Tuesday, July 16, 2024
EHA

Hacker-Attacking Developers Using Weaponized MS Visual Studio

Recent reports suggest that threat actors have been spreading malicious versions of Microsoft Visual Studio, a highly familiar Integrated Development Environment (IDE) used by several developers worldwide.

Recently, cybercriminals have been targeting the familiar IDE, Microsoft Visual Studio, with malicious software. This threat, spread by malicious actors, has been detected and is a cause for concern.

This malicious software delivers a cookie stealer capable of stealing sensitive information like browser cookies containing usernames and passwords.

Developers were targeted as they have access to a lot of sensitive information as part of their job, which can be useful for threat actors to access confidential data and spread malware across servers and networks.

Weaponized MS Visual Studio

This malware consists of a filename “VisualStudio[.]exe” and a Visual Studio Folder that contains the Mainproject[.]exe file a.k.a. Information stealing malware. It is a 32-bit GUI-based .NET executable file.

SHA256 hashes:

Visual Studio.exe – 7e8f18c60e35472bf921d3b67fd427933bd150f57d6e83d1472b990a786976db

MainProject.exe – e8a449e692f1b21f1bc4d49d8b27068b03dd7e8df583d429266fdfb261ddeed5

Visual Studio Installer Bundle with Information Stealer Malware

The installation of the VisualStudio[.]exe also simultaneously prompts the installation of Mainproject[.]exe.

If the user permits the Mainproject[.]exe’s installation, the information stealer malware begins to extract information like Machine name, username, processor bit version, operating system version, platform, and IP address.

Once after extraction of system data is done, it proceeds to exfiltrate cookies from browsers like Google Chrome, Firefox, Opera, and Edge.

Furthermore, the cookie stealer targets acquiring the cookies of famous social media platforms and also generates a separate .txt file for these social media credentials.

All this information extracted is stored in the temp folder on the directory where the installation was executed. These data are then transmitted as a .zip file through Telegram designated bot as part of exfiltration.

Exfiltration through Telegram (Source: Cyble)

Once these processes are done, the malware executes the legitimate vs-professional.exe file and deletes the temp folder to hide its track.

Researchers at Cyble have published a complete report about this malware regarding its operation, source code, and other information.

Users of Microsoft Visual Studio (specifically developers) are recommended to take extra precautions when downloading Microsoft Visual Studio from external sites and be vigilant towards this information-stealing malware.

Stay up-to-date with the latest Cyber Security News; follow us on GoogleNewsLinkedinTwitterand Facebook.

Website

Latest articles

HardBit Ransomware Using Passphrase Protection To Evade Detection

In 2022, HardBit Ransomware emerged as version 4.0. Unlike typical ransomware groups, this ransomware...

New Poco RAT Weaponizing 7zip Files Using Google Drive

The hackers weaponize 7zip files to pass through security measures and deliver malware effectively.These...

New ShadowRoot Ransomware Attacking Business Via Weaponized PDF’s

X-Labs identified basic ransomware targeting Turkish businesses, delivered via PDF attachments in suspicious emails...

Hacktivist Groups Preparing for DDoS Attacks Targeting Paris Olympics

Cyble Research & Intelligence Labs (CRIL) researchers have identified a cyber threat targeting the...

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...
Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles