Subscribe to Updates

    Get the latest creative news from CRYPTO NOUNCE.

    What's Hot

    Factbox-How U.S. electric vehicle subsidy rules impact Europe By Reuters

    March 30, 2023

    CytomX Therapeutics, Inc. (NASDAQ:CTMX) Forecasted to Post FY2024 Earnings of ($0.64) Per Share

    March 30, 2023

    After bootstrapping for 15 years, energy renovation company Effy raises $22 million

    March 30, 2023
    Facebook Twitter Instagram
    Facebook Twitter Instagram Vimeo
    Cryptonounce.com
    Contact
    • Business
      • Deals
      • investors
      • IPO
      • Startups
      • Wall Street
    • Markets
      • Bonds
      • Commodities & Futures
      • Currencies
      • Funds & ETFs
      • Stocks
    • Crypto
      • Alticoins News
      • Binance News
      • Bitcoins News
      • Blockchain News
      • Ethereum News
      • Token Sales News
      • XRP News
    • Technology
      • Artificial Intelligence
      • Big Data
      • Cloud Computing
      • Cybersecurity
      • Gaming
      • Internet of Things
      • Mobile
      • Social Media
      • Transportation
      • VR & AR
    • FinTech
    • Personal finance
    • Grides
      • Crypto
      • FinTech
      • Investing
      • Personal Finance Guides
      • Techonology
    • Tools
      • Coins
      • ICO List
      • Organigations
      • Events
    Cryptonounce.com
    Home » From Phishing Emails to Social Media
    Cybersecurity

    From Phishing Emails to Social Media

    AdmincryptBy AdmincryptJanuary 5, 2023No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Jan 05, 2023Ravie LakshmananData Security / Malware

    Phishing Emails to Social Media

    The notorious information-stealer known as Vidar is continuing to leverage popular social media services such as TikTok, Telegram, Steam, and Mastodon as an intermediate command-and-control (C2) server.

    “When a user creates an account on an online platform, a unique account page that can be accessed by anyone is generated,” AhnLab Security Emergency Response Center (ASEC) disclosed in a technical analysis published late last month. “Threat actors write identifying characters and the C2 address in parts of this page.”

    In other words, the technique relies on actor-controlled throwaway accounts created on social media to retrieve the C2 address.

    An advantage to this approach is that should the C2 server be taken down or blocked, the adversary can trivially get around the restrictions by setting up a new server and editing the account pages to allow the previously distributed malware to communicate with the server.

    Vidar, first identified in 2018, is a commercial off-the-shelf malware that’s capable of harvesting a wide range of information from compromised hosts. It typically relies on delivery mechanisms like phishing emails and cracked software for propagation.

    “After information collection is complete, the extorted information is compressed into a ZIP file, encoded in Base64, and transmitted to the C2 server,” ASEC researchers said.

    What’s new in the latest version of the malware (version 56.1) is that the gathered data is encoded prior to exfiltration, a change from the previous variants that have been known to send the compressed file data in plaintext format.

    Vidar

    “As Vidar uses famous platforms as the intermediary C2, it has a long lifespan,” the researchers said. “A threat actor’s account created six months ago is still being maintained and continuously updated.”

    The development comes amid recent findings that the malware is being distributed using a variety of methods, including malicious Google Ads and a malware loader dubbed Bumblebee, the latter of which is attributed to a threat actor tracked as Exotic Lily and Projector Libra.

    Risk consulting firm Kroll, in an analysis published last month, said it discovered an ad for the GIMP open source image editor that, when clicked from the Google search result, redirected the victim to a typosquatted domain hosting the Vidar malware.

    If anything, the evolution of malware delivery methods in the threat landscape is in part a response to Microsoft’s decision to block macros by default in Office files downloaded from the internet since July 2022.

    This has led to an increase in the abuse of alternative file formats like ISO, VHD, SVG, and XLL in email attachments to bypass Mark of the Web (MotW) protections and evade anti-malware scanning measures.

    “Disk image files can bypass the MotW feature because when the files inside them are extracted or mounted, MotW is not inherited to the files,” ASEC researchers said, detailing a Qakbot campaign that leverages a combination of HTML smuggling and VHD file to launch the malware.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleRipple Denies Allegations As SEC Case Sees New FIlings
    Next Article CircleCI Urges Customers to Rotate Secrets Following Security Incident
    Admincrypt
    • Website

    Related Posts

    Spyware Vendors Caught Exploiting Zero-Day Vulnerabilities on Android and iOS Devices

    March 29, 2023

    Researchers Uncover New Linux Malware Linked to Chinese APT Groups

    March 29, 2023

    Smart Mobility has a Blindspot When it Comes to API Security

    March 29, 2023

    How to Build a Research Lab for Reverse Engineering — 4 Ways

    March 29, 2023

    Leave A Reply Cancel Reply

    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Stocks

    Factbox-How U.S. electric vehicle subsidy rules impact Europe By Reuters

    By AdmincryptMarch 30, 20230

    © Reuters. FILE PHOTO: A Volkswagen ID.4 electric vehicle (EV) charges at an EV charging…

    CytomX Therapeutics, Inc. (NASDAQ:CTMX) Forecasted to Post FY2024 Earnings of ($0.64) Per Share

    March 30, 2023

    After bootstrapping for 15 years, energy renovation company Effy raises $22 million

    March 30, 2023

    Volvo Group implements a new IoT network to make factories smarter

    March 30, 2023

    Subscribe to Updates

    Get the latest creative news from CRYPTO NOUNCE.

    NEWS
    • Business
    • Crypto
    • Blockchain
    • Markets
    • Technology
    FEATURED SECTIONS
    • Coins
    • ICO List
    • Organigations
    • Events
    • Grides
    FEATURED LINKS
    • Story of the day
    • Videos
    • Infographics
    CONNECT WITH US
    • Facebook
    • Twitter
    • Telegram
    • LinkedIn
    • Pinterest
    ABOUT US
    • Contact
    • Advertise
    • Sitemap
    Copyright © 2023 Cryptonounce All rights reserved. Cryptonounce.
    • Home
    • Buy Now

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login to your account below.

    Lost password?