CVE-2024-12398 – Zyxel Multiple Access Points and Security Router Vulnerability
January 15, 2025Multiple Fortinet Products Vulnerabilities
January 15, 2025CVE-2024-12398 – Zyxel Multiple Access Points and Security Router Vulnerability
January 15, 2025Multiple Fortinet Products Vulnerabilities
January 15, 2025Severity
High
Analysis Summary
MassLogger, a .NET credential stealer, is a keylogger and stealer malware. MassLogger's prime objective is data extraction or information theft, such as bank account and/or credit card details. This malware was published in April 2020 and was offered for a moderate price on underground forums with a few license choices. It starts with a launcher that employs rudimentary anti-debugging techniques that may be readily bypassed if detected. Eventually, the first stage loader XOR decrypts the second stage assembly, which then decrypts, loads, and executes the final MassLogger payload.
MassLogger targets a wide range of apps to steal login credentials and other sensitive information. It obtains and exfiltrates user credentials from a variety of sources, including Microsoft Outlook, Google Chrome, Mozilla Firefox, and instant messengers.
Impact
- Financial Theft
- Information Theft
Indicators of Compromise
MD5
5fea044a3e446f3d3790b6827790ad0a
10f72e53a2c9f106093c233b56a3a819
ce0b68f6cbc24ab95b01caebacf6d423
SHA-256
ad25549d450ba601baac64e5efd061cdafa3e5b6f78f679345d33ddc25e66dd2
84e892d4627a3a3aa053b30200788bd6942c046d2dadcf5121017a32e10142f2
a9085121ed9af2d0a839d051ba89672bbb0da792395675fdd1e6f469fdcd8be8
SHA1
02873146af4e9922afbf952ea2eaba8e68e8fb1a
e8a63836ff90493559b69a1bc6d6080ba9370a99
78cd1c389d2d62f6de6cd81158c09404cfc18f2f
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open " links and attachments received from unknown sources/senders.
- Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.