Thursday, January 30, 2025
HomeCyber AttackThreat Actors Forcing victims Into Entering Login Credentials For Stealing

Threat Actors Forcing victims Into Entering Login Credentials For Stealing

Published on

SIEM as a Service

Follow Us on Google News

Recent intelligence indicates a new technique employed by stealers to trick victims into entering credentials directly into a browser, enabling subsequent theft from the browser’s credential store.

This method, used in conjunction with StealC malware, was first observed in August 2024 and is primarily deployed by Amadey.

The technique involves forcing victims to interact with malicious web content designed to capture credentials, bypassing traditional browser security measures, which presents a significant security risk as it allows for direct access to sensitive information stored within the browser’s credential database.

The provided samples, which are identified by their unique hashes, are examples of malware that have been analyzed using the UnpacMe tool, which likely represent different variants or families of malware, as indicated by their distinct hashes.

UnpacMe is a tool designed to unpack and analyze malware, enabling security researchers to gain insights into their behavior, techniques, and potential targets.

By analyzing these samples, researchers can identify common patterns, trends, and emerging threats within the malware landscape.

The attack involves forcing the victim’s browser into kiosk mode and redirecting it to a login page, which prevents the victim from closing or navigating away, causing frustration and potentially leading to the entry of their credentials.

Once entered, the credentials are stored locally on the device.

Stealer malware, often deployed alongside the credential flusher, can then steal these stored credentials for malicious purposes.

Login page

The attack chain begins with Amadey malware infecting the victim’s device, and then loads StealC and the Credential Flusher from a remote server.

Credential Flusher forces the victim to enter their credentials by launching the browser in kiosk mode, while StealC, in turn, steals these credentials.

The entire process is designed to exploit vulnerabilities in the victim’s system and obtain sensitive information.

Attack Chain

An AutoIt script acts as a credential flusher, which first checks for available browsers on the compromised system, then launches the preferred browser in kiosk mode, restricting user actions, and finally navigates the browser to a predefined website designed to steal credentials.

In the provided example, it directs the user to a Google login page disguised as account settings by tricking the victim into entering their credentials, which a separate malware component can then steal.

According to OALABS Research, the script appears to be a credential stealer, as it first closes any open web browser windows belonging to Chrome, Mozilla Firefox, or Internet Explorer.

Then, it checks for the presence of Microsoft Edge, Google Chrome, or Brave browser and sets the appropriate executable and window class name to launch a new browser window in kiosk mode.

The script opens a URL linked to Google account settings. It continuously monitors the browser window, bringing it to focus if needed by disabling shortcut keys like Escape and F11 to prevent the user from exiting the browser, and potentially steals credentials by tricking the user into entering them on the opened web page.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...