Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft Defender bug used to deliver ACR, Lumma and Meduza Stealers
Global Security

Microsoft Defender bug used to deliver ACR, Lumma and Meduza Stealers

AdminBy AdminJuly 24, 2024No Comments3 Mins Read
ACR, Lumma, and Meduza Stealers
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 24, 2024Information hallMalware / Threat Intelligence

ACR, Lumma and Meduza Stealers

A now-patched security flaw in Microsoft Defender SmartScreen has been exploited by a new information-stealing campaign, such as ACR Stealer, Lammaand Medusa.

Fortinet’s FortiGuard Labs says it has discovered a phishing campaign targeting Spain, Thailand and the US using file-mines that use CVE-2024-21412 (CVSS Score: 8.1).

High Severity Vulnerability allows attacker to bypass SmartScreen protection and delete malicious payloads. Microsoft addressed this issue in the monthly security updates released in February 2024.

“At first, attackers encourage victims to follow a crafted link to a URL designed to download an LNK file,” security researcher Kara Lin said. “The LNK file then loads an executable file containing the script (HTML Application).”

Cyber ​​security

The HTA file serves as a conduit for decoding and decrypting the PowerShell code responsible for obtaining the fraudulent PDF file and the shellcode injector, which in turn leads to the deployment of the Meduza Stealer or Hijack bootloaderwhich then launches ACR Stealer or Lumma.

ACR Stealer, evaluated as an improved version of GrMsk Stealer, was announced in late March 2024 by a threat actor named SheldIO on the Russian-language underground RAMP forum.

“This ACR heist hides its (command and control) dead spot review (DDR) technique on the Steam community website,” Lin said, citing its ability to sift through web browsers, crypto wallets, messaging programs, FTP clients, email clients, VPN services and password managers.

ACR, Lumma and Meduza Stealers

It should be noted that recent Lumma Stealer attacks have also been seen using the same technique, making it easier for adversaries to change C2 domains at any time and making the infrastructure more resilient. respectively at the AhnLab Security Intelligence Center (ASEC).

Disclosure is happening, as is CrowdStrike revealed that threat actors use shutdown last week distribute a previously undocumented information stealer called Daolpu, making it the latest example precipitation continues stems from a botched update that crippled millions of Windows devices.

The attack involves using a Microsoft Word document with firmware that is disguised as a list of Microsoft recovery guides legal instructions issued by the Windows manufacturer to solve the problem by using it as a decoy to activate the infection process.

The DOCM filewhen opened, runs a macro to retrieve a second-stage DLL from the remote control, which is decoded to launch Daolpu, a stealth malware designed to harvest credentials and cookies from Google Chrome, Microsoft Edge, Mozilla Firefox, and other Chromium-based browsers.

It’s also worth an appearance new families of stealing malware such as Braodo and DeerStealer, even as cybercriminals use malvertising techniques promoting legitimate software such as Microsoft Teams to deploy Atomic Stealer.

“As cybercriminals ramp up their distribution campaigns, downloading apps through search engines is becoming increasingly dangerous,” said Jerome Segura, researcher at Malwarebytes. said. “Users must navigate between malicious ads (sponsored results) and SEO poisoning (compromised websites).”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025

Samsung Patches Cve-2025-4632 used to deploy Mirai Botnet via Magicinfo 9 Exploit

May 14, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.