

South Asian Media Organizations Targeted by New Go-Based Backdoor GoGra – Active IOCs
August 8, 2024
Cybercriminals Can Steal Passwords and Emails Using Roundcube Webmail Vulnerabilities
August 8, 2024
South Asian Media Organizations Targeted by New Go-Based Backdoor GoGra – Active IOCs
August 8, 2024
Cybercriminals Can Steal Passwords and Emails Using Roundcube Webmail Vulnerabilities
August 8, 2024Severity
High
Analysis Summary
Phorpiex is a long-running botnet malware that has plagued users for years. First appearing in 2016, it quickly established itself as a major threat, amassing over a million infected devices at its peak. Phorpiex is a versatile tool for cybercriminals, with capabilities ranging from stealing data to launching ransomware attacks.
One of Phorpiex's most notorious tactics is cryptojacking. By infecting devices, it can harness their processing power to mine cryptocurrency for the attackers. Phorpiex can also steal clipboard data, such as cryptocurrency wallet addresses the user has copied. This allows attackers to swap the user's address with theirs, essentially stealing any cryptocurrency the victim tries to transfer.
Phorpiex is also adept at spreading spam and delivering other malware. Phishing campaigns are a common method of distribution, with malicious emails tricking users into downloading infected attachments or clicking on harmful links. Once a device is compromised, Phorpiex can download additional malware including ransomware that encrypts the files and demands a ransom for decryption.
Phorpiex remains a significant threat as its versatility, ability to self-propagate, and use of evolving techniques make it a challenge for cybersecurity professionals. Staying vigilant against phishing attempts, keeping software updated, and employing robust security solutions are crucial steps in protecting yourself from Phorpiex and other malware threats.
Impact
- Sensitive Data Theft
- Cryptocurrency Theft
- File Encryption
Indicators of Compromise
MD5
- be9388b42333b3d4e163b0ace699897b
- 1382c0a4a9e0a9a2c942458652a4a0e4
- 5381689d4c9a0ce9d0f67dd8485188d2
- 55bb483e2022b3ff766a80262c1078d5
- 1318fbc69b729539376cb6c9ac3cee4c
- 839e3c02d9070878a7b230dc25e0ec50
- e2e3268f813a0c5128ff8347cbaa58c8
- 8d8e6c7952a9dc7c0c73911c4dbc5518
SHA-256
- d281e0a0f1e1073f2d290a7eb1f77bed4c210dbf83a0f4f4e22073f50faa843f
- 4cb590dfafb7653379326e840d9b904a3cf05451999c4f9eb66c6e7116b68875
- 3860e4bc7a35d52b4193b256bd76e62d98e9d05e504e4871a56585ea56295228
- 772ad3ca0bc4c88bd4042562e8fefb34fe52a1f709622d819f806770e582541b
- e972fb08a4dcde8d09372f78fe67ba283618288432cdb7d33015fc80613cb408
- 5cc9092ad93386d37a02be62409d45c905984bc181b6631e01b963bd92e8a9e7
- d8b83f78ed905a7948e2e1e371f0f905bcaaabbb314c692fee408a454f8338a3
- feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278
SHA1
- 4e1109772eb9cb59c557380822166fe1664403bd
- 55ed8ebd6281c280c3e77763773d789a6057e743
- 28a5df66c1b6cc6b1181a3344edf7df0bb6fa246
- afb773763be2b84b10d8ee4bb24157dd45e79a68
- 753090b4ffaa151317517e8925712dd02908fe9e
- bcbd232cf120ea309f5e14e2c2f994c34cb0ed9b
- 4952cbfbdec300c048808d79ee431972b8a7ba84
- 9098da03b33b2c822065b49d5220359c275d5e94
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution. Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.