• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
emotet botnet distributing self unlocking password protected rar files to drop malware

Emotet Botnet Distributing Self-Unlocking Password-Protected RAR Files to Drop Malware

You are here: Home / General Cyber Security News / Emotet Botnet Distributing Self-Unlocking Password-Protected RAR Files to Drop Malware
October 21, 2022

The infamous Emotet botnet has been connected to a new wave of malspam strategies that choose gain of password-shielded archive files to fall CoinMiner and Quasar RAT on compromised techniques.

In an attack chain detected by Trustwave SpiderLabs scientists, an invoice-themed ZIP file lure was located to comprise a nested self-extracting (SFX) archive, the initial archive performing as a conduit to start the next.

Whilst phishing attacks like these usually demand persuading the target into opening the attachment, the cybersecurity company said the campaign sidesteps this hurdle by building use of a batch file to immediately source the password to unlock the payload.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

The initially SFX archive file even more helps make use of both a PDF or Excel icon to make it surface legit, when, in actuality, it has three parts: the password-secured next SFX RAR file, the aforementioned batch script which launches the archive, and a decoy PDF or graphic.

“The execution of the batch file leads to the installation of the malware lurking within the password-protected RARsfx [self-extracting RAR archive],” researchers Bernard Bautista and Diana Lopera mentioned in a Thursday create-up.

The batch script achieves this by specifying the archive’s password and the location folder to which the payload will be extracted, in addition to launching a command to exhibit the entice document in an attempt to conceal the destructive activity.

Last of all, the an infection culminates in the execution of CoinMiner, a cryptocurrency miner that can also double up as a credential stealer, or Quasar RAT, an open up resource .NET-based mostly distant accessibility trojan, based on the payload packed in the archive.

CyberSecurity

The a person-simply click attack strategy is also noteworthy in that it properly jumps earlier the password hurdle, enabling destructive actors to carry out a large assortment of steps this sort of as cryptojacking, details exfiltration, and ransomware.

Trustwave mentioned it has determined an raise in threats packaged in password-safeguarded ZIP files, with about 96% of these becoming distributed by the Emotet botnet.

“The self-extracting archive has been all-around for a lengthy time and eases file distribution among conclude customers,” the scientists reported. “Nevertheless, it poses a security risk considering the fact that the file contents are not quickly verifiable, and it can operate instructions and executables silently.”

Identified this post fascinating? Stick to THN on Fb, Twitter  and LinkedIn to examine more special content material we put up.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Google Unveils Open Source Project to Improve Software Supply Chain Security
Next Post: New Phishing Campaign Targets Saudi Government Service Portal Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.