Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » PLAYFULGHOST Delivered via phishing and SEO poisoning in trojanized VPN apps
Global Security

PLAYFULGHOST Delivered via phishing and SEO poisoning in trojanized VPN apps

AdminBy AdminJanuary 4, 2025No Comments3 Mins Read
Trojanized VPN Apps
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 4, 2025Ravi LakshmananMalware / VPN Security

Trojanized VPN programs

Cyber ​​security researchers have identified a new malware called A FUNNY GHOST which comes with a wide range of information gathering features such as keyboard, screen capture, audio capture, remote shell and file transfer/execution.

Backdoor, according to Google’s managed protection team, shares features with a well-known remote administration tool called Gh0st RATwhose source code was published in 2008.

PLAYFULGHOST’s initial access routes include using behavior-related phishing emails or search engine optimization (SEO) poisoning techniques to distribute trojanized versions of legitimate VPN programs such as LetsVPN.

Cyber ​​security

“In one phishing case, the infection begins by tricking the victim into opening a malicious RAR archive disguised as an image file using the .jpg extension,” the company said in a statement. said. “When unzipped and executed by the victim, the archive drops a malicious Windows executable that eventually downloads and runs PLAYFULGHOST from a remote server.”

On the other hand, attack chains using SEO poisoning aim to trick unsuspecting users into downloading the LetsVPN malware installer, which when run removes the intermediate payload responsible for obtaining the backdoor components.

The infection is characterized by using techniques such as DLL search order hijacking and sideloading to launch a malicious DLL, which is then used to decrypt and load PLAYFULGHOST into memory.

Mandiant said it has also observed a “more complex execution scenario” in which a Windows shortcut file (“QQLaunch.lnk”) combines the contents of two other files named “h” and “t” to create a fake DLL and load it from using a renamed version of “curl.exe.”

Trojanized VPN programs

PLAYFULGHOST is able to configure persistence on the host using four different methods: a startup registry key, a scheduled task, a Windows startup folder, and a Windows service. It boasts an extensive set of features that allow it to collect extensive data, including keystrokes, screenshots, audio, QQ account information, installed security products, clipboard contents, and system metadata.

It also comes with options to dump more payloads, block mouse and keyboard input, clear Windows event logs, clear clipboard data, perform file operations, delete caches and profiles associated with web browsers such as Sogou, QQ, 360 Safety, Firefox and Google Chrome, and wipe profiles and local storage for messaging apps like Skype, Telegram and QQ.

Cyber ​​security

Some of the other tools deployed through PLAYFULGHOST are Mimikatz and a rootkit capable of hiding the registry, files and processes specified by the threat actors. Also included with the PLAYFULGHOST component download is an open source utility called Terminator which can kill security processes with Bring Your Own Vulnerable Driver (BEOD) attack.

“One day Mandiant noticed that the PLAYFULGHOST payload was embedded in BOOSTWAVE,” the tech giant said. “BOOSTWAVE is a shellcode that acts as an in-memory dropper for the attached Portable Executable (PE) payload.”

Targeting apps like Sogou, QQ, and 360 Safety, as well as using LetsVPN lures, makes it more likely that these infections are targeting Chinese-speaking Windows users. In July 2024 Canadian cybersecurity vendor eSentire revealed a similar company that used fake installers for Google Chrome to distribute the Gh0st RAT using a dropper called Gh0stGambit.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.