Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » New Bandook RAT variant reappears, targeting Windows machines
    Cyber Security

    New Bandook RAT variant reappears, targeting Windows machines

    techempireBy techempire5 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 5, 2024Editorial DepartmentMalware/cyber espionage

    Banduk rat

    New variant of remote access Trojan called banduque The malware was observed to be spread via phishing attacks aimed at infiltrating Windows computers, highlighting the malware’s continued evolution.

    Fortinet FortiGuard Labs discovered the campaign in October 2023 and said the malware was distributed via a PDF file that embedded a link to a password-protected .7z archive.

    “After the victim extracts the malware using the password from the PDF file, the malware injects its payload into msinfo32.exe,” said security researcher Pei Han Liao.

    First discovered in 2007, Bandook is an off-the-shelf malware with multiple capabilities for remotely controlling infected systems.

    Internet security

    In July 2021, Slovak cybersecurity company ESET detailed a cyber espionage campaign that used an upgraded variant of Bandook to disrupt corporate networks in Spanish-speaking countries such as Venezuela.

    Banduk rat

    The starting point of the latest attack sequence is an injector component designed to decrypt the payload and load it into msinfo32.exe, a legitimate Windows binary used to collect system information to diagnose computer problems .

    In addition to altering the Windows registry to establish persistence on the infected host, the malware also communicates with command and control (C2) servers to retrieve additional payloads and instructions.

    “These behaviors can be roughly divided into file manipulation, login manipulation, downloading, information theft, file execution, calling functions in DLL from C2, controlling the victim’s computer, process killing and uninstalling malware,” Han Liao said.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.