voice Calls

Sophos X-Opsā€™ Managed Detection and Response (MDR) team has uncovered two highly active threat...

SonicWall Arbitrary OS Commands Execution Vulnerability Exploited in Attacks

Ā A critical vulnerability in SonicWall's SMA1000 series tracked asĀ CVE-2025-23006, has come under active exploitation...

AI Assistant Jailbreaked to Reveal its System Prompts

Anonymous tinkerer claims to have bypassed an AI assistant's safeguards to uncover its highly...

Murdoc Botnet Exploiting AVTECH Cameras & Huawei Routers to Gain Complete Control

Researchers have identified an active malware campaign involving a Mirai botnet variant, dubbed Murdoc,...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications fasterā€”all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Stealthy Steganography Backdoor Attacks Target Android Apps

BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on...

SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox

UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access...