Spike in Phishing Campaigns Delivers Latrodectus, the Successor to IcedID
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
New Functionalities
Two new commands added to Latrodectus since its emergence late last year include the ability to enumerate files in the desktop directory and retrieve the entire running process ancestry from the infected machine. The malware also supports a command to download and execute IcedID (command ID 18) from the C2 server, although Elastic did not detect this behavior in the wild.
“There definitely is some kind of development connection or working arrangement between IcedID and Latrodectus,” the researchers noted. “One hypothesis is that Latrodectus is being actively developed as a replacement for IcedID, and the handler (#18) was included until malware authors were satisfied with Latrodectus’ capabilities.”
Broader Cyber Threat Landscape
The development comes as Forcepoint dissected a phishing campaign using invoice-themed email lures to deliver the DarkGate malware. The attack chain begins with phishing emails posing as QuickBooks invoices, urging users to install Java by clicking on an embedded link that leads to a malicious Java archive (JAR). This JAR file acts as a conduit to run a PowerShell script responsible for downloading and launching DarkGate via an AutoIT script.
Social engineering campaigns have also employed an updated version of a phishing-as-a-service (PhaaS) platform called Tycoon to harvest Microsoft 365 and Gmail session cookies and bypass multi-factor authentication (MFA) protections.
“This new version boasts enhanced detection evasion capabilities that make it even harder for security systems to identify and block the kit,” Proofpoint said. Significant alterations to the kit’s JavaScript and HTML code have been implemented to increase its stealthiness and effectiveness. These include obfuscation techniques to make the source code harder to understand and the use of dynamic code generation to tweak the code every time it runs, thus evading signature-based detection systems.
Trending: 10 Misconceptions about Hacking
Trending: Digital Forensics Tool: dnstwist
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: thehackernews.com