Friday, February 7, 2025
HomeMobile AttacksInvisiMole - A Powerful Spyware Turn On Your Camera & Record Video,...

InvisiMole – A Powerful Spyware Turn On Your Camera & Record Video, Audio, Take Picture

Published on

SIEM as a Service

Follow Us on Google News

Newly discovered powerful InvisiMole Spyware attack targeted computer to turn on the video camera and record the videos, audio to hear whatever things happening to surround the victims and take the Picture.

Also, it has the ability to steal the various sensitive information of the victim’s computer by closely monitoring the victims actvities.

InvisiMole is one of the powerful spyware and it actively attacking many victims around the world since 2013 and now it discovered in Ukraine and Russia based targeted users computer.

It Contains 2 malicious component and both have rich backdoors actvities and it performs to steal and gather information as much as they can from the targeted machine.

Especially it is capable of remotely activating the microphone on the compromised computer and capturing sounds and audio recordings that will be misused by various purposes.

How Does InvisiMole Spyware Works

Initially, InvisiMole Spyware launching through hijacking the DLL(Dynamic-link Library) using the method called DLL Hijacking.

It has both  32-bit and 64-bit versions of the malware and both variant using persistence technique to working with both architectures.

Apart from the DLL Hijacking it using another entry point by exporting the function called GetDataLength which help to launch the payload.

Malware authors cleverly set to zero values PE timestamps manually so the exact time of the compilation is unknown.

Attackers encrypting the strings, internal files, configuration data and network communication to make it more stealthy and maintain the Persistence.

Later the module communicate with its C&C server even if there is a proxy configured on the infected computer and it also has an ability to communicate with C2 server using locally-configured proxies if the connection is unsuccessful.

According to ESET, After successfully registering the victim with the C&C server, additional data are downloaded, which are to be interpreted on the local computer as backdoor commands.

Commands will perform to collect some basic system information and it added the spyware future into the system.

The attack could remotely turn on the system microphone on the compromised computer and capturing sounds.

Also, InvisiMole Spyware can interfere with the victim’s privacy is by taking screenshots using another backdoor commands.

“The malware also monitors all fixed and removable drives mapped on the local system. Whenever a new drive is inserted, it creates a list of all the files on the drive and stores it encrypted in a file.”

All of the collected data can ultimately be sent to the attackers when the appropriate command is issued. ESET said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption

DeepSeek iOS app—a highly popular AI assistant recently crowned as the top iOS app...

Critical Flaws in HPE Aruba ClearPass Expose Systems to Arbitrary Code Execution

Hewlett Packard Enterprise (HPE) has issued a high-priority security bulletin addressing multiple vulnerabilities in...

Splunk Introduces “DECEIVE” an AI-Powered Honeypot to Track Cyber Threats

Splunk has unveiled DECEIVE (DECeption with Evaluative Integrated Validation Engine), an innovative, AI-augmented honeypot that mimics...

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Released Secure Mobile Communication Best Practices – 2025

The Cybersecurity and Infrastructure Security Agency (CISA) has released new best practice guidance to...

Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay

Threat actors are exploiting a new cash-out tactic called "Ghost Tap" to siphon funds...

HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data

The HookBot malware family employs overlay attacks to trick users into revealing sensitive information...