Monday, July 15, 2024

New Variant of Dangerous Kronos Banking Malware Spreading via Malicious Word Documents

A new variant of Kronos Banking Trojan appeared in wild targeting users in Germany, Japan, and Poland. The trojan first appeared in 2014 and disappeared after a few years.

With the new variant of Kronos Banking Trojan, it uses the Tor anonymizing network for establishing communication with the command and control server.

Security researchers from Proofpoint spotted three campaigns targeting German, Japanese, and Polish users. The fourth campaign in progress and being tested.

Kronos Banking Trojan Campaigns

The first campaign observed on June 27, 2018, targeting German users with malicious Word documents contained macro posing it to be from German financial institutions.

Kronos Banking Trojan

The second campaign on July 13, 2018, targeting Japan users, the malvertising campaign sends victims to the page contains malicious javascript, which redirects the users to download the malware.

The third campaign observed on July 15, 2018, targeting Poland users with malicious Word documents with the fake invoices, such as “Faktura 2018.07.16” and the document uses Microsoft Office Memory Corruption Vulnerability (CVE-2017-11882) to download and execute Kronos.

Research spotted the fourth campaign On July 20, 2018, appeared to be a work in progress and still in the testing phase.

Kronos Banking Trojan Functions

The banking Trojan uses man-in-the-browser techniques to inject and modify the web pages of financial institutions to steal credentials, account information, other user information, and money through fraudulent transactions. It also has keylogging and hidden VNC as an added functionality.

With the 2018 version it shares the same similarities with the older versions, the only major change is the C&C URLs anonymized with TOR network.

The new version of Kronos banking trojan observed to have the similar features of new banking Trojan called “Osiris” that advertised on an underground hacking forum.

“Kronos Banking Trojan reappearance is fairly high-profile banking Trojan, Kronos, is consistent with the increased prevalence of bankers across the threat landscape.” researchers said.

Also Read

Beware !! Hackers Deliver FlawedAmmyy RAT via Weaponized Microsoft Word and PDF Documents

US-CERT Alerts Powerful Emotet Banking Malware Attack on Government, Private and Public Sectors

Dangerous macOS Backdoor That Steals User Login Credentials Remained Undetected for Years


Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles