Thursday, March 6, 2025
Homecyber securityNew Malware 'Desert Dexter' Hits Over 900 Victims Worldwide

New Malware ‘Desert Dexter’ Hits Over 900 Victims Worldwide

Published on

SIEM as a Service

Follow Us on Google News

A newly discovered malicious campaign dubbed “Desert Dexter” has infected approximately 900 victims across multiple countries, primarily in the Middle East and North Africa.

The Positive Technologies Expert Security Center (PT ESC) uncovered the operation, which has been active since September 2024.

The threat actors behind Desert Dexter employ a multi-stage attack chain that leverages social media platforms, legitimate file-sharing services, and geopolitical lures to distribute a modified version of the AsyncRAT malware.

The campaign’s sophistication lies in its use of Facebook* advertisements and Telegram channels masquerading as reputable news agencies to disseminate malicious content.

Desert Dexte
Map of detected ad posts

Innovative Tactics and Technical Details

The initial infection vector involves enticing victims to download RAR archives containing malicious scripts from either files.fm or specially created Telegram channels.

Desert Dexte
Message containing a malicious archive in a Telegram channel

These scripts, written in various languages including JavaScript, batch, and PowerShell, work in concert to execute the final payload a customized AsyncRAT variant.

This modified AsyncRAT incorporates several notable features:

  1. A custom reflective loader written in C# for injecting the malware into legitimate Windows processes.
  2. An offline keylogger that logs keystrokes and active process names to a temporary file.
  3. An enhanced IdSender module capable of detecting cryptocurrency wallet extensions and applications.

The malware establishes persistence by manipulating Windows registry run keys and employs DDNS domains resolving to VPN service IP addresses for command and control communication.

Geopolitical Context and Victim Profile

According tot the Report, Desert Dexter’s campaign exploits the volatile political climate in the targeted regions, using alleged leaks of confidential data as bait.

The majority of victims appear to be ordinary users, though some infections have been detected in critical sectors such as oil production, construction, and information technology.

The threat actors’ focus on cryptocurrency-related data suggests financial motivation, although the true extent of their objectives remains unclear.

As geopolitical tensions continue to fuel cyber operations in the Middle East and North Africa, Desert Dexter serves as a stark reminder of the evolving threat landscape in these regions.

Security researchers continue to monitor Desert Dexter’s activities, emphasizing the need for heightened cybersecurity awareness and robust defense measures against such sophisticated social engineering tactics and malware deployment strategies.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Sitecore Zero-Day Flaw Allows Remote Code Execution

A critical zero-day vulnerability in Sitecore’s enterprise content management system (CMS) has been uncovered,...

Apache Airflow Misconfigurations Leak Login Credentials to Hackers

A recent investigation into misconfigured Apache Airflow instances has uncovered critical vulnerabilities exposing login...

Two Cybercriminals Arrested for ATM Jackpotting Scheme

Federal authorities have unveiled details of a sophisticated cybercrime operation targeting financial institutions across...

Black Basta’s Notorious Tactics and Techniques Exposed in Leaked Intel

A significant leak of internal chat logs from the Black Basta ransomware group has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Sitecore Zero-Day Flaw Allows Remote Code Execution

A critical zero-day vulnerability in Sitecore’s enterprise content management system (CMS) has been uncovered,...

Apache Airflow Misconfigurations Leak Login Credentials to Hackers

A recent investigation into misconfigured Apache Airflow instances has uncovered critical vulnerabilities exposing login...

Two Cybercriminals Arrested for ATM Jackpotting Scheme

Federal authorities have unveiled details of a sophisticated cybercrime operation targeting financial institutions across...