eSentire reported two cases of DarkGate stealer targeting finance and manufacturing industries since August 2023. The stealer was delivered via drive-by downloads disguised as fake installers for Advanced IP Scanner and fake document reports. The loader is using PPID spoofing to evade detections, and deploys DanaBot. Technical analysis and IOC provided.
Link: https://www.esentire.com/blog/from-darkgate-to-danabot
Post I wrote for my employer at https://www.linkedin.com/posts/unit42_darkgate-timelythreatintel-wireshark-activity-7123453508560797697--dJn and
https://twitter.com/Unit42_Intel/status/1717687387025809465
2023-10-25 (Wednesday): #DarkGate malware distributed through fake invoice/billing emails with PDF attachments that spoof DocuSign.
As early as last week, these DarkGate loaders stopped retrieving a copy of Autoit3.exe and the .au3 file from the C2 server. Now, the copy of Autoit3.exe and the .au3 file is contained within a zip-ed .msi file that's hosted on a separate server.
The loader for DarkGate now grabs that .msi file instead.
We'll see how long that lasts.
Indicators from an infection run are available at https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2023-10-25-IOCs-from-DarkGate-activity.txt
A #pcap of the infection traffic, along with the associated malware/artifacts are now available at https://malware-traffic-analysis.net/2023/10/25/index.html
Latest issue of my curated #cybersecurity and #infosec list of resources for week #42/2023 is out! It includes the following and much more:
➝
Tracking Unauthorized Access to #Okta's Support System
➝
#Casio discloses #databreach impacting customers in 149 countries
➝
Hacker leaks millions more #23andMe user records on #cybercrime forum
➝
D-Link confirms data breach after employee #phishing attack
➝
#Equifax Fined $13.5 Million Over 2017 Data Breach
➝
Ukrainian activists hack Trigona #ransomware gang, wipe servers
➝
FBI: Thousands of Remote IT Workers Sent Wages to #NorthKorea to Help Fund Weapons Program
➝
#India targets #Microsoft, #Amazon tech support #scammers in nationwide crackdown
➝
#Hamas-linked app offers window into cyber infrastructure, possible links to Iran
➝
Police seize #RagnarLocker leak site
➝ North Korean Hackers Exploiting Recent #TeamCity Vulnerability
➝
#China replaces #Russia as top #cyberthreat
➝
CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks
➝
#France frees the two biggest Spanish hackers
➝
️ Ex-Navy IT head gets 5 years for selling people’s data on #darkweb
➝
#Switzerland’s e-voting system has predictable implementation blunder
➝
Critical Vulnerabilities Expose #Weintek HMIs to Attacks
➝
#Milesight Industrial Router #Vulnerability Possibly Exploited in Attacks
➝
Fake #Corsair job offers on #LinkedIn push #DarkGate malware
➝ Google-hosted #malvertising leads to fake #Keepass site that looks genuine
➝
#Discord still a hotbed of #malware activity — Now APTs join the fun
➝
SpyNote: Beware of This Android #Trojan that Records Audio and Phone Calls
➝
#Android will now scan sideloaded apps for malware at install time
➝
#WhatsApp #passkeys on the way, but as usual, for Android first
➝
Pro-Russian Hackers Exploiting Recent #WinRAR Vulnerability in New Campaign
➝
Signal Pours Cold Water on Zero-Day Exploit Rumors
➝
#Cisco warns of new #IOS XE #zeroday actively exploited in attacks
This week's recommended reading is: "RTFM: Red Team Field Manual v2" by Ben Clark and Nicholas Downer
Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end
https://infosec-mashup.santolaria.net/p/infosec-mashup-week-422023
Vietnamese hackers attack UK, US and Indian targets with DarkGate malware
Victims lured to download infected documents offering job descriptions and salary details
https://www.computing.co.uk/news/4137089/vietnamese-hackers-attack-uk-us-india-darkgate-malware
Vietnamese threat actors linked to #DarkGate #malware campaign
https://securityaffairs.com/152886/malware/vietnamese-threat-actors-darkgate-malware.html
#securityaffairs #hacking