HomeCyber BalkansDeerStealer: A Malware Infostealer - CyberMaterial

DeerStealer: A Malware Infostealer – CyberMaterial

Published on

spot_img

In a recent cyber threat discovery, a new strain of malware has been identified as a variant of the DeerStealer infostealer. This malicious software poses a significant risk to users worldwide as it is masquerading as a fake Google Authenticator app, luring unsuspecting victims into downloading it from GitHub repositories. Upon installation, DeerStealer surreptitiously collects sensitive information from compromised devices and sends it to the attackers’ command-and-control (C2) servers. By impersonating a trusted security tool, the malware exploits users’ trust and reliance on two-factor authentication (2FA) apps, making it particularly perilous.

DeerStealer is coded in the Delphi programming language, a deliberate choice by its developers to create an efficient and evasive malware. It targets a wide range of confidential data, including login credentials, financial information, and personal documents, which are extracted and encrypted into PKZIP archives before being sent out. This method allows cybercriminals to maximize the amount of data they can steal from each victim, intensifying the potential impact of the attack.

Operating under the guise of a legitimate application, DeerStealer carries out its malicious activities by collecting information such as login credentials, browser cookies, and locally stored personal data upon execution. One of its primary tactics involves scanning web browsers and applications for saved passwords and cookies, extracting this data using Delphi’s file manipulation capabilities, and packaging it into encrypted archives for transmission to the C2 servers.

To ensure data exfiltration without detection, DeerStealer establishes communication with its C2 infrastructure through web-based protocols like HTTP or HTTPS, allowing it to send encrypted archives back to the attackers discreetly. The malware also employs techniques to maintain persistence and evade detection, such as creating registry keys or scheduling tasks for automatic execution at system startup and obfuscating its binary to bypass antivirus software.

The deceptive tactic of posing as a trusted security tool like Google Authenticator further complicates detection and enhances its ability to operate covertly over extended periods. By the time victims realize they have downloaded a fake app, DeerStealer has already harvested sensitive data and transmitted it to the malicious actors.

In conclusion, DeerStealer represents a sophisticated and technically advanced malware designed to target sensitive data while evading detection. Its utilization of platforms like GitHub for distribution and its ability to mimic legitimate applications make it a dangerous threat. Individuals and organizations must be vigilant and aware of these technical operations to prevent infections and bolster their cybersecurity defenses against such insidious threats.

Source link

Latest articles

WatchGuard introduces FireCloud Internet Access

WatchGuard Technologies, a well-known unified cybersecurity provider, has introduced a groundbreaking product called FireCloud...

Medusa Ransomware Detection: FBI, CISA, and Partners Issue Warning on Rising Attacks against Critical Infrastructure by Ransomware Actors

In a report by Sophos, the costs associated with ransomware recovery have surged to...

Risks of API Hooking Highlighted by OBSCURE#BAT Malware

Researchers from a prominent cybersecurity firm have unearthed a sophisticated attack chain that is...

EU Requests Reassurances from US Regarding Trans-Atlantic Data Flows

Worries have been mounting over the stability of the Data Privacy Framework as concerns...

More like this

WatchGuard introduces FireCloud Internet Access

WatchGuard Technologies, a well-known unified cybersecurity provider, has introduced a groundbreaking product called FireCloud...

Medusa Ransomware Detection: FBI, CISA, and Partners Issue Warning on Rising Attacks against Critical Infrastructure by Ransomware Actors

In a report by Sophos, the costs associated with ransomware recovery have surged to...

Risks of API Hooking Highlighted by OBSCURE#BAT Malware

Researchers from a prominent cybersecurity firm have unearthed a sophisticated attack chain that is...