Hackers abuses cloud hosting services to distribute Stealer Malware by mixing it up with good ones to prevent the malware from getting blacklisted.
Researchers from Zscaler ThreatLabZ observed a popular hosting provider serving the domain used in phishing and malware attacks in wild.
Researchers found the domain http[:]//flexsell[.]ca which is hosted on IP 64[.]34[.]67[.]205 distributes weaponized word documents that contains a payload capable of stealing cryptocurrency wallet information.
The Stealer Malware particularly targeting the following cryptocurrency wallets Bitcoin, Electrum, and Monero.
The weaponized word documents contain an obfuscated malicious macro which will be executed once the documents are opened and initiate the HTTP request to download the Stealer Malware without user consent.
The malware package is custom packed and hardcore, it decrypts on runtime, upon execution it collects the details such as machine ID, EXE_PATH, Windows, computer (username), screen, layouts, local time, and CPU model form the system and submit to C&C server.
Its communication with C&C server is hardcoded, on the infected machine malware searches for default location was digital wallet stored, browser cookies and login details of popular applications like Pidgin, WinSCP, and Psi+.
With another campaign the attackers abused the hosting services for hosting the phishing pages, attackers targeted Microsoft and DocuSign with the phishing attack.
Phishing is a fraud mechanism used to obtain sensitive data such as usernames, password, and credit card details to carry out various malicious activities.
Zscaler published the blog post contains’ complete IoC and URL’s used by attacker’s to deliver malware.
Android Device With Open ADB Ports Exploited to Spread Satori Variant of Mirai Botnet
Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption…
Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in cyber…
In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices…
Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and…
Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell…
Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in…