BBC Data Breach Exposes Sensitive Information of Employees
May 31, 2024Multiple IBM Aspera Console Vulnerabilities
May 31, 2024BBC Data Breach Exposes Sensitive Information of Employees
May 31, 2024Multiple IBM Aspera Console Vulnerabilities
May 31, 2024Severity
High
Analysis Summary
Cybercriminals are using Microsoft Office crack versions that are advertised on pirate sites to spread a concoction of malware, including remote access trojans (RATs), cryptocurrency miners, malware downloaders, proxy tools, and anti-AV software.
The campaign is still going strong, and the researchers alert users to the dangers of installing software that has been pirated. The threat actors employ a variety of enticements, such as Windows, Microsoft Office, and the widely used Hangul word processor in Korea.
With its well-designed UI, the cracked Microsoft Office installer allows users to choose between 32 and 64-bit versions, languages, and installation versions. Nevertheless, the installer executes a covert .NET malware in the background that connects to a Mastodon or Telegram channel to obtain a legitimate download URL so it may obtain further files.
The URL leads to either GitHub or Google Drive, which are both trustworthy websites that are unlikely to cause antivirus alerts. The PowerShell commands included in the base64 payloads uploaded on such platforms introduce a variety of malware strains to the system, which may be extracted using 7Zip.
To make sure a process continues in between system reboots, the malware component "Updater" registers it in the Windows process Scheduler. As per researchers, the compromised system has the following kinds of malware installed on it:
- Orcus RAT: It has complete remote control capabilities, such as keylogging, webcam access, screen capture, and system modification for data exfiltration.
- XMRig: A cryptocurrency miner that mines Monero using system resources. To prevent discovery, it stops mining when the victim is using a lot of resources, as while they are gaming.
- 3Proxy: Enables attackers to redirect malicious data by opening port 3306 and injecting it into legitimate processes, turning compromised systems into proxy servers.
- PureCrypter: Ensures that the system is always infected with the newest threats by downloading and executing extra malicious payloads from outside sources.
- AntiAV: By altering its configuration files, AntiAV interferes with and disables security software, making it inoperable and leaving the system open to attack from other components.
The 'Updater' module, which runs when the system boots up, will reintroduce the malware even if the user finds and deletes any of them. Users should generally stay away from pirated or cracked software and use caution when installing files they download from questionable sources.
The STOP ransomware, which is currently the most active ransomware operation targeting consumers, has been distributed using similar operations. These files are frequently used to infect systems with malware—in this example, a whole set—because they are not digitally signed and users are willing to disregard antivirus warnings when launching them.
Impact
- Cryptocurrency Theft
- Security Bypass
- Unauthorized Remote Access
- Keylogging
Indicators of Compromise
Domain Name
- minecraftrpgserver.com
MD5
- 77a5bd4e03fc9a653b4e8c33996d19a0
- 3a4d761de4fac0c2e47a5c84fca78c0f
- 5dd8cdd4e80185b60d43511987b254cd
- 6a648b7d0e4ae16f6beb170decd5b0b6
- 08299a45472f501644b4daa458336428
- 27623130a8e8b792fc99cbdcecee3177
- abdbfe7b8f4976935b87a0a0e67d1da0
- 151cd4702bc15421c24fd5930f119a48
- d00feba624fa6fdcbad1b1219f3f2da7
- f836a133490929ea0185d50e10bd11c0
SHA-256
- f417007224bc2b16cc208eb26c1543340529a00ac8c919582eccd7d60a235243
- 316103a71d0ca556f00ff23f4ba996d2564dceccb88a2217fe1cc742123001d3
- 1fc77b5aeb891d6fd9803fda5d20abc2f49835ae2daacf9f572559cd3941cbf5
- f8793917d4d58470b6f9bb1714f4f3fba2c1fc188e97f416ab91ef6edcf07794
- 312bdf1b97977a73f7f3ef48de2842beb505a18fac689a8fee473d94b42e5642
- 507e49380dac7669eb09aabbcb9f3360bebf5cf42c6c89076a6eda7d32384a50
- 5e51e62c21052b2453d01a339f9e5acd499b1d8bac6d62d44b54aa7313882b69
- dc1d5aefdad703bcc127f2f1eda4f4b11a98dbdde5290b081e1ec571035130ee
- 8d08c6e09e94608170e93259d02d1bf7102b0768bbd0507c66c276836e0262a2
- 5de473a10f6135de47080270e218e12a1ea276f15483ffcfe55da55019417e99
SHA1
- e8ce97553a6ab2ca5a8d0cef7ce92ea750433b38
- f15565e83a98e03c4f04e46aabb623969a0d6cf3
- 18dcfc11e09536a679b5a2c9d8025b01c9c6e3e2
- c9ba7c12b64ebf37817293ae00244016ad9fe925
- 48ab4c7b12c493a023274dc0fdf9b02b1a18533a
- 750173f22c4512411df668fcce8280ae25912a9b
- aae3054a7b7164ad15e457ee86a3fe5c1ee97545
- 57beeec785c4e6a5ec6d1c00bbcfb2044f0a5d57
- e9b40193e94e01f4f3efe3ad746cdeb9a4c0b075
- a4982d8ac66cbb581a9ec9215c797887c930a873
URL
- https://t.me/dRidulEDhRQYNREkN
- https://t.me/IXvMGsiyPuHoPSSiD
- https://mastodon.social/@dRidulEDhRQYNREkN
- https://drive.usercontent.google.com/download?id=1kFPqJkzWKIIQzC3b0b6nunctXKHPeJNi&export=download
- https://drive.usercontent.google.com/download?id=1SFoSCa4PhCsR7ACj8HUIfrU7L1i8YwiR&export=download
- https://gist.github.com/thamanarya/6510d9e6b96adfea6b9422a3fd22ef82/raw/Power
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Be vigilant when downloading software and double-check the URL to see if it is legitimate.
- Never download software from untrusted sources.
- Download apps only from official app stores like Google Play Store or Apple App Store. Avoid downloading apps from third-party websites or unofficial sources.
- Review the permissions requested by apps before installing them. Be cautious of apps that request unnecessary permissions or access to sensitive data.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Keep your operating system and apps up-to-date with the latest security patches and updates.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Be cautious of unsolicited messages, emails, or links, especially from unknown or suspicious sources. Avoid clicking on suspicious links or downloading attachments from untrusted sources.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Regularly backup your data to a secure location, such as a cloud storage service or external hard drive.
- Develop and regularly update an incident response plan that outlines the steps to take in case of a security breach. Test the plan through simulations to ensure its effectiveness.