• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
casbaneiro banking malware goes under the radar with uac bypass

Casbaneiro Banking Malware Goes Under the Radar with UAC Bypass Technique

You are here: Home / General Cyber Security News / Casbaneiro Banking Malware Goes Under the Radar with UAC Bypass Technique
July 25, 2023

The economically motivated risk actors at the rear of the Casbaneiro banking malware loved ones have been noticed generating use of a Person Account Command (UAC) bypass system to gain comprehensive administrative privileges on a device, a signal that the danger actor is evolving their techniques to steer clear of detection and execute destructive code on compromised property.

“They are however closely focused on Latin American monetary establishments, but the modifications in their strategies depict a considerable risk to multi-regional economical corporations as nicely,” Sygnia said in a assertion shared with The Hacker Information.

Casbaneiro, also acknowledged as Metamorfo and Ponteiro, is best known for its banking trojan, which initial emerged in mass email spam campaigns focusing on the Latin American money sector in 2018.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


An infection chains generally start off with a phishing email pointing to a booby-trapped attachment that, when released, activates a collection of actions that culminate in the deployment of the banking malware, together with scripts that leverage living-off-the-land (LotL) tactics to fingerprint the host and get method metadata.

Also downloaded at this stage is a binary referred to as Horabot that is made to propagate the an infection internally to other unsuspecting staff members of the breached corporation.

“This adds reliability to the email sent, as there are no clear anomalies in the email headers (suspicious external domains), which would ordinarily induce email security remedies to act and mitigate,” the cybersecurity business stated in a past report published in April 2022. “The e-mails include the exact same PDF attachment utilised to compromise the former sufferer hosts, and so the chain is executed once extra.”

What’s modified in recent attack waves is that the attack is kick-begun by spear-phishing email embedded with a website link to an HTML file that redirects the concentrate on to download a RAR file, a deviation from the use of malicious PDF attachments with a down load url to a ZIP file.

Forthcoming WEBINARShield Towards Insider Threats: Learn SaaS Security Posture Administration

Anxious about insider threats? We’ve got you included! Be part of this webinar to check out simple methods and the strategies of proactive security with SaaS Security Posture Management.

Sign up for Today

A 2nd key improve to the modus operandi problems the use of fodhelper.exe to accomplish a UAC bypass and attain substantial integrity stage execution.

Sygnia explained it also observed Casbaneiro attackers producing a mock folder on C:Windows[space]method32 to duplicate the fodhelper.exe executable, though the specifically crafted path is stated to have never ever been employed in the intrusion.

“It is possible that the attacker deployed the mock folder to bypass AV detections or to leverage that folder for side-load DLLs with Microsoft-signed binaries for UAC bypass,” the firm stated.

The advancement marks the third time the mock trustworthy folder tactic has been detected in the wild in recent months, with the system employed in campaigns offering a malware loader termed DBatLoader as effectively as remote obtain trojans like Warzone RAT (aka Ave Maria).

Discovered this report exciting? Adhere to us on Twitter  and LinkedIn to read far more special content material we write-up.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «macos under attack: examining the growing threat and user perspectives macOS Under Attack: Examining the Growing Threat and User Perspectives
Next Post: North Korean Nation-State Actors Exposed in JumpCloud Hack After OPSEC Blunder north korean nation state actors exposed in jumpcloud hack after opsec»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.