• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
beware of fake telegram messenger app hacking pcs with purple

Beware of Fake Telegram Messenger App Hacking PCs with Purple Fox Malware

You are here: Home / General Cyber Security News / Beware of Fake Telegram Messenger App Hacking PCs with Purple Fox Malware
January 4, 2022

Trojanized installers of the Telegram messaging application are remaining used to distribute the Windows-based mostly Purple Fox backdoor on compromised units.

That’s according to new research revealed by Minerva Labs, describing the attack as different from intrusions that generally choose benefit of respectable software program for dropping malicious payloads.

“This threat actor was capable to leave most parts of the attack beneath the radar by separating the attack into numerous smaller documents, most of which had very reduced detection fees by [antivirus] engines, with the final phase leading to Purple Fox rootkit an infection,” researcher Natalie Zargarov stated.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Initially discovered in 2018, Purple Fox will come with rootkit capabilities that allow for the malware to be planted beyond the get to of security remedies and evade detection. A March 2021 report from Guardicore in-depth its worm-like propagation attribute, enabling the backdoor to spread a lot more quickly.

Automatic GitHub Backups

Then in October 2021, Development Micro scientists uncovered a .NET implant dubbed FoxSocket deployed in conjunction with Purple Fox that normally takes gain of WebSockets to call its command-and-control (C2) servers for a additional safe indicates of developing communications.

“The rootkit abilities of Purple Fox make it far more able of carrying out its objectives in a stealthier fashion,” the scientists mentioned. “They allow Purple Fox to persist on impacted units as nicely as produce even more payloads to affected devices.”

Telegram Messenger App

Very last but not the very least, in December 2021, Trend Micro also lose mild on the later levels of the Purple Fox an infection chain, focusing on SQL databases by inserting a destructive SQL common language runtime (CLR) module to attain a persistent and stealthier execution and ultimately abuse the SQL servers for illicit cryptocurrency mining.

Prevent Data Breaches

The new attack chain observed by Minerva commences with a Telegram installer file, an AutoIt script that drops a authentic installer for the chat app and a destructive downloader called “TextInputh.exe,” the latter of which is executed to retrieve future-stage malware from the C2 server.

Subsequently, the downloaded information continue to block processes associated with diverse antivirus engines, before advancing to the ultimate phase that results in the down load and execution of the Purple Fox rootkit from a now-shut down remote server.

“We located a massive amount of destructive installers delivering the exact Purple Fox rootkit variation making use of the identical attack chain,” Zargarov claimed. “It looks like some were shipped by using email, although other folks we presume ended up downloaded from phishing websites. The splendor of this attack is that each individual stage is divided to a various file which are ineffective with out the total file established.”

Identified this write-up attention-grabbing? Observe THN on Fb, Twitter  and LinkedIn to study extra unique written content we article.


Some parts of this posting are sourced from:
thehackernews.com

Previous Post: «detecting evasive malware on iot devices using electromagnetic emanations Detecting Evasive Malware on IoT Devices Using Electromagnetic Emanations
Next Post: Microsoft Fixes New Year’s Day Exchange Server Bug Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.