Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New UULoader malware spreads Gh0st RAT and Mimikatz in East Asia
Global Security

New UULoader malware spreads Gh0st RAT and Mimikatz in East Asia

AdminBy AdminAugust 19, 2024No Comments3 Mins Read
UULoader Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 19, 2024Ravi LakshmananThreat Intelligence / Cryptocurrency

UULoader malware

A new type of malware called UULoader is used by threat actors to deliver next-stage payloads such as Gh0st RAT and Mimiket.

Cyberint, the research group that discovered the malware, said it was distributed as malicious installers for legitimate apps targeting Korean and Chinese speakers.

There is evidence that UULoader is the work of a Chinese native speaker due to the presence of Chinese lines in the program database (PDB) files embedded in the DLL file.

“UULoader’s ‘core’ files are contained in a Microsoft Cabinet archive (.cab) file that contains two core executables (.exe and .dll) with the file header removed,” the company said in a statement. said in a technical report shared with The Hacker News.

Cyber ​​security

One of the executables is a legitimate DLL sideloading-susceptible binary used to sideload a DLL that eventually loads the final stage, an obfuscated file called “XamlHost.sys”, which is nothing more than like remote access tools like Gh0st RAT or Mimikatz harvester.

The MSI installer file contains a Visual Basic script (.vbs) that is responsible for running an executable – such as Realtek – with some UULoader samples that also run a decoy file as a distraction mechanism.

“This is usually what the .msi file claims to be,” Cyberint said. “For example, if it tries to disguise itself as a ‘Chrome update’, the decoy will actually be a legitimate Chrome update.”

This is not the first time that fake Google Chrome installers have led to the deployment of the Gh0st RAT. Last month, eSentire in detail chain of attacks targeting Chinese Windows users who used a spoofed Google Chrome site to spread a remote access Trojan.

This comes after threat actors were seen creating thousands of cryptocurrency-themed phishing sites that are used for phishing attacks targeting users of popular cryptocurrency wallet services such as Coinbase, Exodus, and MetaMask, among others.

UULoader malware

“These actors use free hosting services such as Gitbook and Webflow to create attractive sites on cryptowallet typosquatter subdomains,” says Broadcom-owned Symantec. said. “These sites lure potential victims with information about crypto wallets and download links that actually lead to malicious URLs.”

These URLs serve as a traffic distribution system (TDS) redirect users to phishing content or to some harmless pages if the tool determines that the visitor is a security researcher.

There were also phishing campaigns masquerade as legitimate government entities in India and the US to which users may be redirected fake domains that collect sensitive information that can be used in future operations to further commit fraud, send phishing emails, spread disinformation/misinformation, or distribute malware.

Cyber ​​security

Some of these attacks are notable for abusing Microsoft’s Dynamics 365 Marketing platform to create subdomains and send phishing emails, bypassing email filters. These attacks were given code names Uncle Afera due to these emails impersonating the US General Services Administration (GSA).

Social engineering efforts have further capitalized on the popularity of the generative artificial intelligence (AI) wave to create fraudulent domains that mimic OpenAI ChatGPT to spread suspicious and malicious activities, including phishing, grayware, ransomware, and control (C2) .

“Notably, more than 72% of domains associate themselves with popular GenAI programs by including keywords such as gpt or chatgpt,” Division 42 of Palo Alto Networks. said in last month’s analysis. “Among all traffic to these (newly registered domains), 35% was directed to suspicious domains.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.