Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Fake Adobe Acrobat Reader installer distributes Byakugan malware
    Cyber Security

    Fake Adobe Acrobat Reader installer distributes Byakugan malware

    techempireBy techempire4 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportApril 5, 2024Editorial DepartmentMalware/Endpoint Security

    White Eyes Malware

    A fake installer of Adobe Acrobat Reader is used to distribute a new multi-purpose malware called “Acrobat Reader” Roll eyes.

    The starting point of the attack is a PDF file written in Portuguese that displays a blurry image when opened and asks the victim to click on a link to download a Reader application to view the content.

    According to Fortinet FortiGuard Labs, clicking on the URL results in the delivery of the installer program (“Reader_Install_Setup.exe”) that initiates the infection sequence. The AhnLab Security Intelligence Center (ASEC) first disclosed details of the campaign last month.

    The attack chain uses techniques such as DLL hijacking and Windows User Access Control (UAC) bypass to load a malicious dynamic link library (DLL) file named “BluetoothDiagnosticUtil.dll”, which in turn loads and drops the final payload load. It also deploys legitimate installers for PDF readers such as Wondershare PDFelement.

    This binary collects and transmits system metadata to a command and control (C2) server and removes the main module (“chrome.exe”) from another server that also acts as a receiver for files and commands C2.

    “Byakugan is a Node.js-based malware packaged into its executable file via pkg,” said security researcher Pei Han Liao. “In addition to the main script, there are several libraries corresponding to the functionality.”

    Internet security

    This includes setting up persistence, using OBS Studio to monitor the victim’s desktop, taking screenshots, downloading cryptocurrency mining programs, logging keystrokes, enumerating and uploading files, and scraping data stored in web browsers.

    “There is a growing trend to use both clean and malicious components in malware, and Byakugan is no exception,” Fortinet said. “This approach increases the amount of noise generated during analysis, making accurate detection more difficult.”

    This disclosure comes as ASEC revealed a new campaign that spreads the Rhadamanthys information stealer under the guise of a groupware installer.

    “The threat actor created a fake website that resembled the original website and exploited the advertising feature in search engines to expose the website to users,” the South Korean cybersecurity firm said. “The malware being distributed uses indirect system calls Technology to hide the eyes of security solutions.”

    Unknown threat actors have also been found to be using manipulated versions of Notepad++ to deliver the WikiLoader malware, also known as WailingCrab.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.