• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
darkgate malware spreading via messaging services posing as pdf files

DarkGate Malware Spreading via Messaging Services Posing as PDF Files

You are here: Home / General Cyber Security News / DarkGate Malware Spreading via Messaging Services Posing as PDF Files
October 13, 2023

A piece of malware recognized as DarkGate has been observed remaining distribute by means of immediate messaging platforms these types of as Skype and Microsoft Teams.

In these attacks, the messaging apps are utilised to provide a Visual Standard for Purposes (VBA) loader script that masquerades as a PDF doc, which, when opened, triggers the download and execution of an AutoIt script intended to start the malware.

“It can be unclear how the originating accounts of the prompt messaging apps had been compromised, nonetheless it is hypothesized to be possibly by way of leaked qualifications readily available by way of underground discussion boards or the prior compromise of the mum or dad organization,” Development Micro said in a new investigation released Thursday.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

DarkGate, 1st documented by Fortinet in November 2018, is a commodity malware that incorporates a vast assortment of capabilities to harvest delicate info from web browsers, conduct cryptocurrency mining, and permit its operators to remotely handle the contaminated hosts. It also features as a downloader of additional payloads such as Remcos RAT.

Social engineering strategies distributing the malware have witnessed a surge in current months, leveraging original entry methods this kind of as phishing email messages and search engine optimization (Web optimization) poisoning to entice unwitting customers into installing it.

The uptick follows the malware author’s choice to advertise the malware on underground community forums and hire it out on a malware-as-a-services basis to other risk actors after a long time of working with it privately.

The use of Microsoft Teams chat message as a propagation vector for DarkGate was previously highlighted by Truesec early last thirty day period, indicating that it is really probably becoming put to use by several threat actors.

DarkGate Malware

A vast majority of the attacks have been detected in the Americas, adopted closely by Asia, the Center East, and Africa, for each Craze Micro.

The in general an infection treatment abusing Skype and Teams carefully resembles a malspam campaign noted by Telekom Security in late August 2023, help save for the modify in the preliminary access route.

“The risk actor abused a trustworthy connection among the two organizations to deceive the recipient into executing the hooked up VBA script,” Trend Micro researchers Trent Bessell, Ryan Maglaque, Aira Marcelo, Jack Walsh, and David Walsh reported.

Cybersecurity

“Accessibility to the victim’s Skype account allowed the actor to hijack an existing messaging thread and craft the naming convention of the files to relate to the context of the chat history.”

The VBA script serves as a conduit to fetch the genuine AutoIt software (AutoIt3.exe) and an affiliated AutoIT script responsible for launching the DarkGate malware.

An alternate attack sequence requires the attackers sending a Microsoft Groups concept made up of a ZIP archive attachment bearing an LNK file that, in transform, is built to run a VBA script to retrieve AutoIt3.exe and the DarkGate artifact.

“Cybercriminals can use these payloads to infect programs with many varieties of malware, together with info stealers, ransomware, destructive and/or abused distant management tools, and cryptocurrency miners,” the researchers mentioned.

“As lengthy as exterior messaging is allowed, or abuse of trustworthy relationships via compromised accounts is unchecked, then this procedure for first entry can be done to and with any immediate messaging (IM) applications.”

Discovered this article fascinating? Stick to us on Twitter  and LinkedIn to go through additional special articles we submit.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «fbi, cisa warn of rising avoslocker ransomware attacks against critical FBI, CISA Warn of Rising AvosLocker Ransomware Attacks Against Critical Infrastructure
Next Post: Ransomware attacks doubled year on year. Are organizations equipped to handle the evolution of Ransomware in 2023? ransomware attacks doubled year on year. are organizations equipped to»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.