Thursday, July 18, 2024

New Krampus-3PC Malware Attacks iPhone Users to Steal Cookies and Redirects to Malicious Websites

A new malware campaign dubbed Krampus-3PC targets iPhone users has impacted more than 100 UK news publisher and magazine websites. The users who visited those infected publication websites are redirected to fake grocery ads page.

The malware campaigns mount up at the time of the busiest shopping season and the campaign primarily targets the iPhone users and tries to exfiltrate a huge amount of user data.

Krampus-3PC Malware Campaign

It is a unique malware and it employes a multi-stage redirect mechanism and two obfuscation methods to evade detection. One method is to redirect the user to a malicious website and the backup method to ensure the user redirected to a fraudulent popup mimic grocery store.

Also, the malware steals user-session information including cookies, country, tag, Sandbox presence, Webpage’s local storage data and Adtechstack banner data.

The Media Trust’s Digital Security & Operations (DSO) observed the malicious operation starting from October redirecting online readers of UK publications to a fake grocery gift card.

Krampus-3PC malware
Fake gift card message

Two Phases of Checks

The malware was designed two conduct two phases of checks, at the first stage once the reader reaches the publication website it checks that the ad was hosted by Adtechstack and the ad was running on a targeted publisher.

In phase two it checks the user device was an iPhone “by finding out if the graphic reader vendor was “Apple” and the font style within the browser “style weight small caps”.

Krampus-3PC malware

If the malware detects the user device is iPhone then send the user data to the C&C server and executes a payload URL that hijacks the address and redirects users to phony reward popup, if the redirection fails then it loads the phony reward popup by opening a new tab.

Media Trust’s Digital Security & Operations (DSO) not provided any details about the affected published of the attack.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates


Latest articles

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...

Cybercriminals Exploit Attack on Donald Trump for Crypto Scams

Researchers at Bitdefender Labs remain ever-vigilant, informing users about the latest scams and internet...

New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites

HTTP Request Smuggling is a flaw in web security that is derived from variations...

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware

The Volcano Demon group has been discovered spreading a new ransomware called LukaLocker, which...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles