Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The macOS version of the HZ RAT Backdoor targets Chinese users of the messaging app
Global Security

The macOS version of the HZ RAT Backdoor targets Chinese users of the messaging app

AdminBy AdminAugust 27, 2024No Comments4 Mins Read
Chinese Messaging App Users
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 27, 2024Ravi LakshmananCyber ​​espionage / malware

Chinese messaging app users

Users of Chinese instant messaging apps such as DingTalk and WeChat are being targeted by a backdoor in a version of Apple’s macOS called HZ RAT.

The artifacts “almost exactly repeat the functionality of the Windows version of the backdoor and differ only in the payload, which is obtained in the form of shell scripts from the attackers’ server,” said Kaspersky researcher Sergey Puzan. said.

ХЗ RAT was documented for the first time by the German cyber security company DCSO in November 2022, the malware was distributed via self-extracting zip archives or malicious RTF documents believed to be created using Royal road RTF weapons.

Cyber ​​security

Attack chains involving RTF documents are designed to deploy a Windows version of the malware that runs on a compromised host using a years-old Microsoft Office flaw in the equation editor (CVE-2017-11882).

The second distribution method, on the other hand, is disguised as an installer for legitimate software such as OpenVPN, PuTTYgen, or EasyConnect, which in addition to actually installing the lure, also executes the Visual Basic Script (VBS) responsible for launching the RAT.

The capabilities of the HZ RAT are quite simple in that it connects to the control server (C2) for further instructions. This includes executing PowerShell commands and scripts, writing arbitrary files to the system, uploading files to the server, and sending heartbeat information.

Given the limited functionality of the tool, it is suspected that the malware is mainly used for credential harvesting and system reconnaissance.

Evidence shows that the first iterations of the malware were discovered in the wild as early as June 2020. The company itself is believed to have been active since at least October 2020, according to DCSO.

Chinese messaging app users

The latest sample discovered by Kaspersky, uploaded to VirusTotal in July 2023, embodies OpenVPN Connect (“OpenVPNConnect.pkg”), which when launched contacts the C2 server specified in the backdoor to execute four basic commands similar to its counterpart windows –

  • Executing shell commands (such as system information, local IP address, list of installed programs, data from DingTalk, Google Password Manager and WeChat)
  • Burn the file to disk
  • Send the file to the C2 server
  • Check for a victim

“The malware tries to get the victim’s WeChatID, email address and phone number from WeChat,” Puzan said. “In the case of DingTalk, the attackers are interested in more detailed information about the victim: the name of the organization and department where the user works, username, corporate email address, (and) phone number.”

Cyber ​​security

Further analysis of the attack infrastructure revealed that almost all of C2’s servers are located in China, with the exception of two located in the United States and the Netherlands.

In addition to this, the ZIP archive containing the macOS installation package (“OpenVPNConnect.zip”) was allegedly previously downloaded from a domain belonging to Chinese video game developer miHoYo, known for Genshin Impact and Honkai.

It is currently unclear how the file was uploaded to the domain in question (“vpn.mihoyo(.)com”) and whether the server was compromised at some point in the past. It’s also unclear how widespread the campaign is, but the fact that the backdoor is still being used after so many years suggests a degree of success.

“The macOS version of HZ Rat we found shows that the threat actors behind the previous attacks are still active,” said Puzan. “The malware only collected user data, but it could later be used to move laterally across the victim’s network, as evidenced by the presence of private IP addresses in some of the samples.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025

Ottokit WordPress plugin with 100K+ Instals Hit Gratoits, focused on several disadvantages

May 7, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.