Tuesday, April 8, 2025
HomeMalwareHackers Launch Olympic Destroyer Malware to Attack Financial Organizations using Obfuscated Scripts...

Hackers Launch Olympic Destroyer Malware to Attack Financial Organizations using Obfuscated Scripts to Evade Detection

Published on

SIEM as a Service

Follow Us on Google News

Olympic Destroyer Malware raised again through weaponized documents and currently targeting various Financial Organization with upgraded capabilities and evade the detection of flying under the radar.

Olympic Destroyer is a self-replicating and self-modifying destructive network worm that spreads to reconnaissance and infiltration into target networks.

Few months before Lazarus Hacking Group actively spreading Olympic Destroyer malware which was targetted Olympics website and took down the IT systems.

- Advertisement - Google News

Its current attack is focusing on Financial organizations in Russia and biological and chemical threat prevention laboratories in Europe and Ukraine.

Researchers believe that Lazarus APT that behind the Olympic Destroyer malware to be associated with North Korea.

It also spreading with sophisticated technique and they continue to use a non-binary executable infection vector and obfuscated scripts to evade detection.

Based on several target profiles and limited victim reports, researchers believe that the recent operation by Olympic Destroyer targets Russia, Ukraine, and several other European countries.

Olympic Destroyer Malware Infection Process

Olympic Destroyer using different technologies and very complex infection process with various scripts such as mixing VBA code, MS HTA, and more Powershell inside of the JScript.

Initially distributed through office document and it is heavily obfusticated, that contain embedded VBA macro which helps to execute the Powershell command.

Later it started the new obfuscated Powershell scriptlet via the command line which is used to rearranging the original code and protect all commands and strings such as the command and control (C2) server address.

                   Obfuscated command line Powershell scriptlet

Also, Attacker using some script that helps to disable Powershell script logging to avoid leaving traces. and second stages of the Payload also execute the another PowerShell script.

After the deobfuscation, it downloads the next stage payload from the same server address and the final payload is the Powershell Empire agent.

According to Kaspersky. Powershell Empire is free to post exploitation tool and its open-source framework written in Python and Powershell that allows fileless control of the compromised hosts, has a modular architecture and relies on encrypted communication.

This framework is widely used by penetration-testing companies in legitimate security tests for lateral movement and information gathering.

Also, Olympic Destroyer malware handled by an attacker using compromised web server to hosting and controlling malware.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Microsoft April 2025 Patch Tuesday: Fixing 121 Vulnerabilities, Including a Critical Zero-Day

Microsoft has rolled out its April 2025 Patch Tuesday update, addressing 121 security vulnerabilities...

Hackers Conceal NFC Carders Behind Apple Pay and Google Wallet

In a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit...

Shopware Security Plugin Vulnerability Enables SQL Injection Attacks

A recently disclosed SQL injection vulnerability in older versions of the Shopware platform has...

Attackers Exploit SourceForge Platform to Distribute Malware

A recent malware distribution scheme has been uncovered on SourceForge, the popular software hosting...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Attackers Exploit SourceForge Platform to Distribute Malware

A recent malware distribution scheme has been uncovered on SourceForge, the popular software hosting...

Vidar Stealer Uses New Deception Technique to Hijack Browser Cookies and Stored Credentials

Vidar Stealer a notorious information-stealing malware has adopted a deceptive method to disguise itself...

Threat Actors Use VPS Hosting Providers to Deliver Malware and Evade Detection

Cybercriminals are intensifying phishing campaigns to spread the Grandoreiro banking trojan, targeting users primarily...