HomeCII/OTSoftware Productivity Tools Compromised to Distribute Infostealers

Software Productivity Tools Compromised to Distribute Infostealers

Published on

spot_img

An incident involving an India-based software company caught distributing information-stealing malware hidden within its primary software products made headlines recently. Conceptworld Corporation, the company in question, offers three software tools – Notezilla, a sticky notes app; RecentX, a tool for managing recently used files, folders, applications, and clipboard data; and Copywhiz, a software used for copying, organizing, and backing up files.

The discovery of Trojanized installation packages associated with all three products was made by researchers from Rapid7 a few weeks ago. The presence of rudimentary infostealing malware in these installers was alarming. Rapid7 promptly informed Conceptworld about this security breach on June 24. The company swiftly took action by removing the malicious installers within 12 hours and replacing them with legitimate and signed copies.

The attackers behind this incident managed to infiltrate Conceptworld’s legitimate software installers by combining them with their own malware. Although the exact method used for this infiltration remains unknown, Tyler McGraw, a detection and response analyst at Rapid7, suggested that the attackers may have exploited vulnerabilities in the vendor’s web servers to upload arbitrary files and swap them with the original ones. As a result, the unsigned installer packages contained the malware, making the file sizes larger than indicated on the company’s website.

The malware responsible for this security breach was identified as “dllFake” by the researchers. While the installers for this malware were relatively new (since early June), dllFake itself has been part of an unidentified malware family in the wild since at least January. This malicious program is capable of stealing information from cryptocurrency wallets, Google Chrome, and Mozilla Firefox. It can also record keystrokes and clipboard data, as well as download and execute additional payloads.

McGraw highlighted the unsophisticated nature of the malware, pointing out indicators left in plaintext, limited usage of compiled executables, and the semi-obfuscated command-and-control address not being actively utilized during successful execution. He emphasized the importance of exercising caution while downloading software, especially free programs, and suggested verifying files through methods like signature validation and hash reputation checks. Users were also advised to utilize freely available sandboxes to test software before full installation.

In conclusion, the inadvertent distribution of information-stealing malware by Conceptworld Corporation serves as a stark reminder of the importance of cybersecurity measures in today’s digital landscape. The swift response to the incident and the steps taken to rectify the situation demonstrate the company’s commitment to maintaining the security and integrity of its products. Moving forward, heightened awareness and vigilance against such cyber threats are essential to safeguarding sensitive data and ensuring a secure online environment for all users.

Source link

Latest articles

Organizations rely on outdated methods to protect APIs

Security teams are facing a daunting challenge in keeping up with the ever-increasing risks...

Karnataka Chief Minister Siddaramaiah orders police to tackle cybercrimes

In an effort to combat the increasing number of cybercrime cases in the state,...

Apple addresses serious Vision Pro vulnerability that enabled hackers to flood virtual environment with spiders

Apple has successfully patched a significant vulnerability in its VisionOS system that allowed a...

Four key steps to building an incident response plan

In a recent interview with Help Net Security, Mike Toole, the head of security...

More like this

Organizations rely on outdated methods to protect APIs

Security teams are facing a daunting challenge in keeping up with the ever-increasing risks...

Karnataka Chief Minister Siddaramaiah orders police to tackle cybercrimes

In an effort to combat the increasing number of cybercrime cases in the state,...

Apple addresses serious Vision Pro vulnerability that enabled hackers to flood virtual environment with spiders

Apple has successfully patched a significant vulnerability in its VisionOS system that allowed a...
en_USEnglish