• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
glupteba botnet evades detection with undocumented uefi bootkit

Glupteba Botnet Evades Detection with Undocumented UEFI Bootkit

You are here: Home / General Cyber Security News / Glupteba Botnet Evades Detection with Undocumented UEFI Bootkit
February 13, 2024

The Glupteba botnet has been uncovered to integrate a earlier undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, introducing yet another layer of sophistication and stealth to the malware.

“This bootkit can intervene and regulate the [operating system] boot method, enabling Glupteba to disguise alone and produce a stealthy persistence that can be particularly difficult to detect and take away,” Palo Alto Networks Device 42 scientists Lior Rochberger and Dan Yashnik said in a Monday examination.

Glupteba is a entirely-featured facts stealer and backdoor capable of facilitating illicit cryptocurrency mining and deploying proxy parts on infected hosts. It is really also recognized to leverage the Bitcoin blockchain as a backup command-and-regulate (C2) process, earning it resilient to takedown initiatives.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Some of the other capabilities allow for it to produce more payloads, siphon qualifications, and credit card data, accomplish advertisement fraud, and even exploit routers to attain qualifications and distant administrative accessibility.

Cybersecurity

Above the past ten years, modular malware has metamorphosed into a complex menace employing elaborate multi-stage an infection chains to sidestep detection by security answers.

A November 2023 marketing campaign observed by the cybersecurity agency entails the use of pay out-per-put in (PPI) solutions this kind of as Ruzki to distribute Glupteba. In September 2022, Sekoia joined Ruzki to action clusters, leveraging PrivateLoader as a conduit to propagate next-stage malware.

This requires the kind of large-scale phishing attacks in which PrivateLoader is shipped beneath the guise of set up information for cracked software, which then loads SmokeLoader that, in transform, launches RedLine Stealer and Amadey, with the latter in the end dropping Glupteba.

Glupteba Botnet

“Risk actors normally distribute Glupteba as section of a complex infection chain spreading a number of malware families at the identical time,” the researchers described. “This an infection chain generally starts off with a PrivateLoader or SmokeLoader an infection that loads other malware families, then hundreds Glupteba.”

In a indication that the malware is currently being actively preserved, Glupteba will come fitted with a UEFI bootkit by incorporating a modified version of an open-source venture referred to as EfiGuard, which is able of disabling PatchGuard and Driver Signature Enforcement (DSE) at boot time.

It’s worth pointing out that former versions of the malware had been found to “put in a kernel driver the bot uses as a rootkit, and make other alterations that weaken the security posture of an contaminated host.”

Cybersecurity

“Glupteba malware continues to stand out as a noteworthy illustration of the complexity and adaptability exhibited by fashionable cybercriminals,” the researchers explained.

“The identification of an undocumented UEFI bypass procedure within Glupteba underscores this malware’s capability for innovation and evasion. Furthermore, with its function in distributing Glupteba, the PPI ecosystem highlights the collaboration and monetization methods employed by cybercriminals in their tries at mass bacterial infections.”

Identified this post attention-grabbing? Abide by us on Twitter  and LinkedIn to go through extra exceptional material we put up.


Some pieces of this article are sourced from:
thehackernews.com

Previous Post: «pikabot resurfaces with streamlined code and deceptive tactics PikaBot Resurfaces with Streamlined Code and Deceptive Tactics
Next Post: Microsoft Rolls Out Patches for 73 Flaws, Including 2 Windows Zero-Days microsoft rolls out patches for 73 flaws, including 2 windows»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.