A new wave of cyberattacks has been discovered by Netskope Threat Labs, involving the use of SharePoint as a delivery platform for the notorious DarkGate malware.
This alarming trend is driven by an attack campaign that exploits vulnerabilities in Microsoft Teams and SharePoint, posing a serious risk to online security.
DarkGate, also known as MehCrypter, emerged in the cybersecurity scene in 2018.
Since then, it has become a popular choice among cybercriminals due to its versatile feature set, including HVNC (Hidden VNC), keylogging, information theft, and the ability to download and execute additional payloads.
This malware variant has been involved in multiple campaigns in the past few months, making it a persistent and evolving threat.
Ensure your Cyber Resiliance with the recent wave of cyber-attacks targeting the financial services sector. Almost 60% respondents not confident to recover fully from a cyber attack.
The recent DarkGate variant detected by Netskope Threat Labs follows a clever infection path.
It begins with a phishing email, masquerading as a fake invoice containing a PDF document.
Once opened, the PDF prompts the user to review a document, initiating the download of a CAB file.
Within this file lies an internet shortcut leading to the download of an MSI file, the entry point for DarkGate’s infiltration.
Once the MSI file is executed, a complex chain of loading techniques is triggered.
DarkGate uses DLL side-loading techniques, hiding its presence by executing a fake version of the dbgeng.dll DLL file.
This DLL, written in Delphi programming language, facilitates the execution of malicious payloads while avoiding detection.
The malware’s evasion techniques are not limited to a single layer.
DarkGate’s multi-stage loading process involves the use of AutoIt scripts, further concealing its intentions.
These scripts construct a PE (Portable Executable) file, executing it through a callback function, adding another layer of complexity to its operation.
Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…
A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…
Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…
A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…