Thursday, October 3, 2024
HomeSecurity NewsNew Malware Campaign Trick Victims as an Adobe Flash Player Installers

New Malware Campaign Trick Victims as an Adobe Flash Player Installers

Published on

Security researchers from ESET identified the sophisticated hacker group Turla added new malware to its arsenal. It attempts victims to install the backdoor via fake Flash installers.

The campaign is primarily targetting embassies and consulates in the post-Soviet states. Turla cyberespionage group using this attack method starting from July 2016, the new tool have same similarities associated with the previous malware distributed by the group.

Not only does the gang now bundle its backdoors together with a legitimate Flash Player installer but, compounding things further, it ensures that URLs and the IP addresses it uses appear to correspond to Adobe’s legitimate infrastructure.ESET said.

Possible attack vector will be the Man-in-the-Middle (MitM), attackers might compromise the companies network gateway to intercept and redirect the traffic of the targeted machine to a compromised machine.

- Advertisement - EHA

Also Read 36 Malicious Android Apps Removed From Google Play Store that Mimics as Famous Security Tools

Attackers may intercept the traffic at the ISP level which is evident with FinFisher Spyware, attackers could use Border Gateway Protocol (BGP) hijack to re-route the traffic to a server controlled by Turla.

If victim download and launches the flash player it drops the backdoor possibly Mosquito, a piece of JavaScript to communicate web app hosted to exfiltrate the user’s sensitive data including the unique ID of the compromised machine, the username, and the list of security products installed on the device.

A recent version of Mosquito are highly obfuscated which makes the analysis job difficult, to maintain access the installer tampers registry and also creates an remote access for RDP connection.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Northern Ireland Police to Pay £750,000 Fine Following Data Breach

The Police Service of Northern Ireland (PSNI) has been ordered to pay a £750,000...

ANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats

ANY.RUN announced an upgrade to its Threat Intelligence Portal, enhancing its capabilities to identify...

Cisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems

A critical vulnerability has been discovered in Cisco's Nexus Dashboard Fabric Controller (NDFC), potentially...

Hackers Now Exploit Ivanti Endpoint Manager Vulnerability to Launch Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...