• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
beware: new doublefinger loader targets cryptocurrency wallets with stealer

Beware: New DoubleFinger Loader Targets Cryptocurrency Wallets with Stealer

You are here: Home / General Cyber Security News / Beware: New DoubleFinger Loader Targets Cryptocurrency Wallets with Stealer
June 13, 2023

A novel multi-stage loader named DoubleFinger has been noticed providing a cryptocurrency stealer dubbed GreetingGhoul in what’s an advanced attack concentrating on customers in Europe, the U.S., and Latin The usa.

“DoubleFinger is deployed on the concentrate on device, when the victim opens a malicious PIF attachment in an email message, finally executing the initially of DoubleFinger’s loader levels,” Kaspersky researcher Sergey Lozhkin explained in a Monday report.

The commencing stage of the attacks is a modified model of espexe.exe – which refers to Microsoft Windows Economical Assistance Service provider application – that’s engineered to execute shellcode responsible for retrieving a PNG impression file from the impression hosting service Imgur.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The graphic employs steganographic trickery to conceal an encrypted payload that triggers a 4-stage compromise chain which at some point culminates in the execution of the GreetingGhoul stealer on the contaminated host.

Cybersecurity

A notable element of GreetingGhoul is its use of Microsoft Edge WebView2 to build counterfeit overlays on top rated of reputable cryptocurrency wallets to siphon credentials entered by unsuspecting consumers.

DoubleFinger, in addition to dropping GreetingGhoul, has also been noticed delivering Remcos RAT, a professional trojan that has been broadly used by threat actors to strike European and Ukrainian entities in modern months.

The assessment “reveals a significant amount of sophistication and talent in crimeware enhancement, akin to highly developed persistent threats (APTs),” Lozhkin observed.

“The multi-staged, shellcode-style loader with steganographic capabilities, the use of Windows COM interfaces for stealthy execution, and the implementation of method doppelgänging for injection into distant processes all level to effectively-crafted and intricate crimeware.”

Uncovered this article interesting? Follow us on Twitter  and LinkedIn to examine much more unique content material we write-up.


Some elements of this short article are sourced from:
thehackernews.com

Previous Post: «over half of security leaders lack confidence in protecting app Over Half of Security Leaders Lack Confidence in Protecting App Secrets, Study Reveals
Next Post: #InfosecurityEurope: Armis Highlights Riskiest Devices in Critical Infrastructure Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.