Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Horns&Hooves delivers the RAT via spoofed emails and JavaScript payloads
Global Security

Horns&Hooves delivers the RAT via spoofed emails and JavaScript payloads

AdminBy AdminDecember 3, 2024No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 3, 2024Ravi LakshmananMalware / phishing attack

A newly discovered malware campaign was found to be targeting private users, retailers and businesses serving primarily in Russia to deliver NetSupport RAT and BurnsRAT.

Company, dubbing Horns and hooves from Kaspersky, from the beginning of March 2023. more than 1,000 people were injured. The ultimate goal of these attacks is to use the access provided by these Trojans to install malicious hijackers such as Rhadomantis and Medusa.

“In recent months, there has been a surge in mailings with similar email attachments in the form of a ZIP archive containing JScript scripts,” security researcher Artyom Ushkov said in Monday’s analysis. “Script files (disguised) as requests and bids from potential customers or partners.”

The threat actors behind the operations demonstrated their active development of the JavaScript payload, making significant changes throughout the campaign.

Cyber ​​security

In some cases, the ZIP archive has been found to contain other documents associated with an impersonated organization or person in order to make a phishing attack more likely to succeed and trick recipients into opening the malicious software file.

One of the earliest samples identified by the campaign is an HTML application (HTA) file that, when run, downloads a dummy PNG image from a remote server using the curl utility for Windows, and stealthily retrieves and executes another script (” bat_install.bat”) from another server using BITSAdmin command line tool.

The newly downloaded script then proceeds to retrieve several other files with BITSAdmin, including the NetSupport RAT malware, which establishes contact with the command and control (C2) server created by the attackers.

The next iteration of the campaign, observed in mid-May 2023, included a JavaScript intermediate that mimics legitimate JavaScript libraries such as Next.js to activate the NetSupport RAT infection chain.

Kaspersky said it also found another variant of the JavaScript file that removed the NSIS installer, which is then responsible for deploying the BurnsRAT on the compromised host.

“Although the backdoor supports commands for downloading and running files remotely, as well as various methods of executing commands through the Windows command line, the main task of this component is to run the Remote Manipulator System (RMS) as a service and send the RMS session ID to the attackers’ server,” explained Ushkov.

“RMS is an application that allows users to interact with remote systems over a network. It enables desktop management, command execution, file transfer, and data sharing between devices located in different geographic locations.”

Cyber ​​security

In a sign that threat actors are continuing to fine-tune their modus operandi, two other attack sequences seen in late May and June 2023 came with a completely reworked NetSupport RAT installation BAT file and embedded the malware directly into JavaScript code, respectively .

There are indications that the campaign is the work of a threat known as TA569 (aka Gold Prelude, Mustard Tempest and Purple Vallhund) who is known for working with SocGholish (aka FakeUpdates) malware. This connection results from an overlap in the NetSupport RAT license and configuration files used in the associated actions.

It should be noted that TA569 was also known act as the initial access broker for subsequent ransomware attacks such as WastedLocker.

“Depending on whose hands this access falls into, the consequences for victim companies can range from data theft to encryption and damage to systems,” Ushkov said. “We have also observed attempts to install theft on some infected machines.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.