Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The DEEPDATA malware exploits an unpatched Fortinet flaw to steal VPN credentials
Global Security

The DEEPDATA malware exploits an unpatched Fortinet flaw to steal VPN credentials

AdminBy AdminNovember 16, 2024No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


A threat actor known as Brazen bamboo exploited an unaddressed security flaw in Fortinet’s FortiClient for Windows to obtain VPN credentials within a modular framework called DEEPDATA.

Volexity, which released the findings on Friday, said it identified a zero-day exploit of the credential disclosure vulnerability in July 2024, describing BrazenBamboo as the developer of DEEPDATA, DEEPPOST, and LightSpy.

“DEEPDATA is a modular Windows post-exploitation tool used to collect a wide range of information from target devices,” security researchers Callum Roxon, Charlie Gardner and Paul Rasconieres said Friday.

The malware first came to light earlier this week when BlackBerry detailed a Windows-based tracking framework used by a company linked to China. APT41 the threat actor can collect data from WhatsApp, Telegram, Signal, WeChat, LINE, QQ, Skype, Microsoft Outlook, DingDing, Feishu, KeePass, as well as app passwords, web browser information, Wi-Fi hotspots, and installed software.

Cyber ​​security

“Since the initial development of the LightSpy spyware implant in 2022, the attacker has worked persistently and methodically to strategically target communications platforms with an emphasis on stealth and persistent access,” BlackBerry’s research team said. noted.

The core component of DEEPDATA is a dynamic link library (DLL) loader named “data.dll” that is designed to decode and run 12 different plug-ins using the orchestrator module (“frame.dll”). Among the plugins is a previously undocumented “FortiClient” DLL that can capture VPN credentials.

“This plug-in was found to exploit a zero-day vulnerability in the Fortinet VPN client on Windows that allows the extraction of credentials for a user from the memory of the client process,” the researchers said.

Volexity said it reported the flaw to Fortinet on July 18, 2024, but noted that the vulnerability remains unpatched. The Hacker News has reached out to the company for comment, and we’ll update when we hear back.

Another tool in BrazenBamboo’s malware portfolio is DEEPPOST, a post-exploitation data-stealing tool capable of transferring files to a remote endpoint.

DEEPDATA and DEEPPOST add to the already powerful cyber espionage capabilities of a threat actor, expanding LightSpy, which is available in various variants for macOS, iOSand now Windows.

“Architecture for a Windows variant LightSpy differs from other documented OS variants,” said Volexity. “This variant is deployed by the installer, which deploys a library to execute shellcode in memory. The shellcode loads and decodes the orchestrator component from the (command and control) server.”

The orchestrator is executed using a bootloader called BH_A006, which was previously used by an alleged Chinese threat group named Space pirateswhich has a history of attacks on Russian organizations.

Cyber ​​security

However, it is currently unclear whether this coincidence is related BH_A006 is commercially available malware or is evidence of a digital quartermaster which is responsible for overseeing a centralized set of tools and techniques among Chinese threat actors.

The LightSpy orchestrator, once launched, uses WebSocket and HTTPS to communicate to steal data, respectively, and uses a total of eight plugins to record from a webcam, launch a remote shell to execute commands, and collect audio, browser data, files, keystrokes, screen captures, and a list installed software.

LightSpy and DEEPDATA have several overlaps at the code and infrastructure level, suggesting that the two malware families are likely the work of a private enterprise tasked with developing hacking tools for government operators, such as to testify by companies such as Chengdu 404 and I- Soon.

“BrazenBamboo is a well-resourced threat actor that supports multi-platform capabilities with longevity of operation,” Volexity concluded. “The breadth and maturity of their capabilities indicates both the capability of the development function and the operational requirements that drive development outcomes.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.