Raccoon and Vidar Stealers Spreading via Massive Network of Fake Cracked Software

January 16, 2023Rabbi LakshmananData Security / Cyber ​​Threat

fake cracked software

Since early 2020, a “massive and resilient infrastructure” of over 250 domains has been used to distribute information-stealing malware such as Raccoon and Vidar.

The infection chain “uses about 100 cracked fake software catalog websites that redirect to several links before downloading the payload hosted on file-sharing platforms such as GitHub.” Cybersecurity firm SEKOIA said in an analysis published earlier this month.

A French cybersecurity firm assessed the domain as being operated by an attacker running a Traffic Direction System (TDS). This allows other cybercriminals to rent the service and distribute malware.

The attack targets users searching for cracked versions of software and games on search engines such as Google, and uses a technique called search engine optimization (SEO) poisoning to lure victims. to make fraudulent websites appear higher by downloading and executing malicious payloads.

The tainted results come with a download link to the promised software, which, when clicked, triggers a five-step URL redirect sequence that takes the user to a webpage displaying a shortened link. GitHub and its password.

“The use of multiple redirects complicates automated analysis by security solutions,” said the researchers. “This carving of the infrastructure is almost certainly designed to ensure resilience, making it easier and faster to update or change steps.”

fake cracked software

Once the victim unzips the RAR archive and runs the setup executable file it allegedly contains, one of two malware families, Raccoon or Vidar, will be installed on the system.

The development came when Cyble detailed a rogue Google Ads campaign that used widely used software such as AnyDesk, Bluestacks, Notepad++, and Zoom as lures to deliver a feature-rich stealer known as the Rhadamanthys Stealer. occurred in

Another variant of the attack chain has been observed utilizing phishing emails disguised as bank statements to unwittingly trick users into clicking on malicious links.

Fake websites masquerading as popular remote desktop solutions have also been used in the past to spread a Python-based information-stealing program called Mitsu Stealer.

Both malware are capable of siphoning various personal information from compromised machines, harvesting credentials from web browsers, and stealing data from various cryptocurrency wallets.

Users are advised to refrain from downloading pirated software and enforce multi-factor authentication whenever possible to strengthen their account.

“It is important that users exercise caution when receiving spam emails or visit phishing websites and verify the source before downloading any application,” said the researchers.

Did you find this article interesting?Please follow us twitter and LinkedIn to read more exclusive content we post.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *