Tuesday, May 28, 2024

DarkGate, Which Abused Microsoft Teams, Now Leverages MSI Files

A new wave of cyberattacks has been discovered by Netskope Threat Labs, involving the use of SharePoint as a delivery platform for the notorious DarkGate malware. 

This alarming trend is driven by an attack campaign that exploits vulnerabilities in Microsoft Teams and SharePoint, posing a serious risk to online security.

DarkGate: A Versatile Threat

DarkGate, also known as MehCrypter, emerged in the cybersecurity scene in 2018. 

Since then, it has become a popular choice among cybercriminals due to its versatile feature set, including HVNC (Hidden VNC), keylogging, information theft, and the ability to download and execute additional payloads. 

This malware variant has been involved in multiple campaigns in the past few months, making it a persistent and evolving threat.

Document
FREE Webinar

Webinar on Cyber Resilience for Financial Sector

Ensure your Cyber Resiliance with the recent wave of cyber-attacks targeting the financial services sector. Almost 60% respondents not confident to recover fully from a cyber attack.

The Infection Path

The recent DarkGate variant detected by Netskope Threat Labs follows a clever infection path. 

It begins with a phishing email, masquerading as a fake invoice containing a PDF document. 

Once opened, the PDF prompts the user to review a document, initiating the download of a CAB file. 

Example of the malicious document sent to the victim
Example of the malicious document sent to the victim

Within this file lies an internet shortcut leading to the download of an MSI file, the entry point for DarkGate’s infiltration.

Once the MSI file is executed, a complex chain of loading techniques is triggered. 

DarkGate uses DLL side-loading techniques, hiding its presence by executing a fake version of the dbgeng.dll DLL file. 

This DLL, written in Delphi programming language, facilitates the execution of malicious payloads while avoiding detection.

Multiple Layers of Evasion

The malware’s evasion techniques are not limited to a single layer. 

DarkGate’s multi-stage loading process involves the use of AutoIt scripts, further concealing its intentions. 

These scripts construct a PE (Portable Executable) file, executing it through a callback function, adding another layer of complexity to its operation.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Website

Latest articles

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS)...

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to...

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...

Hackers Exploit WordPress Plugin to Steal Credit Card Data

Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting...

Google Patches Chrome Zero-Day: Type Confusion in V8 JavaScript

Google has released a patch for a zero-day exploit in its Chrome browser.The...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles