Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The SocGholish malware uses the BOINC project for stealthy cyberattacks
Global Security

The SocGholish malware uses the BOINC project for stealthy cyberattacks

AdminBy AdminJuly 22, 2024No Comments3 Mins Read
SocGholish Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 22, 2024Information hallVulnerability / Malware

SocGholish Malware

JavaScript downloader malware known as SocGholish (aka FakeUpdates) is used to deliver a remote access trojan named AsyncRAT as well as a legitimate open source project called BOINC.

BOINKshort for Berkeley Open Infrastructure Network Computing Client, is open source “volunteer computing”. platform is supported by the University of California to perform “large-scale, high-throughput distributed computing” using home computers running the program.

“In that way, it’s similar to a cryptocurrency miner (using computer resources to do work), and it’s actually designed to reward users with a specific type of cryptocurrency called Gridcoin designed for that purpose,” Huntress researchers Matt Anderson, Alden Schmidt, and Greg Linares said in a report released last week.

Cyber ​​security

These malware are designed to connect to a domain controlled by an actor (“rosettahome(.)cn” or “rosettahome(.)top”), essentially acting as a command-and-control (C2) server to collect host data, deliver payloads and click further commands. As of July 15, 10,032 clients are connected to the two domains.

The cybersecurity firm said that while it did not observe any follow-up actions or tasks performed by the infected hosts, it speculated that “connections to the hosts may be sold as initial access vectors to be used by other actors and potentially used to execute a program – extortionists”.

SocGholish’s attack sequences typically begin when users land on compromised websites where they are prompted to download a fake browser update that, when executed, triggers the delivery of additional payloads to compromised machines.

The JavaScript loader in this case activates two separate threads: one causes the fileless AsyncRAT variant to be deployed, and the other causes BOINC to be installed.

SocGholish Malware

The BOINC application, which is renamed to “SecurityHealthService.exe” or “trustedinstaller.exe” to avoid detection, sets the duration using a scheduled task using a PowerShell script.

The abuse of BOINC for malicious purposes did not go unnoticed by the project staff who currently under investigation problem and finding a way to “beat this malware”. Evidence of abuse goes back to at least June 26, 2024.

“The threat actor’s motivation and intent in uploading this software to infected nodes is unclear at this time,” the researchers said.

“Infected clients actively connecting to malicious BOINC servers pose a fairly high risk, as there is the potential for a motivated threat actor to abuse that connection and execute any number of malicious commands or software on the host to further elevate privileges or move parties across the network and compromise the entire domain.”

The development comes after Check Point said it is tracking the use of compiled V8 JavaScript by malware authors to bypass static detections and hide remote access trojans, stealers, bootloaders, cryptocurrency miners, cleaners and ransomware.

“In the ongoing battle between security experts and threat actors, malware developers continue to come up with new tricks to hide their attacks,” said security researcher Moshe Morelus. “It’s not surprising that they started using V8, as this technology is usually used to build software, as it is very common and very difficult to analyze.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.