• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
china linked valleyrat malware resurfaces with advanced data theft tactics

China-Linked ValleyRAT Malware Resurfaces with Advanced Data Theft Tactics

You are here: Home / General Cyber Security News / China-Linked ValleyRAT Malware Resurfaces with Advanced Data Theft Tactics
June 11, 2024

Cybersecurity scientists have uncovered an updated model of malware referred to as ValleyRAT that’s getting distributed as portion of a new marketing campaign.

“In the hottest edition, ValleyRAT released new instructions, this sort of as capturing screenshots, approach filtering, pressured shutdown, and clearing Windows occasion logs,” Zscaler ThreatLabz scientists Muhammed Irfan V A and Manisha Ramcharan Prajapati reported.

ValleyRAT was previously documented by QiAnXin and Proofpoint in 2023 in relationship with a phishing campaign targeting Chinese-talking users and Japanese companies that dispersed different malware households these as Purple Fox and a variant of the Gh0st RAT trojan identified as Sainbox RAT (aka FatalRAT).

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The malware has been assessed to be the get the job done of a China-centered danger actor, boasting of abilities to harvest delicate details and drop more payloads on to compromised hosts.

The starting off stage is a downloader that utilizes an HTTP File Server (HFS) to fetch a file named “NTUSER.DXM” which is decoded to extract a DLL file responsible for downloading “shopper.exe” from the same server.

The decrypted DLL is also created to detect and terminate anti-malware options from Qihoo 360 and WinRAR in an work to evade evaluation, right after which the downloader proceeds to retrieve three a lot more files – “WINWORD2013.EXE,” “wwlib.dll,” and “xig.ppt” – from the HFS server.

Future, the malware launches “WINWORD2013.EXE,” a legit executable involved with Microsoft Word, making use of it to sideload “wwlib.dll” that, in switch, establishes persistence on the process and loads “xig.ppt” into memory.

“From below, the decrypted ‘xig.ppt’ continues the execution approach as a system to decrypt and inject shellcode into svchost.exe,” the scientists claimed. “The malware creates svchost.exe as a suspended course of action, allocates memory within the system, and writes shellcode there.”

The shellcode, for its section, contains required configuration to get hold of a command-and-regulate (C2) server and obtain the ValleyRAT payload in the variety of a DLL file.

“ValleyRAT utilizes a convoluted multi-stage system to infect a procedure with the closing payload that performs the the greater part of the malicious functions,” the scientists reported. “This staged approach blended with DLL facet-loading are probable built to much better evade host-centered security options these as EDRs and anti-virus purposes.”

Cybersecurity

The enhancement will come as the Fortinet FortiGuard Labs uncovered a phishing campaign that targets Spanish-speaking folks with an current variation of a keylogger and data stealer named Agent Tesla.

The attack chain usually takes advantage of Microsoft Excel Add-Ins (XLA) file attachments that exploit acknowledged security flaws (CVE-2017-0199 and CVE-2017-11882) to result in the execution of JavaScript code that hundreds a PowerShell script, which is engineered to launch a loader in order to retrieve Agent Tesla from a distant server.

“This variant collects credentials and email contacts from the victim’s unit, the software from which it collects the info, and the standard information and facts of the victim’s system,” security researcher Xiaopeng Zhang stated. “Agent Tesla can also obtain the victim’s email contacts if they use Thunderbird as their email client.”

Found this posting fascinating? Follow us on Twitter  and LinkedIn to go through a lot more distinctive articles we put up.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «snowflake breach exposes 165 customers' data in ongoing extortion campaign Snowflake Breach Exposes 165 Customers’ Data in Ongoing Extortion Campaign
Next Post: Apple Integrates OpenAI’s ChatGPT into Siri for iOS, iPadOS, and macOS apple integrates openai's chatgpt into siri for ios, ipados, and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.