A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the DeepSeek LLM and popular remote desktop applications to distribute the Trojan-Downloader.Win32.TookPS malware.
The attackers targeted both individual users and organizations by disguising malicious software as legitimate business tools, including UltraViewer, AutoCAD, and SketchUp.
The TookPS malware campaign begins with fraudulent websites mimicking official download pages for widely used software.
These sites lure victims into downloading compromised files, such as “Ableton.exe” or “QuickenApp.exe,” which are disguised as legitimate applications.
Once installed, the TookPS downloader initiates communication with a command-and-control (C2) server embedded in its code.
This server delivers a series of PowerShell commands designed to download additional malicious payloads.
The infection chain involves three key stages:
By exploiting these tools, attackers gain full control over infected systems, allowing them to execute arbitrary commands and siphon sensitive data.
The campaign’s success lies in its use of well-known software as bait.
Applications like UltraViewer (a remote desktop tool), AutoCAD (a 3D modeling software), and SketchUp were among the primary targets due to their widespread use in business environments.
According to the Report, this tactic increases the likelihood of victims downloading the malware from seemingly legitimate sources.
Moreover, attackers registered domains resembling official websites, such as “ultraviewer[.]icu” and “autocad-cracked[.]com.”
These domains were hosted on IP addresses linked to other malicious activities dating back to early 2024, suggesting a well-organized operation.
The TookPS malware employs advanced techniques to evade detection and maintain persistence:
These methods allow the attackers to operate undetected for extended periods, posing significant risks to both individual users and enterprises.
This campaign highlights the growing sophistication of cybercriminals in targeting critical business tools.
By exploiting trusted applications and leveraging advanced malware delivery techniques, attackers can infiltrate networks with devastating consequences.
To mitigate such threats, users are advised to:
Organizations should also enforce strict policies against unauthorized software installations and implement robust endpoint protection systems capable of identifying anomalous behavior.
The TookPS campaign serves as a stark reminder of the evolving tactics used by cybercriminals to exploit vulnerabilities in today’s digital landscape.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…
Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…
Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…
Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…
Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…