HomeCyber BalkansMassJacker Malware: The CyberMaterial that Steals Cryptocurrency

MassJacker Malware: The CyberMaterial that Steals Cryptocurrency

Published on

spot_img

In recent news, a new strain of malware known as MassJacker has been identified, targeting users seeking pirated software. This malicious software, categorized as clipper malware, specifically monitors clipboard content to intercept cryptocurrency wallet addresses. By substituting the copied wallet addresses with ones controlled by the attackers, victims unintentionally send their cryptocurrency to the wrong recipients.

After thorough research conducted by CyberArk, the origin of the infection chain was traced back to a website named pesktop[.]com. This site, posing as a platform for pirated software, not only distributes the initial malware but also lures users into downloading additional malicious software, creating a complex multi-layered attack.

The process begins when a victim downloads an executable from the deceptive website. This executable, in turn, triggers a PowerShell script that deploys a botnet called Amadey and two other .NET binaries. These binaries, tailored for both 32-bit and 64-bit systems, lay the groundwork for the subsequent attack. One of the binaries, known as PackerE, is responsible for fetching an encrypted dynamic-link library (DLL) which, upon decryption, loads another DLL to initiate the MassJacker payload by injecting it into a legitimate Windows process called “InstalUtil.exe”. This method allows the malware to operate discreetly under the guise of a trusted system process, evading detection.

Once infiltrated, MassJacker employs sophisticated evasion strategies to avoid detection. Utilizing Just-In-Time (JIT) hooking and a custom virtual machine, the malware obscures function calls and evades analysis. Furthermore, it incorporates anti-debugging measures, adding another layer of complexity for security researchers attempting to reverse-engineer the code. The primary function of MassJacker is to monitor clipboard content for cryptocurrency wallet addresses, automatically replacing them with addresses controlled by the attackers. Additionally, the malware establishes communication with a remote server to retrieve updated lists of the attackers’ wallet addresses, ensuring the success of their fraudulent activities.

CyberArk’s investigation unveiled a staggering number of over 778,531 unique cryptocurrency wallet addresses linked to the attackers, with 423 wallets containing funds. The cumulative amount in these wallets totaled approximately $95,300, indicating considerable financial gains for the cybercriminals involved. Notably, one specific wallet stood out, accumulating around $87,000 worth of cryptocurrency through over 350 transactions. This revelation underscores the extent of the operation orchestrated by the attackers, targeting unsuspecting cryptocurrency users, particularly those engaged in pirated software activities.

The scale and sophistication of the MassJacker attack illustrate a well-coordinated scheme aimed at siphoning significant amounts of cryptocurrency from unsuspecting victims. As the threat landscape continues to evolve, it is imperative for users to exercise caution while browsing the internet and downloading software from unverified sources to mitigate the risk of falling victim to such malicious activities. Stay informed and vigilant to safeguard your digital assets from potential threats.

Source link

Latest articles

THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

In the cybersecurity realm, threats are ever-evolving, ranging from nation-state campaigns to stealthy malware...

Pune doctor faces arrest in alleged organ trafficking scam, loses Rs 70 lakh in cyber fraud

In a shocking turn of events, a Pune-based doctor fell victim to cyber criminals...

Protect yourself from the “BRUTED” tool used by hackers to attack VPNs – tips for staying secure

A recent development in the world of cybersecurity has brought to light a new...

Organizations are at Risk due to Actively Exploited ChatGPT Bug

OpenAI, the renowned artificial intelligence research lab, has recently come under scrutiny for a...

More like this

THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

In the cybersecurity realm, threats are ever-evolving, ranging from nation-state campaigns to stealthy malware...

Pune doctor faces arrest in alleged organ trafficking scam, loses Rs 70 lakh in cyber fraud

In a shocking turn of events, a Pune-based doctor fell victim to cyber criminals...

Protect yourself from the “BRUTED” tool used by hackers to attack VPNs – tips for staying secure

A recent development in the world of cybersecurity has brought to light a new...