• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new phishing campaign deploys warmcookie backdoor targeting job seekers

New Phishing Campaign Deploys WARMCOOKIE Backdoor Targeting Job Seekers

You are here: Home / General Cyber Security News / New Phishing Campaign Deploys WARMCOOKIE Backdoor Targeting Job Seekers
June 12, 2024

Cybersecurity scientists have disclosed details of an ongoing phishing campaign that leverages recruiting- and work-themed lures to provide a Windows-based mostly backdoor named WARMCOOKIE.

“WARMCOOKIE seems to be an original backdoor software applied to scout out sufferer networks and deploy more payloads,” Elastic Security Labs researcher Daniel Stepanic said in a new assessment. “Each and every sample is compiled with a difficult-coded [command-and-control] IP handle and RC4 essential.”

The backdoor arrives with capabilities to fingerprint contaminated devices, capture screenshots, and drop a lot more malicious courses. The company is tracking the exercise below the name REF6127.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The attack chains noticed considering that late April involve the use of email messages purporting to be from recruitment firms like Hays, Michael Website page, and PageGroup, urging recipients to click on an embedded connection to look at facts about a position possibility.

Cybersecurity

End users who finish up clicking on the link are then prompted to obtain a doc by solving a CAPTCHA obstacle, subsequent which a JavaScript file (“Update_23_04_2024_5689382.js”) is dropped.

“This obfuscated script operates PowerShell, kicking off the 1st process to load WARMCOOKIE,” Elastic reported. “The PowerShell script abuses the Qualifications Intelligent Transfer Provider (BITS) to down load WARMCOOKIE.”

A critical part of the campaign is the use of compromised infrastructure to host the original phishing URL, which is then made use of to redirect victims to the acceptable landing web page.

A Windows DLL, WARMCOOKIE follows a two-move process that makes it possible for for setting up persistence working with a scheduled job and launching the core features, but not just before undertaking a collection of anti-investigation checks to sidestep detection.

The backdoor is made to seize data about the contaminated host in a way which is equivalent to an artifact utilised in connection with a previous campaign codenamed Resident that specific producing, business, and health care organizations.

WARMCOOKIE Backdoor

It also supports instructions to study from and write to documents, execute instructions making use of cmd.exe, fetch the checklist of mounted purposes, and grab screenshots.

“WARMCOOKIE is a freshly discovered backdoor that is attaining recognition and is becoming used in campaigns concentrating on end users across the globe,” Elastic claimed.

The disclosure arrives as Trustwave SpiderLabs detailed a sophisticated phishing marketing campaign that employs bill-similar decoys and requires benefit of the Windows look for features embedded in HTML code to deploy malware.

The email messages bear a ZIP archive that contains an HTML file, which uses the legacy Windows “lookup:” URI protocol handler to show a Shortcut (LNK) file hosted on a distant server in the Windows Explorer, giving the impact it can be a local look for outcome.

Cybersecurity

“This LNK file details to a batch script (BAT) hosted on the very same server, which, on person click, could potentially cause supplemental malicious operations,” Trustwave explained, introducing it could not retrieve the batch script due to the server getting unresponsive.

It is value noting that the abuse of look for-ms: and look for: as a malware distribution vector was documented by Trellix in July 2023.

“Although this attack does not use automatic installation of malware, it does need buyers to have interaction with numerous prompts and clicks,” the organization claimed. “Having said that, this approach cleverly obscures the attacker’s accurate intent, exploiting the have faith in people area in acquainted interfaces and common steps like opening email attachments.”

Identified this post intriguing? Abide by us on Twitter  and LinkedIn to go through additional distinctive material we post.


Some elements of this post are sourced from:
thehackernews.com

Previous Post: «china backed hackers exploit fortinet flaw, infecting 20,000 systems globally China-Backed Hackers Exploit Fortinet Flaw, Infecting 20,000 Systems Globally
Next Post: Black Basta Ransomware May Have Exploited MS Windows Zero-Day Flaw black basta ransomware may have exploited ms windows zero day flaw»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.