Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Researchers discovered the Hijack Loader malware using stolen code signing certificates
Global Security

Researchers discovered the Hijack Loader malware using stolen code signing certificates

AdminBy AdminOctober 15, 2024No Comments4 Mins Read
Loader Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 15, 2024Ravi LakshmananDetection of threats / malware

Bootloader malware

Cybersecurity researchers have uncovered a new malware campaign that delivers Hijack Loader artifacts signed with legitimate code signing certificates.

French cybersecurity firm HarfangLab, which discovered the activity earlier this month, said chain attacks aimed at deploying an information stealer known as Lumma.

Hijack bootloaderalso known as DOILoader, IDAT Loader and SHADOWLADDER, first appeared in September 2023. Malware loader attack chains usually involve forcing users to download a binary file disguised as pirated software or movies.

Recent variations of these companies have been found to direct users to fake CAPTCHA pages that prompt site visitors to prove they are human by copying and executing a coded PowerShell command that extracts the malicious payload in the form of a ZIP archive.

Cyber ​​security

HarfangLab said it observed three different versions of the PowerShell script starting in mid-September 2024 –

  • A PowerShell script that uses mshta.exe to execute code hosted on a remote server
  • A remotely hosted PowerShell script that is directly executed via the The Invoke-Expression cmdlet (aka what)
  • A PowerShell script that uses msiexec.exe to download and execute a payload from a remote URL

A ZIP archive, on the other hand, contains a real executable file that can be side-loaded by a DLL, and a malicious DLL (such as a Hijack Loader) that must be loaded instead.

“The purpose of the HijackLoader sideloader DLL is to decrypt and execute the encrypted file contained in the package,” HarfangLab said. “This file hides the final stage of HijackLoader, which aims to download and execute the hijacking implant.”

The delivery mechanism is said to have been changed from sideloading DLLs to using multiple signed binaries in early October 2024 in an attempt to avoid detection by security software.

It is currently unclear whether all of the code-signing certificates were stolen or intentionally created by the threat actors themselves, although the cybersecurity firm assessed with low to medium confidence that it could be the latter. The certificates have since been revoked.

“We have noticed that for several CAs that issue certificates, obtaining and activating a code signing certificate is largely automated and only requires a valid company registration number and a contact person,” it said. “This study highlights that malware can be signed, emphasizing that code signing alone cannot serve as a baseline measure of trustworthiness.”

Cyber ​​security

The development comes after SonicWall Capture Labs warned of a surge in cyberattacks infecting Windows machines with malware called CoreWarrior.

“This is a persistent Trojan that tries to spread rapidly by creating dozens of copies of itself and addressing multiple IP addresses, opening multiple sockets for backdoor access, and plugging in Windows UI elements for monitoring,” the report said. said.

Phishing campaigns have also been observed delivering product and bootloader malware known as XWorm using a Windows Script File (WSF), which in turn loads and executes a PowerShell script located on paste(.)ee.

Bootloader malware

The PowerShell script then runs a Visual Basic script that acts as a conduit to execute a series of batch and PowerShell scripts to load the malicious DLL responsible for injecting XWorm into a legitimate process (“RegSvcs.exe”).

The latest version of XWorm (version 5.6) includes the ability to report response times, collect screenshots, read and modify the victim’s hosts file, perform a denial-of-service (DoS) attack against the target, and remove stored plugins, indicating an attempt to avoid leaving a forensic trail.

“XWorm is a multi-faceted tool that can provide an attacker with a wide range of capabilities,” Ian Michael Alcantara, security researcher at Netskope Threat Labs. said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.