• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
lodeinfo fileless malware evolves with anti analysis and remote code tricks

LODEINFO Fileless Malware Evolves with Anti-Analysis and Remote Code Tricks

You are here: Home / General Cyber Security News / LODEINFO Fileless Malware Evolves with Anti-Analysis and Remote Code Tricks
January 25, 2024

Cybersecurity scientists have uncovered an current variation of a backdoor known as LODEINFO that’s distributed by way of spear-phishing attacks.

The conclusions occur from Japanese firm ITOCHU Cyber & Intelligence, which mentioned the malware “has been updated with new options, as effectively as adjustments to the anti-assessment (examination avoidance) strategies.”

LODEINFO (variations .6.6 and .6.7) was initially documented by Kaspersky in November 2022, detailing its abilities to execute arbitrary shellcode, get screenshots, and exfiltrate data files back again to an actor-controlled server.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


A month later, ESET disclosed attacks targeting Japanese political establishments that led to the deployment of LODEINFO.

Cybersecurity

The backdoor is the perform of a Chinese nation-condition actor acknowledged as Stone Panda (aka APT10, Bronze Riverside, Cicada, Earth Tengshe, MirrorFace, and Potassium), which has a background of orchestrating attacks targeting Japan because 2021.

Attack chains commence with phishing emails bearing destructive Microsoft Word paperwork that, when opened, execute VBA macros to start downloader shellcode capable of ultimately executing the LODEINFO implant.

LODEINFO Fileless Malware

LODEINFO an infection paths observed in 2023 have also been observed making use of distant template injection techniques to retrieve and execute destructive macros hosted on the adversary’s infrastructure just about every time the victim opens a lure Word doc containing the template.

What is actually a lot more, checks are said to have been added to confirm the language settings of Microsoft Office environment to confirm if it truly is Japanese sometime around June 2023, only for it be removed a thirty day period later on in attacks leveraging LODEINFO model .7.1.

LODEINFO Fileless Malware

“In addition, the filename of the maldoc alone has been altered from Japanese to English,” ITOCHU observed. “From this, we think that v0.7.1 was very likely applied to attack environments in languages other than Japanese.”

Another noteworthy change in attacks offering LODEINFO version .7.1 is the introduction of a new intermediate phase that includes the shellcode downloader fetching a file that masquerades as a Privacy-Increased Mail (PEM) from a C2 server, which, in flip, masses the backdoor directly in memory.

Cybersecurity

The downloader shares similarities with a regarded fileless downloader dubbed DOWNIISSA based mostly on the self-patching mechanism to conceal malicious code, encoding approach for command-and-regulate (C2) server facts, and the composition of the information decrypted from the pretend PEM file.

“LODEINFO backdoor shellcode is a fileless malware that allows attackers to remotely entry and function infected hosts,” the business reported, with samples found in 2023 and 2024 incorporating additional instructions. The most current model of LODEINFO is .7.3.

“As a countermeasure, since equally the downloader shellcode and the backdoor shellcode of LODEINFO are fileless malware, it is important to introduce a product that can scan and detect malware in memory in buy to detect it,” it added.

Discovered this posting fascinating? Adhere to us on Twitter  and LinkedIn to read through a lot more special content material we submit.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «china backed hackers hijack software updates to implant "nspx30" spyware China-backed Hackers Hijack Software Updates to Implant “NSPX30” Spyware
Next Post: Critical Jenkins Vulnerability Exposes Servers to RCE Attacks – Patch ASAP! critical jenkins vulnerability exposes servers to rce attacks patch»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.