Wednesday, January 22, 2025
HomeComputer SecurityLoki Bot Malware Stealing Corporate Passwords From Browsers, Messaging Applications, Mail &...

Loki Bot Malware Stealing Corporate Passwords From Browsers, Messaging Applications, Mail & FTP Clients

Published on

SIEM as a Service

Follow Us on Google News

Newly discovered Loki Bot Malware spreading as a .iso extension that targets Corporate network and applications to steal passwords from Browsers, Messaging Applications, Mail & FTP Clients.

Recently it was observed by Kaspersky researchers that the malware mainly targeting corporate networks around the world and gain a large amount of sensitive information.

Loki Bot Malware also capable of stealing cryptocurrency wallets and share the stolen data into attacker via its Command & Control server.

Hackers using Email as a primary malware distribution medium that contains an attachment with a .iso extension.

ISO images are copies of optical discs that can be mounted in a virtual CD/DVD drive to be used in the same way as the originals.

We need to access the dedicated software in order to open the IOS files and user needs to double-click the file to open it. So attacker using this function to delivering malware

Malspam Email with Loki Bot Malware

Email sending to corporate Email ID’s that were collected by cybercriminals from Publically available data or from the companies own websites.

Spam Emails contain some of the fake notification that indicates the mail coming from well-known companies which is one of the popular tricks that mostly used by Malicious hackers.

Another method is criminals sending weaponized financial documents such as invoices, transfers, and payments.

Also, attackers use to send fake ordering forms such as posing as customers placing an order, or the vendor offering their goods or services.

According to Kaspersky observation Every year there is an increase in spam attacks on the corporate sector. The perpetrators have used phishing and malicious spam, including forged business emails, in their pursuit of confidential corporate information: intellectual property, authentication data, databases, bank accounts, etc.

Spam continues to be a top attack vector used by cybercriminals for decades. Spam click rates increased in 2018, so far 14.2 percent of spam that delivered in the inbox are clicked, whereas in 2017 the click rate is 13.4%.

How to stay safe

1. Have a unique Email address.
2. Do not open any attachments without proper validation.
3. Don’t open emails voluntary emails.
4. Use Spam filters & Antispam gateways.
5. Never respond to any spam emails.

Also Read

Beware!! 230 Million Necurs Botnet Sending as Valentine’s Day Dating Spam Messages With Malware

Spam Remains as the Popular Infection Method To Cyber Criminals For More than 40 Years

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Three New ICS Advisories Released by CISA Detailing Vulnerabilities & Mitigations

The Cybersecurity and Infrastructure Security Agency (CISA) announced three new Industrial Control Systems (ICS)...

Security Researchers Discover Critical RCE Vulnerability, Earn $40,000 Bounty

Cybersecurity researchers Abdullah Nawaf and Orwa Atyat, successfully escalated a limited path traversal vulnerability...

IBM i Access Client Solutions Might Be Leaking Your Passwords

A potential security flaw in IBM i Access Client Solutions (ACS) has raised serious...

Weaponized VS Code Impersonate Zoom App Steals Cookies From Chrome

A newly identified extension for Visual Studio Code (VS Code) has been found to...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers.By leveraging...

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking...