Monday, February 10, 2025
HomeCyber AttackDarkGate, Which Abused Microsoft Teams, Now Leverages MSI Files

DarkGate, Which Abused Microsoft Teams, Now Leverages MSI Files

Published on

SIEM as a Service

Follow Us on Google News

A new wave of cyberattacks has been discovered by Netskope Threat Labs, involving the use of SharePoint as a delivery platform for the notorious DarkGate malware. 

This alarming trend is driven by an attack campaign that exploits vulnerabilities in Microsoft Teams and SharePoint, posing a serious risk to online security.

DarkGate: A Versatile Threat

DarkGate, also known as MehCrypter, emerged in the cybersecurity scene in 2018. 

Since then, it has become a popular choice among cybercriminals due to its versatile feature set, including HVNC (Hidden VNC), keylogging, information theft, and the ability to download and execute additional payloads. 

This malware variant has been involved in multiple campaigns in the past few months, making it a persistent and evolving threat.

Document
FREE Webinar

Webinar on Cyber Resilience for Financial Sector

Ensure your Cyber Resiliance with the recent wave of cyber-attacks targeting the financial services sector. Almost 60% respondents not confident to recover fully from a cyber attack.

The Infection Path

The recent DarkGate variant detected by Netskope Threat Labs follows a clever infection path. 

It begins with a phishing email, masquerading as a fake invoice containing a PDF document. 

Once opened, the PDF prompts the user to review a document, initiating the download of a CAB file. 

Example of the malicious document sent to the victim
Example of the malicious document sent to the victim

Within this file lies an internet shortcut leading to the download of an MSI file, the entry point for DarkGate’s infiltration.

Once the MSI file is executed, a complex chain of loading techniques is triggered. 

DarkGate uses DLL side-loading techniques, hiding its presence by executing a fake version of the dbgeng.dll DLL file. 

This DLL, written in Delphi programming language, facilitates the execution of malicious payloads while avoiding detection.

Multiple Layers of Evasion

The malware’s evasion techniques are not limited to a single layer. 

DarkGate’s multi-stage loading process involves the use of AutoIt scripts, further concealing its intentions. 

These scripts construct a PE (Portable Executable) file, executing it through a callback function, adding another layer of complexity to its operation.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

NetSupport RAT Grant Attackers Full Access to Victims Systems

The eSentire Threat Response Unit (TRU) has reported a significant rise in incidents involving...

Quishing via QR Codes Emerging as a Top Attack Vector Used by Hackers

QR codes, once a symbol of convenience and security in digital interactions, have become...

New ‘BYOTB’ Attack Exploits Trusted Binaries to Evade Detection, Researchers Reveal

A recent cybersecurity presentation at BSides London 2024 has unveiled a sophisticated attack technique...

SAML Bypass Authentication on GitHub Enterprise Servers to Login as Other User Account

A severe security vulnerability, tracked as CVE-2025-23369, has been identified in GitHub Enterprise Server...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

NetSupport RAT Grant Attackers Full Access to Victims Systems

The eSentire Threat Response Unit (TRU) has reported a significant rise in incidents involving...

Quishing via QR Codes Emerging as a Top Attack Vector Used by Hackers

QR codes, once a symbol of convenience and security in digital interactions, have become...

New ‘BYOTB’ Attack Exploits Trusted Binaries to Evade Detection, Researchers Reveal

A recent cybersecurity presentation at BSides London 2024 has unveiled a sophisticated attack technique...