• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
from pdfs to payload: bogus adobe acrobat reader installers distribute

From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware

You are here: Home / General Cyber Security News / From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware
April 5, 2024

Bogus installers for Adobe Acrobat Reader are staying used to distribute a new multi-purposeful malware dubbed Byakugan.

The starting up level of the attack is a PDF file penned in Portuguese that, when opened, demonstrates a blurred image and asks the victim to click on on a backlink to obtain the Reader software to perspective the articles.

In accordance to Fortinet FortiGuard Labs, clicking the URL prospects to the shipping of an installer (“Reader_Install_Set up.exe”) that activates the an infection sequence. Particulars of the marketing campaign were first disclosed by the AhnLab Security Intelligence Center (ASEC) past month.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The attack chain leverages methods like DLL hijacking and Windows Person Access Manage (UAC) bypass to load a malicious dynamic-hyperlink library (DLL) file named “BluetoothDiagnosticUtil.dll,” which, in switch, masses unleashes the ultimate payload. It also deploys a authentic installer for a PDF reader like Wondershare PDFelement.

The binary is outfitted to collect and exfiltrate system metadata to a command-and-command (C2) server and drop the most important module (“chrome.exe”) from a distinctive server that also acts as its C2 for getting documents and commands.

“Byakugan is a node.js-centered malware packed into its executable by pkg,” security researcher Pei Han Liao mentioned. “In addition to the principal script, there are quite a few libraries corresponding to capabilities.”

Cybersecurity

This incorporates setting up persistence, checking the victim’s desktop employing OBS Studio, capturing screenshots, downloading cryptocurrency miners, logging keystrokes, enumerating and uploading information, and grabbing details saved in web browsers.

“There is a developing pattern to use both of those clean and destructive parts in malware, and Byakugan is no exception,” Fortinet claimed. “This approach raises the total of sound created for the duration of investigation, generating exact detections additional tricky.”

The disclosure comes as ASEC unveiled a new campaign that propagates the Rhadamanthys data stealer below the guise of an installer for groupware.

“The risk actor established a pretend site to resemble the initial internet site and exposed the site to the users applying the advertisement function in research engines,” the South Korean cybersecurity firm explained. “The malware in distribution employs the indirect syscall approach to cover from the eyes of security answers.”

It also follows a discovery that a manipulated model of Notepad++ is staying employed by unidentified danger actors to propagate the WikiLoader malware (aka WailingCrab).

Located this post attention-grabbing? Stick to us on Twitter  and LinkedIn to go through a lot more special articles we submit.


Some pieces of this article are sourced from:
thehackernews.com

Previous Post: «new wave of jsoutprox malware targeting financial firms in apac New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA
Next Post: CISO Perspectives on Complying with Cybersecurity Regulations ciso perspectives on complying with cybersecurity regulations»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.