HomeCyber BalkansNew PLAYFULGHOST Malware Hacks Devices to Remotely Capture Audio Recordings

New PLAYFULGHOST Malware Hacks Devices to Remotely Capture Audio Recordings

Published on

spot_img

Researchers have recently discovered a new variant of Gh0st RAT called PLAYFULGHOST, which exhibits unique traffic patterns and encryption methods. This malicious RAT is being distributed through phishing emails and SEO poisoning of bundled applications, enabling cybercriminals to conduct keylogging, screen capture, and other remote access attacks.

The initial attack vector for PLAYFULGHOST involves a phishing campaign that lures victims with a .jpg file containing a malicious RAR archive. Once extracted and executed, the archive deploys a Windows executable that downloads and runs the malware from a remote server. This method serves as a way for threat actors to gain initial access to the target system.

In another approach, cybercriminals are using SEO poisoning techniques to distribute PLAYFULGHOST. Malicious installers disguised as legitimate software are used to trick users into downloading and executing the malware from a remote server. This method allows attackers to infect systems without the need for direct interaction with the victims.

PLAYFULGHOST operates by loading malicious components that exploit vulnerabilities in the system. For example, a vulnerable executable can load a malicious DLL, which then decrypts and loads the PLAYFULGHOST payload into memory by taking advantage of DLL search order hijacking. This technique makes it difficult for traditional security measures to detect and block the malware.

Researchers have identified multiple execution scenarios for PLAYFULGHOST, including instances where renamed legitimate binaries are used to load malicious DLLs that deliver payloads. Additionally, the presence of other tools like BOOSTWAVE, TERMINATOR, QAssist.sys, and CHROMEUSERINFO.dll suggests that the malware aims to steal sensitive information, such as Google Chrome credentials.

According to Mandiant researchers, the use of these tools indicates that threat actors behind PLAYFULGHOST are focused on evading detection, maintaining persistence on infected systems, and exfiltrating data. The malware employs a variety of techniques to achieve these goals, including leveraging registry key entries, scheduled tasks, and Windows Services for background operations.

PLAYFULGHOST is a highly sophisticated malware strain capable of conducting a wide range of malicious activities on infected systems. This includes remote system control, data exfiltration through keylogging and screenshots, file manipulation, remote execution via shell and RDP, privilege escalation, and anti-forensic techniques. Its capabilities make it a serious threat to organizations and individuals alike.

In conclusion, PLAYFULGHOST represents a significant cybersecurity threat that highlights the evolving tactics and sophistication of cybercriminals. Organizations and users must remain vigilant against such threats and ensure they have robust security measures in place to detect and mitigate malware attacks like PLAYFULGHOST.

Source link

Latest articles

Malware that steals cryptocurrency found on App Store and Google Play

A recent discovery by Kaspersky researchers has uncovered a concerning issue with several iOS...

FDHS Discloses Breach of Sensitive Data

Florida Digestive Health Specialists (FDHS) recently disclosed a data breach to the Attorney General...

Agentic AI: Blessing and Curse for Cybersecurity

Malwarebytes has recently released a report predicting that agentic AI systems will play a...

Payment tech not compliant with PCI DSS 4.0 could lead to penalties

The Payment Card Industry Data Security Standard (PCI DSS) has been a crucial set...

More like this

Malware that steals cryptocurrency found on App Store and Google Play

A recent discovery by Kaspersky researchers has uncovered a concerning issue with several iOS...

FDHS Discloses Breach of Sensitive Data

Florida Digestive Health Specialists (FDHS) recently disclosed a data breach to the Attorney General...

Agentic AI: Blessing and Curse for Cybersecurity

Malwarebytes has recently released a report predicting that agentic AI systems will play a...