• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Three Variants of IcedID Malware Discovered

You are here: Home / General Cyber Security News / Three Variants of IcedID Malware Discovered
March 27, 2023

3 new variants of the banking Trojan acknowledged as IcedID have been found in the wild, showcasing a typical code foundation but with a number of essential distinctions.

Security researchers at Proofpoint explained the malware samples in an advisory published earlier nowadays, which names them Conventional, Lite and Forked IcedID variants respectively.

The initially variant is the most generally observed in the wild and was first found in 2017. This Common variant has an original loader that contacts a Loader command and handle (C2) server and downloads a DLL Loader, which then delivers the IcedID bot.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Browse additional on IcedID listed here: FBI Issues Ransomware Team Flash Alert

The IcedID Lite variant, on the other hand, was found by Proofpoint in November 2022 as section of an Emotet marketing campaign by TA542. 

“[It]consists of a static URL to down load a ‘Bot Pack’ file with a static identify […] which success in the IcedID Lite DLL Loader, and then delivers the Forked edition of IcedID Bot, leaving out the web injects and again join operation that would commonly be used for banking fraud,” reads the advisory, written by Pim Trouerbach, Kelsey Merriman and Joe Smart.

The third variant observed by the workforce was learned in a sequence of seven campaigns in February 2023.

“This variant was distributed by TA581 and 1 unattributed menace exercise cluster which acted as preliminary access facilitators,” wrote Trouerbach, Merriman and Sensible. “The campaigns applied a range of email attachments this sort of as Microsoft OneNote attachments and to some degree scarce to see .URL attachments, which led to the Forked variant of IcedID.”

According to the security scientists, the IcedID Forked Loader observed in February 2023 is a lot more identical to the Standard IcedID Loader as it contacts a Loader C2 server to fetch both the DLL loader and the bot. 

“That DLL loader has comparable artifacts to the Lite Loader and also hundreds the Forked IcedID Bot,” they stated.

According to Proofpoint, the new variants hint that substantial effort and hard work is heading into the upcoming of IcedID and its codebase.

“While traditionally IcedID’s key operate was a banking Trojan, the removal of banking operation aligns with the general landscape change away from banking malware and an rising concentrate on remaining a loader for observe-on infections, which include ransomware,” the advisory concludes.“While many menace actors will continue on to use the Typical variant, it is very likely the new variants will keep on to be utilized to facilitate extra malware attacks.”


Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News New MacStealer Targets Catalina, Newer MacOS Versions
Next Post: eBook: 3 Steps to Implement Zero Trust Accesswww.cyolo.ioZero Trust SecurityStreamline your zero-trust access journey with three simple steps for high-risk, remote, and hybrid users. ebook: 3 steps to implement zero trust accesswww.cyolo.iozero trust securitystreamline»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data
  • New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids
  • Predator Android Spyware: Researchers Sound the Alarm on Alarming Capabilities
  • 5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
  • Romania’s Safetech Leans into UK Cybersecurity Market
  • New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids
  • Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances
  • Advanced Phishing Attacks Surge 356% in 2022
  • Expo Framework API Flaw Reveals User Data in Online Services
  • NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure

Copyright © TheCyberSecurity.News, All Rights Reserved.