• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new phishing campaign deploys warmcookie backdoor targeting job seekers

New Phishing Campaign Deploys WARMCOOKIE Backdoor Targeting Job Seekers

You are here: Home / General Cyber Security News / New Phishing Campaign Deploys WARMCOOKIE Backdoor Targeting Job Seekers
June 12, 2024

Cybersecurity scientists have disclosed details of an ongoing phishing campaign that leverages recruiting- and work-themed lures to provide a Windows-based mostly backdoor named WARMCOOKIE.

“WARMCOOKIE seems to be an original backdoor software applied to scout out sufferer networks and deploy more payloads,” Elastic Security Labs researcher Daniel Stepanic said in a new assessment. “Each and every sample is compiled with a difficult-coded [command-and-control] IP handle and RC4 essential.”

The backdoor arrives with capabilities to fingerprint contaminated devices, capture screenshots, and drop a lot more malicious courses. The company is tracking the exercise below the name REF6127.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The attack chains noticed considering that late April involve the use of email messages purporting to be from recruitment firms like Hays, Michael Website page, and PageGroup, urging recipients to click on an embedded connection to look at facts about a position possibility.

Cybersecurity

End users who finish up clicking on the link are then prompted to obtain a doc by solving a CAPTCHA obstacle, subsequent which a JavaScript file (“Update_23_04_2024_5689382.js”) is dropped.

“This obfuscated script operates PowerShell, kicking off the 1st process to load WARMCOOKIE,” Elastic reported. “The PowerShell script abuses the Qualifications Intelligent Transfer Provider (BITS) to down load WARMCOOKIE.”

A critical part of the campaign is the use of compromised infrastructure to host the original phishing URL, which is then made use of to redirect victims to the acceptable landing web page.

A Windows DLL, WARMCOOKIE follows a two-move process that makes it possible for for setting up persistence working with a scheduled job and launching the core features, but not just before undertaking a collection of anti-investigation checks to sidestep detection.

The backdoor is made to seize data about the contaminated host in a way which is equivalent to an artifact utilised in connection with a previous campaign codenamed Resident that specific producing, business, and health care organizations.

WARMCOOKIE Backdoor

It also supports instructions to study from and write to documents, execute instructions making use of cmd.exe, fetch the checklist of mounted purposes, and grab screenshots.

“WARMCOOKIE is a freshly discovered backdoor that is attaining recognition and is becoming used in campaigns concentrating on end users across the globe,” Elastic claimed.

The disclosure arrives as Trustwave SpiderLabs detailed a sophisticated phishing marketing campaign that employs bill-similar decoys and requires benefit of the Windows look for features embedded in HTML code to deploy malware.

The email messages bear a ZIP archive that contains an HTML file, which uses the legacy Windows “lookup:” URI protocol handler to show a Shortcut (LNK) file hosted on a distant server in the Windows Explorer, giving the impact it can be a local look for outcome.

Cybersecurity

“This LNK file details to a batch script (BAT) hosted on the very same server, which, on person click, could potentially cause supplemental malicious operations,” Trustwave explained, introducing it could not retrieve the batch script due to the server getting unresponsive.

It is value noting that the abuse of look for-ms: and look for: as a malware distribution vector was documented by Trellix in July 2023.

“Although this attack does not use automatic installation of malware, it does need buyers to have interaction with numerous prompts and clicks,” the organization claimed. “Having said that, this approach cleverly obscures the attacker’s accurate intent, exploiting the have faith in people area in acquainted interfaces and common steps like opening email attachments.”

Identified this post intriguing? Abide by us on Twitter  and LinkedIn to go through additional distinctive material we post.


Some elements of this post are sourced from:
thehackernews.com

Previous Post: «china backed hackers exploit fortinet flaw, infecting 20,000 systems globally China-Backed Hackers Exploit Fortinet Flaw, Infecting 20,000 Systems Globally
Next Post: Black Basta Ransomware May Have Exploited MS Windows Zero-Day Flaw black basta ransomware may have exploited ms windows zero day flaw»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
  • Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
  • The Hidden Weaknesses in AI SOC Tools that No One Talks About
  • Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
  • Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
  • North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.