
Vietnam-Based Hackers Target India, US & UK With Potential Malware: Report
According to the cybersecurity company WithSecure, the popular malware 'Darkgate' has been combined with a Malware as a Service (MaaS) toolkit to infect victims with rival remote access trojans (RATs) and additional information-stealing malware like Ducktail, Lobshot, and Redline.
Multiple infection attempts with DarkGate malware were identified by researchers, targeting these countries on August 4.
The lure documents, target patterns, themes, delivery methods, and overall attack tactics are similar to those seen in recent DuckTail infostealer campaigns, the report said.
DarkGate is a Remote Access Trojan (RAT) that first emerged in cyberspace in 2018. It is usually offered as a Malware-as-a-Service tool to cybercriminals.
The researchers examined open-source data associated with the DarkGate malware campaign and discovered connections to multiple infostealers. This pattern indicates that these attacks are being carried out by the same group or threat actor.
“By identifying characteristics of DarkGate malware lures and campaigns, we have been able to find multiple pivot points which lead to other information stealers and malware being used in very similar if not identical campaigns, and it is assessed as likely that the same threat actor group performs these campaigns,” the researchers said.
According to the report, the attack began with a file called 'Salary and new 4.' When unwitting users downloaded and extracted it, a VBS script was activated.
This script renamed and duplicated the original Windows binary (Curl) to a new location before connecting to an external server to retrieve two additional files: autoit3 and an Autoit3 script compiled.
Following that, the script executed the executable, de-obfuscated, and assembled the DarkGate RAT with the help of strings from the script.
“Based on what we've observed, it is very likely that a single actor is behind several of the campaigns we've been tracking that target Meta Business accounts,” said senior threat intelligence analyst Stephen Robinson.
After gaining control of an account, the attackers can engage in a variety of malicious activities such as malware distribution and fraud, the report warned.
--IANS
shs/prw

Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.
Most popular stories
Market Research

- Salvium Solves The Privacy Paradox: Salvium One Delivers Mica-Compliant Privacy That Exchanges Can List
- Cregis At TOKEN2049 Singapore 2025: Unlocking The Next Frontier Of Adoption
- Moonbirds And Azuki IP Coming To Verse8 As AI-Native Game Platform Integrates With Story
- CEA Industries ($BNC) Announces BNB Holdings Of 480,000 Tokens, And Total Crypto And Cash Holdings Of $663 Million
- SPAYZ.Io White Paper Explores Opportunities, Challenges And Ambitions In Payments Industry
- Solstice Announces Strategic Collaboration With Chainlink And Leading Custody And Venture Firms To Enhance Ecosystem Ahead Of USX Stablecoin Launch
Comments
No comment