Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » New BunnyLoader malware variant surfaces with modular attack capabilities
    Cyber Security

    New BunnyLoader malware variant surfaces with modular attack capabilities

    techempireBy techempire3 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 20, 2024Editorial DepartmentCybercrime/Financial Security

    BunnyLoader malware

    Cybersecurity researchers have discovered newer variants of stealers and malware loaders known as rabbit loader Modularize its various functions and enable it to evade detection.

    “BunnyLoader is dynamically developing malware capable of stealing information, credentials, and cryptocurrency, as well as delivering additional malware to victims,” ​​Palo Alto Networks Unit 42 said in a report released last week.

    The new version, called BunnyLoader 3.0 and released on February 11, 2024 by a developer named Player (or Player_Bunny), rewrites the data-stealing mod, reduces the payload size, and enhances keylogging capabilities.

    BunnyLoader was first documented in September 2023 by Zscaler ThreatLabz, which described it as malware-as-a-service (MaaS) designed to collect credentials and facilitate cryptocurrency theft. It is initially available as a subscription price of $250 per month.

    Internet security

    Since then, the malware has undergone frequent updates designed to evade anti-virus defenses and expand its data collection capabilities, with BunnyLoader 2.0 released at the end of the same month.

    The third generation of BunnyLoader goes a step further, not only incorporating new Denial of Service (DoS) capabilities to launch HTTP flood attacks against target URLs, but also splitting its stealer, clipper, keylogger, and DoS modules into two separate carry file.

    “BunnyLoader operators can choose to deploy these modules or use BunnyLoader’s built-in commands to load malware of their choice,” Unit 42 explains.

    The infection chain delivering BunnyLoader has also become increasingly sophisticated, utilizing a previously undocumented dropper to load PureCrypter and then forking into two separate branches.

    While one branch launches the PureLogs loader to ultimately deliver the PureLogs stealer, a second attack sequence drops the BunnyLoader to distribute another stealer malware called Meduza.

    BunnyLoader malware

    “BunnyLoader’s continued evolution in the ever-changing MaaS landscape demonstrates the need for threat actors to frequently retool to evade detection,” Unit 42 researchers said.

    This development comes as a Russian cybercriminal suspect known as UAC-006 continues to use SmokeLoader malware (also known as Dofoil or Sharik) to target Ukrainian government and financial entities. It is understood to have been active since 2011.

    According to a detailed report published by Ukraine’s State Cyber ​​Protection Center (SCPC), as many as 23 phishing attacks sending SmokeLoader were recorded between May and November 2023.

    Internet security

    “SmokeLoader, primarily a loader with additional information-stealing capabilities, has been linked to Russian cybercriminal activity and can be easily found on Russian cybercrime forums,” Unit 42 said.

    Added to BunnyLoader and SmokeLoader is a new information-stealing malware codenamed GlorySprout, which is developed in C++ and costs $300 for lifetime access. According to RussianPanda, Stealers are clones of the Taurus Stealers.

    “One notable difference is that, unlike Taurus Stealer, GlorySprout does not download additional DLL dependencies from the C2 server,” the researchers said. “In addition, GlorySprout lacks the Anti-VM functionality present in Taurus Stealer.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.