Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft Defender bug used to deliver ACR, Lumma and Meduza Stealers
Global Security

Microsoft Defender bug used to deliver ACR, Lumma and Meduza Stealers

AdminBy AdminJuly 24, 2024No Comments3 Mins Read
ACR, Lumma, and Meduza Stealers
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 24, 2024Information hallMalware / Threat Intelligence

ACR, Lumma and Meduza Stealers

A now-patched security flaw in Microsoft Defender SmartScreen has been exploited by a new information-stealing campaign, such as ACR Stealer, Lammaand Medusa.

Fortinet’s FortiGuard Labs says it has discovered a phishing campaign targeting Spain, Thailand and the US using file-mines that use CVE-2024-21412 (CVSS Score: 8.1).

High Severity Vulnerability allows attacker to bypass SmartScreen protection and delete malicious payloads. Microsoft addressed this issue in the monthly security updates released in February 2024.

“At first, attackers encourage victims to follow a crafted link to a URL designed to download an LNK file,” security researcher Kara Lin said. “The LNK file then loads an executable file containing the script (HTML Application).”

Cyber ​​security

The HTA file serves as a conduit for decoding and decrypting the PowerShell code responsible for obtaining the fraudulent PDF file and the shellcode injector, which in turn leads to the deployment of the Meduza Stealer or Hijack bootloaderwhich then launches ACR Stealer or Lumma.

ACR Stealer, evaluated as an improved version of GrMsk Stealer, was announced in late March 2024 by a threat actor named SheldIO on the Russian-language underground RAMP forum.

“This ACR heist hides its (command and control) dead spot review (DDR) technique on the Steam community website,” Lin said, citing its ability to sift through web browsers, crypto wallets, messaging programs, FTP clients, email clients, VPN services and password managers.

ACR, Lumma and Meduza Stealers

It should be noted that recent Lumma Stealer attacks have also been seen using the same technique, making it easier for adversaries to change C2 domains at any time and making the infrastructure more resilient. respectively at the AhnLab Security Intelligence Center (ASEC).

Disclosure is happening, as is CrowdStrike revealed that threat actors use shutdown last week distribute a previously undocumented information stealer called Daolpu, making it the latest example precipitation continues stems from a botched update that crippled millions of Windows devices.

The attack involves using a Microsoft Word document with firmware that is disguised as a list of Microsoft recovery guides legal instructions issued by the Windows manufacturer to solve the problem by using it as a decoy to activate the infection process.

The DOCM filewhen opened, runs a macro to retrieve a second-stage DLL from the remote control, which is decoded to launch Daolpu, a stealth malware designed to harvest credentials and cookies from Google Chrome, Microsoft Edge, Mozilla Firefox, and other Chromium-based browsers.

It’s also worth an appearance new families of stealing malware such as Braodo and DeerStealer, even as cybercriminals use malvertising techniques promoting legitimate software such as Microsoft Teams to deploy Atomic Stealer.

“As cybercriminals ramp up their distribution campaigns, downloading apps through search engines is becoming increasingly dangerous,” said Jerome Segura, researcher at Malwarebytes. said. “Users must navigate between malicious ads (sponsored results) and SEO poisoning (compromised websites).”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.