Tuesday, May 28, 2024

Hackers Hijacked Popular Video Editing Software Website to Drop Sophisticated Malware via Download Links

Hackers hijacked the official website of the popular video editing software and replaced the download links, causing the users to download the banking malware.

VSDC is the popular video editing software and the company official website has nearly 1.3 million monthly visits.

Hackers hijacked the download links that causing visitors to download the dangerous banking malware, Win32.Bolik.2, and the Trojan.PWS.Stealer (KPOT stealer) along with the editing software.

According to Doctor Web researchers, one of the VSDC developer’s computer has been compromised, which led to the website hijack. The website found to be compromised between 2019-02-21 and 2019-03-23.

Hackers injected a malicious Javascript in the VSDC website which determines the visitor’s geolocation and replaces the download link for the visitors from the UK, USA, Canada, and Australia.

So users who download the VSDC software from the website will also receive a dangerous banking malware Win32.Bolik.2, which is the predecessor of Win32.Bolik.1. As of now, 565 users have been infected with malware.

The malware is designed to perform the following functions

  • Web injections
  • Traffic intercepts
  • Key-logging
  • Stealing banking credentials

“Additionally, on 22.03.2019 the attackers changed the Win32.Bolik.2 trojan to another malware, a variation of the Trojan.PWS.Stealer, KPOT Stealer. This trojan steals information from browsers, Microsoft accounts, several messengers and some other programs. In just one day it was downloaded by 83 users,” reads Dr.web blog post.

Last year also the companies official website has been compromised and replaced with download links that download AZORult Stealer, X-Key Keylogger and the DarkVNC backdoor.

Doctor Web notified to VSDC and the download links are restored now if you downloaded the software in the period, then you will be affected. Users are recommended to install antivirus Anti-Virus/Malware Software and check their devices for infection.

Indicators of compromise IoCs

Win32.Bolik.2
fbe8f9be579dddd2bcb109ea5107005e7d914c6d: video_converter.exe
f2f2005062f6de7844b05b1d92f2a52cbec01e6a: video_editor_x32.exe
280b3d53ce23ef27f222a979b58bbaf6a25629e9: video_editor_x64.exe
30fa0e961c4c2b43a977eca4639edf058c52a6e6: codec_pack.exe
9c520a412bd3fe627848bc56c1cc7385be35edef: codec_pack.exe
6f681bb7190c6d808e43ab929c3891759b0fe5c9: codec_pack.exe
Trojan.PWS.Stealer.26030
8d1475501dad8a4e82c415c0be1a830ce169cc22: video_converter.exe
8c4f3862d50c3bbfcebd69cabf18086a835d69ca: video_editor_x32.exe
e5b8e3f61ae25fb8cbcefb34e73fe521cc57956b: video_editor_x64.exe
4cb3e80c3e75c76190608944a90e1108293c04ec: codec_pack.exe
Network Indicators
Domains
appnodejs.xyz
sync-time.info
IPs
104.223.76.230
213.252.245.146
213.252.245.229

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated

Also Read:

Ex-CIA Employee Charged for Leaking Powerful CIA Hacking Tools to WiKiLeaks

U.S Identified the Suspect Who Behind the major CIA Hacking Tools Leak and Provide to WikiLeaks

Website

Latest articles

Researchers Exploited Nexus Repository Using Directory Traversal Vulnerability

Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes.The...

DDNS Service In Fortinet Or QNAP Embedded Devices Exposes Sensitive Data, Researchers Warn

Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting...

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS)...

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to...

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles