Tuesday, February 27, 2024

New Terdot Malware operate as a MITM Proxy & Take over FB and Twitter by Steal Browsing Information

Highly sophisticated and customised Terdot Malware Discovered that has been developed by inspiration of wide spreaded Dangerous Zeus Banking Malware.

Terdot considering as very stealthy Malware that has an ability to steal the Browsing information such as login credentials and stored credit card information, as well as inject HTML code in visited Web pages and also it operates a MiTM Proxy.

unlike other Banking Trojan, it also having the eavesdropping capability and using this technique, it can able to modifying the traffic on most social media and email platforms also it can download and execute any files when requested by its operator using automatic updating capability.

The banking malware mostly targeted Canada the United States, the United Kingdom, Germany, and Australia countries and attacking the organization such as PCFinancial, Desjardins, BMO, Royal Bank, the Toronto Dominion Bank, Banque Nationale, Scotiabank, CIBC and Tangerine Bank.

Terdot targeted social networks inclide Facebook, Twitter, Google Plus and YouTube. Interestingly, the malware is specifically instructed not to gather any data from vk.com, Russia’s largest social media platform.

Also Read: Hidden Cryptocurrency Miner Coinhive’s Rapid Growth and it’s Prevention Techniques

How Does this Terdot Malware Spreading

InitiallyTerdot Banking malware spreading via Email that contains a button with the PDF icon on it.

PDF icon contains an obfuscated javascript embedded with it.once victim clicks the icon then it will get executed and later it will download and run the malware.

Another primary infection vector Sundown Exploit Kit also apparently delivering the Terdot family.

Terdot Delivering the payload with complex chain dropper to protect it to evade the detection until complete Terdot files and third-party utilities are downloaded on the disk that is completely encrypted.

Infection Chain

According to Bitdefender, To read browser traffic, Terdot injects itself into browser processes, where it hooks very low-level network socket operations to direct all connections to its own local proxy server. This server inspects the traffic, forwards the request to the intended target, receives the response, then it sends it back to the victim’s browser, possibly altering it in the process.

It uses two ways to Steal the data.one is by inspecting the client request or injecting the javascript spyware code, the second one is collecting logs from relevant data in HTTP requests and uploads them periodically to the C&C servers.

Terdot is a complex malware, building upon the legacy of ZeuS. Its modular structure, complex injections and careful use of threads make it resilient, while its spyware and remote execution abilities make it extremely intrusive Bitdefender said.


Latest articles

ThreatHunter.ai Stops Hundreds of Attacks in 48 Hours: Fighting Ransomware and Nation-State Cyber Threats

The current large surge in cyber threats has left many organizations grappling for security...

WordPress Plugin Flaw Exposes 200,000+ Websites for Hacking

A critical security flaw has been identified in the Ultimate Member plugin for WordPress,...

Hackers Actively Hijacking ConnectWise ScreenConnect server

ConnectWise, a prominent software company, issued an urgent security bulletin on February 19, 2024,...

Heavily Obfuscated PIKABOT Evades EDR Protection

PIKABOT is a polymorphic malware that constantly modifies its code, making it hard to...

Anonymous Sudan Promoting New DDoS Botnet: Beware

It has come to light that a group known as Anonymous Sudan is actively...

Scattered Spider: Advanced Techniques for Launching High-Profile Attacks

Scattered Spider is a threat group responsible for attacking several organizations since May 2022...

8220 Hacker Group Attacking Linux & Windows Users to Mine Crypto

In a significant escalation of cyber threats, the 8220 Gang, a notorious Chinese-based hacker group, has intensified its attacks...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles