Monday, November 25, 2024
HomeMobile AttacksInvisiMole - A Powerful Spyware Turn On Your Camera & Record Video,...

InvisiMole – A Powerful Spyware Turn On Your Camera & Record Video, Audio, Take Picture

Published on

Newly discovered powerful InvisiMole Spyware attack targeted computer to turn on the video camera and record the videos, audio to hear whatever things happening to surround the victims and take the Picture.

Also, it has the ability to steal the various sensitive information of the victim’s computer by closely monitoring the victims actvities.

InvisiMole is one of the powerful spyware and it actively attacking many victims around the world since 2013 and now it discovered in Ukraine and Russia based targeted users computer.

- Advertisement - SIEM as a Service

It Contains 2 malicious component and both have rich backdoors actvities and it performs to steal and gather information as much as they can from the targeted machine.

Especially it is capable of remotely activating the microphone on the compromised computer and capturing sounds and audio recordings that will be misused by various purposes.

How Does InvisiMole Spyware Works

Initially, InvisiMole Spyware launching through hijacking the DLL(Dynamic-link Library) using the method called DLL Hijacking.

It has both  32-bit and 64-bit versions of the malware and both variant using persistence technique to working with both architectures.

Apart from the DLL Hijacking it using another entry point by exporting the function called GetDataLength which help to launch the payload.

Malware authors cleverly set to zero values PE timestamps manually so the exact time of the compilation is unknown.

Attackers encrypting the strings, internal files, configuration data and network communication to make it more stealthy and maintain the Persistence.

Later the module communicate with its C&C server even if there is a proxy configured on the infected computer and it also has an ability to communicate with C2 server using locally-configured proxies if the connection is unsuccessful.

According to ESET, After successfully registering the victim with the C&C server, additional data are downloaded, which are to be interpreted on the local computer as backdoor commands.

Commands will perform to collect some basic system information and it added the spyware future into the system.

The attack could remotely turn on the system microphone on the compromised computer and capturing sounds.

Also, InvisiMole Spyware can interfere with the victim’s privacy is by taking screenshots using another backdoor commands.

“The malware also monitors all fixed and removable drives mapped on the local system. Whenever a new drive is inserted, it creates a list of all the files on the drive and stores it encrypted in a file.”

All of the collected data can ultimately be sent to the attackers when the appropriate command is issued. ESET said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay

Threat actors are exploiting a new cash-out tactic called "Ghost Tap" to siphon funds...

HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data

The HookBot malware family employs overlay attacks to trick users into revealing sensitive information...

Hardcoded Creds in Popular Apps Put Millions of Android and iOS Users at Risk

Recent analysis has revealed a concerning trend in mobile app security: Many popular apps...