Machines – INDIA NEWS https://www.indiavpn.org News Blog Mon, 29 Jan 2024 06:40:25 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 Malicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows Machines https://www.indiavpn.org/2024/01/29/malicious-pypi-packages-slip-whitesnake-infostealer-malware-onto-windows-machines/ https://www.indiavpn.org/2024/01/29/malicious-pypi-packages-slip-whitesnake-infostealer-malware-onto-windows-machines/#respond Mon, 29 Jan 2024 06:40:25 +0000 https://www.indiavpn.org/2024/01/29/malicious-pypi-packages-slip-whitesnake-infostealer-malware-onto-windows-machines/ [ad_1]

Jan 29, 2024NewsroomPyPI Repository / Malware

Malicious PyPI Packages

Cybersecurity researchers have identified malicious packages on the open-source Python Package Index (PyPI) repository that deliver an information stealing malware called WhiteSnake Stealer on Windows systems.

The malware-laced packages are named nigpal, figflix, telerer, seGMM, fbdebug, sGMM, myGens, NewGends, and TestLibs111. They have been uploaded by a threat actor named “WS.”

“These packages incorporate Base64-encoded source code of PE or other Python scripts within their setup.py files,” Fortinet FortiGuard Labs said in an analysis published last week.

“Depending on the victim devices’ operating system, the final malicious payload is dropped and executed when these Python packages are installed.”

Cybersecurity

While Windows systems are infected with WhiteSnake Stealer, compromised Linux hosts are served a Python script designed to harvest information. The activity, which predominantly targets Windows users, overlaps with a prior campaign that JFrog and Checkmarx disclosed last year.

“The Windows-specific payload was identified as a variant of the […] WhiteSnake malware, which has an Anti-VM mechanism, communicates with a C&C server using the Tor protocol, and is capable of stealing information from the victim and executing commands,” JFrog noted in April 2023.

It’s also designed to capture data from web browsers, cryptocurrency wallets, and apps like WinSCP, CoreFTP, Windscribe, Filezilla, AzireVPN, Snowflake, Steam, Discord, Signal, and Telegram.

Checkmarx is tracking the threat actor behind the campaign under the moniker PYTA31, stating the end goal is to exfiltrate sensitive and particularly crypto wallet data from the target machines.

Some of the newly published rogue packages have also been observed incorporating clipper functionality to overwrite clipboard content with attacker-owned wallet addresses to carry out unauthorized transactions. A few others have been configured to steal data from browsers, applications, and crypto services.

Cybersecurity

Fortinet said the finding “demonstrates the ability of a single malware author to disseminate numerous info-stealing malware packages into the PyPI library over time, each featuring distinct payload intricacies.”

The disclosure comes as ReversingLabs discovered two malicious packages on the npm package registry have been found to leverage GitHub to store Base64-encrypted SSH keys stolen from developer systems on which they were installed.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/01/29/malicious-pypi-packages-slip-whitesnake-infostealer-malware-onto-windows-machines/feed/ 0
New Bandook RAT Variant Resurfaces, Targeting Windows Machines https://www.indiavpn.org/2024/01/05/new-bandook-rat-variant-resurfaces-targeting-windows-machines/ https://www.indiavpn.org/2024/01/05/new-bandook-rat-variant-resurfaces-targeting-windows-machines/#respond Fri, 05 Jan 2024 07:40:08 +0000 https://www.indiavpn.org/2024/01/05/new-bandook-rat-variant-resurfaces-targeting-windows-machines/ [ad_1]

Jan 05, 2024NewsroomMalware / Cyber Espionage

Bandook RAT

A new variant of remote access trojan called Bandook has been observed being propagated via phishing attacks with an aim to infiltrate Windows machines, underscoring the continuous evolution of the malware.

Fortinet FortiGuard Labs, which identified the activity in October 2023, said the malware is distributed via a PDF file that embeds a link to a password-protected .7z archive.

“After the victim extracts the malware with the password in the PDF file, the malware injects its payload into msinfo32.exe,” security researcher Pei Han Liao said.

Bandook, first detected in 2007, is an off-the-shelf malware that comes with a wide range of features to remotely gain control of the infected systems.

Cybersecurity

In July 2021, Slovak cybersecurity firm ESET detailed a cyber espionage campaign that leveraged an upgraded variant of Bandook to breach corporate networks in Spanish-speaking countries such as Venezuela.

Bandook RAT

The starting point of the latest attack sequence is an injector component that’s designed to decrypt and load the payload into msinfo32.exe, a legitimate Windows binary that gathers system information to diagnose computer issues.

The malware, besides making Windows Registry changes to establish persistence on the compromised host, establishes contact with a command-and-control (C2) server to retrieve additional payloads and instructions.

“These actions can be roughly categorized as file manipulation, registry manipulation, download, information stealing, file execution, invocation of functions in DLLs from the C2, controlling the victim’s computer, process killing, and uninstalling the malware,” Han Liao said.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/01/05/new-bandook-rat-variant-resurfaces-targeting-windows-machines/feed/ 0