Hackers have been discovered as soon as once more utilizing the traditional “pretend crypto job” rip-off to distribute harmful malware, specialists have warned.
Nevertheless, as a substitute of the same old North Korean Lazarus Group, this time it’s the Russians attempting to make the most of gullible crypto employees. Cybersecurity researchers from Development Micro not too long ago noticed unnamed Russian risk actors focusing on employees within the cryptocurrency trade, situated in Japanese Europe.
They might ship out emails, inviting the victims to think about a brand new job provide at a crypto agency. The e-mail would carry two attachments, one seemingly benign .txt file (titled “Interview Questions”) and one clearly malicious (titled “Interview Situations.phrase.exe”).
Carry your individual susceptible driver
The assault is a three-step marketing campaign: If the sufferer runs the executable, it downloads a second payload that abuses a vulnerability in an Intel driver, tracked as CVE-2015-2291. This methodology, generally known as “Carry Your Personal Weak Driver”, permits risk actors to execute instructions with Kernel privileges, and so they use this capability to disable antivirus safety.
As soon as the antivirus is disabled, they set off the obtain of the third payload, which is a variant of the Stealerium malware, named Enigma.
The malware, which will get pulled from a personal Telegram channel, is able to extracting system data, browser tokens, saved passwords (it targets just about all in style browsers these days, together with Chrome, Edge, Opera, and so on.), information saved in Outlook, Telegram, Sign, OpenVPN, and extra. What’s extra, Enigma can seize screenshots and extract clipboard content material.
When it will get what it needs, Enigma zips all of it up in a Information.zip archive and sends it again by way of Telegram.
Whereas pretend job presents are often one thing Lazarus Group does, Development Micro believes that this time round, the group is of Russian origin. Apparently, one of many logging servers hosts an Amadey C2 panel, largely in style amongst Russian cybercriminals. Moreover, the server runs “Deniska”, a Linux variant used virtually solely by Russians – and the server’s default time zone can also be set to Moscow.
By way of: BleepingComputer (opens in new tab)