• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
social media hijacking malware spreading through gaming apps on microsoft

Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft Store

You are here: Home / General Cyber Security News / Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft Store
February 26, 2022

A new malware able of managing social media accounts is being dispersed by Microsoft’s official application shop in the type of trojanized gaming apps, infecting additional than 5,000 Windows equipment in Sweden, Bulgaria, Russia, Bermuda, and Spain.

Israeli cybersecurity firm Examine Place dubbed the malware “Electron Bot,” in reference to a command-and-management (C2) domain made use of in current campaigns. The id of the attackers is not known, but evidence indicates that they could be dependent out of Bulgaria.

“Electron Bot is a modular Search engine marketing poisoning malware, which is utilised for social media advertising and simply click fraud,” Check out Point’s Moshe Marelus explained in a report published this week. “It is largely dispersed by means of the Microsoft store platform and dropped from dozens of contaminated programs, largely game titles, which are continually uploaded by the attackers.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper take secure and enxrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Automatic GitHub Backups

The very first indicator of destructive exercise commenced as an advert clicker marketing campaign that was found out in October 2018, with the malware hiding in plain sight in the form of a Google Photos app, as disclosed by Bleeping Pc.

In the many years considering that, the malware is said to have gone through various iterations that equip the malware with new attributes and evasive abilities. In addition to working with the cross-platform Electron framework, the bot is made to load payloads fetched from the C2 server at operate time, making it hard to detect.

“This allows the attackers to modify the malware’s payload and change the bots’ habits at any offered time,” Marelus stated.

Electron Bot’s core functionality is to open up a hidden browser window in purchase to carry out Search engine optimisation poisoning, deliver clicks for ads, direct site visitors to material hosted on YouTube and SoundCloud, and boost unique goods to deliver gains with ad clicking or maximize store score for higher product sales.

On top of that, it also comes with features that can handle social media accounts on Fb, Google and Sound Cloud, like registering new accounts, signing in, as very well as commenting and liking other posts to maximize sights.

The attack sequence receives induced when users download just one of the infected apps (e.g., Temple Countless Runner 2) from the Microsoft retailer that, when released, masses the recreation but also stealthily drops and installs the future phase dropper by means of JavaScript.

Prevent Data Breaches

Alongside the way, there are ways to detect prospective risk detection software program from corporations this kind of as Kaspersky Lab, ESET, Norton Security, Webroot, Sophos, and F-Secure just before the dropper proceeds to fetch the true bot malware.

The list of activity publishers that pushed the malware-laced applications is as follows –

  • Lupy games
  • Ridiculous 4 games
  • Jeuxjeuxkeux online games
  • Akshi video games
  • Goo Game titles
  • Bizzon Situation

“As the bot’s payload is loaded dynamically at every run time, the attackers can modify the code and change the bot’s conduct to large risk,” Marelus mentioned. “For example, they can initialize another next stage and drop a new malware this kind of as ransomware or a RAT. All of this can take place without having the victim’s know-how.”

Observed this write-up interesting? Adhere to THN on Facebook, Twitter  and LinkedIn to read through far more exclusive information we post.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «russia ukraine war: phishing, malware and hacker groups taking sides Russia-Ukraine War: Phishing, Malware and Hacker Groups Taking Sides
Next Post: Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger API iranian hackers using new spying malware that abuses telegram messenger»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New “B1txor20” Linux Botnet Uses DNS Tunnel and Exploits Log4J Flaw
  • New Infinite Loop Bug in OpenSSL Could Let Attackers Crash Remote Servers
  • FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
  • Unpatched RCE Bug in dompdf Project Affects HTML to PDF Converters
  • NortonLifeLock and Avast merger could reduce competition, CMA warns
  • Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations
  • NSW ditches e-voting system for 2023 election
  • Kaspersky Hits Back at “Politically Motivated” BSI Advisory
  • Germany advises against using Kaspersky software due to hacking risk
  • CISA: Fix MFA and Patch Promptly to Stop Russian Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.