Tuesday, June 25, 2024

Darkcrystal RAT Malware Attacking Government Officials Via Signal Messenger

Cybersecurity experts have discovered that the widely used messaging application Signal is being exploited to deliver DarkCrystal RAT malware to high-profile targets, including government officials, military personnel, and representatives of defense enterprises in Ukraine.

The Infection Process

According to a report from Broadcom, the infection chain begins when the victim receives a message containing an archive file, a password, and instructions on how to open it.

Upon opening the archive, the user finds an executable file as a “.pif” or “.exe” file.

With ANYRUN You can Analyze any URL, Files & Email for Malicious Activity : Start your Analysis

These files are RARSFX archives that contain a VBE file, a BAT file, and an EXE file.

When the user runs these files, their computer becomes infected with the DarkCrystal RAT malware, granting attackers unauthorized access to the system.

VMware Carbon Black, another leading cybersecurity firm, has also reported that associated malicious indicators are blocked and detected by existing policies within their products.

They recommend a policy that, at minimum, blocks all types of malware (Known, Suspect, and PUP) from executing and delays execution for cloud scans to maximize the benefits of their reputation service.

As cybercriminals continue to exploit popular messaging applications like Signal to target high-profile individuals and organizations, users must remain vigilant and take necessary precautions.

Experts advise against opening suspicious files or links, even if they appear to come from trusted sources.

Additionally, keeping software and security solutions up-to-date can help mitigate the risk of falling victim to such attacks.

With cyber threats becoming increasingly sophisticated, collaboration between cybersecurity firms, government agencies, and end-users is essential to maintaining a secure digital environment.

As investigations into the DarkCrystal RAT malware continue, the cybersecurity community’s combined efforts will hopefully help prevent further attacks and protect vulnerable targets.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo 

Website

Latest articles

Hackers Attacking Windows IIS Server to Upload Web Shells

Windows IIS Servers often host critical web applications and services that provide a gateway...

WikiLeaks Founder Julian Assange Released in Stunning Deal with U.S.

WikiLeaks founder Julian Assange has been released from prison after reaching a deal with...

Four Members of FIN9 Hackers Charged for Attacking U.S. Companies

Four Vietnamese nationals have been charged for their involvement in a series of computer...

BREAKING: NHS England’s Synnovis Hit by Massive Cyber Attack

In a shocking development, the NHS has revealed that it was the victim of...

Threat Actor Claiming a 0-day in Linux LPE Via GRUB bootloader

A new threat actor has emerged, claiming a zero-day vulnerability in the Linux GRUB...

LockBit Ransomware Group Claims Hack of US Federal Reserve

The notorious LockBit ransomware group has claimed responsibility for hacking the U.S. Federal Reserve,...

Microsoft Power BI Vulnerability Let Attackers Access Organizations Sensitive Data

A vulnerability in Microsoft Power BI allows unauthorized users to access sensitive data underlying...
Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles