CyberSecurity SEE

Korean Researchers Detect Malware in Illegally Copied Office Software

Korean Researchers Detect Malware in Illegally Copied Office Software

South Korean researchers recently uncovered a disturbing trend in the cybersecurity landscape, highlighting the malicious use of pirated copies and cracked activators of legitimate productivity and office utility programs. These programs, including popular software such as Hangul Word Processor and Microsoft Office, were being exploited by cybercriminals to disguise and distribute malicious malware.

The revelation came to light through the diligent efforts of researchers from AhnLab, who delved into the dark underbelly of cybercrime to expose a sophisticated operation that preyed on unsuspecting users seeking free software downloads. The attackers strategically planted their malicious copies of software on common file-sharing platforms and torrent websites, enticing users with the allure of obtaining expensive software without having to pay the required license fee.

Once downloaded and executed, these nefarious programs masqueraded as cracked installers or activators for well-known software like Microsoft Office and the Hangul word processor. Initially developed in .NET, the attackers soon transitioned to utilizing more obfuscated attack techniques to evade detection and increase the effectiveness of their malicious campaign.

The malware employed a clever tactic of retrieving instructions for its next phase from channels on Telegram or Mastodon operated by the attackers. These channels contained encrypted Base64 strings that led to hosting platforms like Google Drive or GitHub, where the actual malicious payloads were stored. To decrypt these payloads, the malware leveraged the legitimate 7-zip archive utility, a common tool found on many systems that operates discreetly with minimal footprint.

Researchers uncovered a troubling array of malware strains loaded onto infected systems, each with its own destructive capabilities. From remote access trojans like OrcusRAT to cryptominers like XMRig, these malware components wreaked havoc on victims’ systems, compromising sensitive data and exploiting system resources for malicious purposes. The malware’s ability to infiltrate systems through legitimate processes and disrupt security products posed a significant threat to users’ digital security.

One of the most concerning aspects of this malicious campaign was the malware’s ability to maintain persistence on infected systems. By utilizing the native Windows Task Scheduler, the malware ensured consistent updates and the installation of newer strains multiple times each week. This continuous reinfection and distribution tactic increased the challenge of detection and removal for cybersecurity professionals, as infected systems remained vulnerable even after the initial malware had been identified and removed.

In response to these malicious attacks, researchers urged South Korean users to exercise caution when downloading software and programs, emphasizing the importance of obtaining software from official sources rather than relying on file-sharing sites. Additionally, users who suspected their systems had been compromised were advised to remove associated task scheduler entries and update their antivirus software to mitigate the risk of further malware infiltration.

By sharing indicators of compromise, MD5 hashes of malicious files, and details of suspicious behaviors observed during the attack, researchers aimed to empower users to proactively protect their systems and prevent falling victim to similar cyber threats. Despite the evolving nature of cybercrime, proactive measures and awareness remain key in safeguarding against malicious attacks and preserving digital security in an increasingly interconnected world.

Source link

Exit mobile version