HomeCyber BalkansMassJacker Malware: The CyberMaterial that Steals Cryptocurrency

MassJacker Malware: The CyberMaterial that Steals Cryptocurrency

Published on

spot_img

In recent news, a new strain of malware known as MassJacker has been identified, targeting users seeking pirated software. This malicious software, categorized as clipper malware, specifically monitors clipboard content to intercept cryptocurrency wallet addresses. By substituting the copied wallet addresses with ones controlled by the attackers, victims unintentionally send their cryptocurrency to the wrong recipients.

After thorough research conducted by CyberArk, the origin of the infection chain was traced back to a website named pesktop[.]com. This site, posing as a platform for pirated software, not only distributes the initial malware but also lures users into downloading additional malicious software, creating a complex multi-layered attack.

The process begins when a victim downloads an executable from the deceptive website. This executable, in turn, triggers a PowerShell script that deploys a botnet called Amadey and two other .NET binaries. These binaries, tailored for both 32-bit and 64-bit systems, lay the groundwork for the subsequent attack. One of the binaries, known as PackerE, is responsible for fetching an encrypted dynamic-link library (DLL) which, upon decryption, loads another DLL to initiate the MassJacker payload by injecting it into a legitimate Windows process called “InstalUtil.exe”. This method allows the malware to operate discreetly under the guise of a trusted system process, evading detection.

Once infiltrated, MassJacker employs sophisticated evasion strategies to avoid detection. Utilizing Just-In-Time (JIT) hooking and a custom virtual machine, the malware obscures function calls and evades analysis. Furthermore, it incorporates anti-debugging measures, adding another layer of complexity for security researchers attempting to reverse-engineer the code. The primary function of MassJacker is to monitor clipboard content for cryptocurrency wallet addresses, automatically replacing them with addresses controlled by the attackers. Additionally, the malware establishes communication with a remote server to retrieve updated lists of the attackers’ wallet addresses, ensuring the success of their fraudulent activities.

CyberArk’s investigation unveiled a staggering number of over 778,531 unique cryptocurrency wallet addresses linked to the attackers, with 423 wallets containing funds. The cumulative amount in these wallets totaled approximately $95,300, indicating considerable financial gains for the cybercriminals involved. Notably, one specific wallet stood out, accumulating around $87,000 worth of cryptocurrency through over 350 transactions. This revelation underscores the extent of the operation orchestrated by the attackers, targeting unsuspecting cryptocurrency users, particularly those engaged in pirated software activities.

The scale and sophistication of the MassJacker attack illustrate a well-coordinated scheme aimed at siphoning significant amounts of cryptocurrency from unsuspecting victims. As the threat landscape continues to evolve, it is imperative for users to exercise caution while browsing the internet and downloading software from unverified sources to mitigate the risk of falling victim to such malicious activities. Stay informed and vigilant to safeguard your digital assets from potential threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...